For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)A . Windows serviceB . computer identityC . user identityD . Windows firewallE . default browserView AnswerAnswer: A,D

June 14, 2022 No Comments READ MORE +

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...

June 14, 2022 No Comments READ MORE +

Which option is the main function of Cisco Firepower impact flags?

Which option is the main function of Cisco Firepower impact flags?A . They alert administrators when critical events occur.B . They highlight known and suspected malicious IP addresses in reports.C . They correlate data about intrusions and vulnerability.D . They identify data that the ASA sends to the Firepower module.View...

June 14, 2022 No Comments READ MORE +

What is the primary benefit of deploying an ESA in hybrid mode?

What is the primary benefit of deploying an ESA in hybrid mode?A . You can fine-tune its settings to provide the optimum balance between security and performance for your environmentB . It provides the lowest total cost of ownership by reducing the need for physical appliancesC . It provides maximum...

June 14, 2022 No Comments READ MORE +

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . Impact FlagsC . Health MonitoringD . URL FilteringView AnswerAnswer: B

June 14, 2022 No Comments READ MORE +

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport

June 14, 2022 No Comments READ MORE +

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)A . Time-based one-time passwordsB . Data loss preventionC . Heuristic-based filteringD . Geolocation-based filteringE . NetFlowView AnswerAnswer: B,D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html

June 14, 2022 No Comments READ MORE +

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)A . putB . optionsC . getD . pushE . connectView AnswerAnswer: A,C Explanation: The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API allows...

June 14, 2022 No Comments READ MORE +

What does the Cloud lock Apps Firewall do to mitigate security concerns from an application perspective?

What does the Cloud lock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C ....

June 14, 2022 No Comments READ MORE +

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encrypted-transport-vpn/GETVPN_DIG_version_2_0_External.pdf

June 14, 2022 No Comments READ MORE +