Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPN B. GET VPN C. FlexVPN D. DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...

January 5, 2023 No Comments READ MORE +

Which form of attack is launched using botnets?

Which form of attack is launched using botnets?A . EIDDOS B. virus C. DDOS D. TCP floodView AnswerAnswer: C Explanation: A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as...

January 4, 2023 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values. B. Use prepared statements and parameterized queries. C. Secure the connection between the web and the app tier. D. Write SQL code instead of using...

January 4, 2023 No Comments READ MORE +

What is a result of the configuration?

Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirected B. Traffic from the inside network is redirected C. All TCP traffic is redirected D. Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: The purpose of above...

January 4, 2023 No Comments READ MORE +

What is the function of Cisco Cloudlock for data security?

What is the function of Cisco Cloudlock for data security?A . data loss prevention B. controls malicious cloud apps C. detects anomalies D. user and entity behavior analyticsView AnswerAnswer: A

January 4, 2023 No Comments READ MORE +

the risk of this ransom ware infection?

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patchwas not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransom ware infection? (Choose two)A . Configure a posture policy in Cisco Identity Services Engine...

January 4, 2023 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . put B. options C. get D. push E. connectView AnswerAnswer: A, C Explanation: The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API...

January 3, 2023 No Comments READ MORE +

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP? A. transparent B. redirection C. forward D. proxy gatewayView AnswerAnswer: A Explanation: There are two possible methods to accomplish the redirection of traffic to Cisco WSA: transparent proxy mode and explicit proxy mode. In a...

January 3, 2023 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and password B. encryption method C. device serial number D. registration keyView AnswerAnswer: D

January 3, 2023 No Comments READ MORE +

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Which two behavioral patterns characterize a ping of death attack? (Choose two)A . The attack is fragmented into groups of 16 octets before transmission. B. The attack is fragmented into groups of 8 octets before transmission. C. Short synchronized bursts of traffic are used to disrupt TCP connections. D. Malformed...

January 3, 2023 No Comments READ MORE +