What is the difference between deceptive phishing and spear phishing?

What is the difference between deceptive phishing and spear phishing?A . Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.B . A spear phishing campaign is aimed at a specific person versus a group of people.C . Spear phishing is when...

August 24, 2022 No Comments READ MORE +

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?A . IP Blacklist CenterB . File Reputation CenterC . AMP Reputation CenterD . IP and Domain Reputation CenterView AnswerAnswer: D

August 24, 2022 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over aprivate IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPNView AnswerAnswer: D Explanation: Cisco‘s Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate point-to-point...

August 24, 2022 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...

August 24, 2022 No Comments READ MORE +

Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

August 24, 2022 No Comments READ MORE +

What is the primary benefit of deploying an ESA in hybrid mode?

What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...

August 24, 2022 No Comments READ MORE +

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...

August 24, 2022 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

August 24, 2022 No Comments READ MORE +

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?A . TLSv1.2B . TLSv1.1C . BJTLSv1D . DTLSv1View AnswerAnswer: D Explanation: DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based.Therefore DTLS offers strongest throughput performance. The throughput of...

August 24, 2022 No Comments READ MORE +

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)A . Check integer, float, or Boolean string parameters to ensure accurate values.B . Use prepared statements and parameterized queries.C . Secure the connection between the web and the app tier.D . Write SQL code instead of using...

August 23, 2022 No Comments READ MORE +