What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?A . Cisco UmbrellaB . External Threat FeedsC . Cisco Threat GridD . Cisco Stealth watchView AnswerAnswer: C Explanation: Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligencedirector
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . NetFlowB . desktop clientC . ASDMD . APIView AnswerAnswer: D
On which part of the IT environment does DevSecOps focus?
On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security IntelligenceB . Cisco Application Visibility and ControlC . Cisco Model Driven TelemetryD . Cisco DNA...
What is a result of the configuration?
Refer to the exhibit. What is a result of the configuration?A . Traffic from the DMZ network is redirectedB . Traffic from the inside network is redirectedC . All TCP traffic is redirectedD . Traffic from the inside and DMZ networks is redirectedView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html
What is the primary role of the Cisco Email Security Appliance?
What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/February2013/Cisco_SBA_BN_EmailSecurityUsingCiscoESADeploymentGuide-Feb2013.pdf
How is ICMP used an exfiltration technique?
How is ICMP used an exfiltration technique?A . by flooding the destination host with unreachable packetsB . by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast addressC . by encrypting the payload in an ICMP packet to carry out command and...
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...
Which two solutions mitigate the risk of this ransom ware infection?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware . Which two solutions mitigate the risk of this ransom ware infection? (Choose two)A . Configure a posture policy in Cisco Identity...
Which compliance status is shown when a configured posture policy requirement is not met?
Which compliance status is shown when a configured posture policy requirement is not met?A . compliantB . unknownC . authorizedD . noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html