What is a characteristic of Dynamic ARP Inspection?

What is a characteristic of Dynamic ARP Inspection?A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.B . In a typical network, make all ports as trusted except for the ports connecting to switches, which are...

June 17, 2022 No Comments READ MORE +

How does Cisco Stealthwatch Cloud provide security for cloud environments?

How does Cisco Stealthwatch Cloud provide security for cloud environments?A . It delivers visibility and threat detection.B . It prevents exfiltration of sensitive data.C . It assigns Internet-based DNS protection for clients and servers.D . It facilitates secure connectivity between public and private networks.View AnswerAnswer: A Explanation: Cisco Stealthwatch Cloud:...

June 17, 2022 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

June 17, 2022 No Comments READ MORE +

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoderB . SIPC . modbusD . inline normalizationE . SSLView AnswerAnswer: B,E Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guidev60/Application_Layer_Preprocessors.html# ID-2244-0000080cFirePower uses many preprocessors, including DNS, FTP/Telnet, SIP, SSL, SMTP, SSH preprocessors.

June 17, 2022 No Comments READ MORE +

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf

June 17, 2022 No Comments READ MORE +

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)A . multiple factor authB . local web authC . single sign-onD . central web authE . TACACS+View AnswerAnswer: B,D

June 17, 2022 No Comments READ MORE +

Which action should be taken to accomplish this goal?

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing . Which action should be taken to accomplish this goal?A . Disable telnet using the no ip telnet command.B . Enable the SSH server using the...

June 17, 2022 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

June 17, 2022 No Comments READ MORE +

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

An MDM provides which two advantages to an organization with regards to device management? (Choose two)A . asset inventory managementB . allowed application managementC . Active Directory group policy managementD . network device managementE . critical device managementView AnswerAnswer: A,B

June 16, 2022 No Comments READ MORE +

What does the API do when connected to a Cisco security appliance?

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?A . get the process and PID information from the computers in the networkB . create an SNMP pull mechanism for managing AMPC . gather network telemetry information from AMP for endpointsD . gather the...

June 16, 2022 No Comments READ MORE +