Which probe must be enabled for this type of profiling to work?

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group . Which probe must be enabled for this type of profiling to work?A . NetFlowB . NMAPC . SNMPD . DHCPView AnswerAnswer: B Explanation: Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling

June 19, 2022 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D

June 19, 2022 No Comments READ MORE +

What is a characteristic of traffic storm control behavior?

What is a characteristic of traffic storm control behavior?A . Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.B . Traffic storm control cannot determine if the packet is unicast or broadcast.C . Traffic storm control monitors incoming traffic levels...

June 19, 2022 No Comments READ MORE +

Which VPN technology can support a multivendor environment and secure traffic between sites?

Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...

June 18, 2022 No Comments READ MORE +

When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?

When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?A . Spero analysisB . dynamic analysisC . sandbox analysisD . malware analysisView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Reference_a_wrapper_Chapter_topic_here.html-> Spero analysis only uploads the signature of the (executable) files to the AMP cloud. It...

June 18, 2022 No Comments READ MORE +

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)A . Outgoing traffic is allowed so users can communicate with outside organizations.B . Malware infects the messenger application on the user endpoint to send company data.C . Traffic is encrypted, which prevents visibility on...

June 18, 2022 No Comments READ MORE +

Which product meets all of these requirements?

An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth . Which product meets all of these requirements?A . Cisco Prime InfrastructureB . Cisco Identity...

June 18, 2022 No Comments READ MORE +

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

When wired 802.1X authentication is implemented, which two components are required? (Choose two)A . authentication server: Cisco Identity Service EngineB . supplicant: Cisco AnyConnect ISE Posture moduleC . authenticator: Cisco Catalyst switchD . authenticator: Cisco Identity Services EngineE . authentication server: Cisco Prime InfrastructureView AnswerAnswer: A,C

June 18, 2022 No Comments READ MORE +

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?A . RSA SecureIDB . Internal DatabaseC . Active DirectoryD . LDAPView AnswerAnswer: C

June 18, 2022 No Comments READ MORE +

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . CorrelationB . IntrusionC . Access ControlD . Network DiscoveryView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/introduction_to_network_discovery_and_identity.html

June 18, 2022 No Comments READ MORE +