Which IPS engine detects ARP spoofing?
Which IPS engine detects ARP spoofing?A . Atomic ARP EngineB . Service Generic EngineC . ARP Inspection EngineD . AIC EngineView AnswerAnswer: A
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)A . data exfiltrationB . command and control communicationC . intelligent proxyD . snortE . URL categorizationView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXXB . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXXC . authenticates the IKEv1 peers in the 172.16.0.0/16...
What is a characteristic of a bridge group in ASA Firewall transparent mode?
What is a characteristic of a bridge group in ASA Firewall transparent mode? A. It includes multiple interfaces and access rules between interfaces are customizable B. It is a Layer 3 segment and includes one port and customizable access rules C. It allows ARP traffic with a single access rule...
Which product should be used to accomplish this goal?
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network . Which product should be used to accomplish this goal?A . Cisco FirepowerB . Cisco...
What is the result of this Python script of the Cisco DNA Center API?
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?A . adds authentication to a switchB . adds a switch to Cisco DNA CenterC . receives information about a switchView AnswerAnswer: B
Which ASA deployment mode meets these needs?
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance . Which ASA deployment mode meets these needs?A . routed modeB . transparent modeC . multiple context modeD . multiple zone modeView AnswerAnswer: C
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?A . It allows the endpoint to authenticate with 802.1x or MAC . It verifies that the endpoint has the latest Microsoft security patches installed.D . It adds endpoints to identity groups...
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)A . Outgoing traffic is allowed so users can communicate with outside organizations.B . Malware infects the messenger application on the user endpoint to send company data.C . Traffic is encrypted, which prevents visibility on...
Which port configuration is missing?
Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate . Which port configuration is missing?A . authentication openB . dotlx reauthenticationC . cisp enableD . dot1x pae authenticatorView AnswerAnswer: D