Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)A . Sophos engineB . white listC . RATD . outbreak filtersE . DLPView AnswerAnswer: A,D

June 9, 2022 No Comments READ MORE +

Which Cisco AMP file disposition valid?

Which Cisco AMP file disposition valid?A . pristineB . malwareC . dirtyD . non maliciousView AnswerAnswer: B

June 9, 2022 No Comments READ MORE +

What is the function of Cisco Cloud lock for data security?

What is the function of Cisco Cloud lock for data security?A . data loss preventionB . controls malicious cloud appsC . detects anomaliesD . user and entity behavior analyticsView AnswerAnswer: A

June 9, 2022 No Comments READ MORE +

Which action tests the routing?

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network . Which action tests the routing?A . Ensure that the client computers are pointing to the on-premises DNS servers.B . Enable the Intelligent Proxy to validate that...

June 9, 2022 No Comments READ MORE +

What is a feature of the open platform capabilities of Cisco DNA Center?

What is a feature of the open platform capabilities of Cisco DNA Center?A . intent-based APIsB . automation adaptersC . domain integrationD . application adaptersView AnswerAnswer: A

June 9, 2022 No Comments READ MORE +

Which information is required when adding a device to Firepower Management Center?

Which information is required when adding a device to Firepower Management Center?A . username and passwordB . encryption methodC . device serial numberD . registration keyView AnswerAnswer: D

June 8, 2022 No Comments READ MORE +

Which compliance status is shown when a configured posture policy requirement is not met?

Which compliance status is shown when a configured posture policy requirement is not met?A . compliantB . unknownC . authorizedD . noncompliantView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_010111.html

June 7, 2022 No Comments READ MORE +

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?A . NetFlowB . desktop clientC . ASDMD . APIView AnswerAnswer: D

June 7, 2022 No Comments READ MORE +

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?A . SNMPB . SMTPC . syslogD . model-driven telemetryView AnswerAnswer: D Explanation: Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide

June 6, 2022 No Comments READ MORE +

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...

June 6, 2022 No Comments READ MORE +