Which API is used for Content Security?
Which API is used for Content Security?A . NX-OS APIB . IOS XR APIC . OpenVuln APID . AsyncOS APIView AnswerAnswer: D
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which VPN technology can support a multivendor environment and secure traffic between sites?A . SSL VPNB . GET VPNC . FlexVPND . DMVPNView AnswerAnswer: C Explanation: FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with...
Which compliance status is shown when a configured posture policy requirement is not met?
Which compliance status is shown when a configured posture policy requirement is not met?A . compliantB . unknownC . authorizedD . noncompliantView AnswerAnswer: D Explanation: Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known as posture, of all the...
engineering attacks?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)A . Patch for cross-site scripting.B . Perform backups to the private cloud.C . Protect against input validation and character escapes in the endpoint.D . Install a spam and virus...
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP? A. transparent B. redirection C. forward D. proxy gatewayView AnswerAnswer: A Explanation: There are two possible methods to accomplish the redirection of traffic to Cisco WSA: transparent proxy mode and explicit proxy mode. In a...
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?A . It allows the endpoint to authenticate with 802.1x or MAB.B . It verifies that the endpoint has the latest Microsoft security patches installed.C . It adds endpoints to identity groups...
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?A . It decrypts HTTPS application traffic for unauthenticated users.B . It alerts users when the WSA decrypts their traffic.C . It decrypts HTTPS application traffic for authenticated users.D . It provides enhanced HTTPS application...
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?A . urlB . terminalC . profileD . selfsignedView AnswerAnswer: C Explanation: A trustpoint enrollment mode, which also defines the trustpoint authentication...
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?A . Security IntelligenceB . Impact FlagsC . Health MonitoringD . URL FilteringView AnswerAnswer: B
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D