How is Cisco Umbrella configured to log only security events?
How is Cisco Umbrella configured to log only security events?A . per policyB . in the Reporting settingsC . in the Security Settings sectionD . per network in the Deployments sectionView AnswerAnswer: A Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
Which two key and block sizes are valid for AES? (Choose two)
Which two key and block sizes are valid for AES? (Choose two)A . 64-bit block size, 112-bit key lengthB . 64-bit block size, 168-bit key lengthC . 128-bit block size, 192-bit key lengthD . 128-bit block size, 256-bit key lengthE . 192-bit block size, 256-bit key lengthView AnswerAnswer: C,D Explanation:...
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)A . accountingB . assuranceC . automationD . authenticationE . encryptionView AnswerAnswer: B,C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-cisco-dna-center-aag-cte-en.html
Which two capabilities does TAXII support? (Choose two)
Which two capabilities does TAXII support? (Choose two)A . ExchangeB . Pull messagingC . BindingD . CorrelationE . MitigatingView AnswerAnswer: B,C Explanation: The Trusted Automated exchange of Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to...
Why would a user choose an on-premises ESA versus the CES solution?
Why would a user choose an on-premises ESA versus the CES solution?A . Sensitive data must remain onsite.B . Demand is unpredictable.C . The server team wants to outsource this service.D . ESA is deployed inline.View AnswerAnswer: A
Which two fields are defined in the NetFlow flow? (Choose two)
Which two fields are defined in the NetFlow flow? (Choose two)A . type of service byteB . class of service bitsC . Layer 4 protocol typeD . destination portE . output logical interfaceView AnswerAnswer: A,D Explanation: Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets...
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?A . Configure the datasecurityconfig commandB . Configure the advancedproxyconfig command with the HTTPS subcommandC . Configure a small log-entry size.D . Configure a maximum packet size.View AnswerAnswer: B
Which command achieves this goal?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1 . Which command achieves this goal?A . snmp-server host inside 10.255.254.1 version 3 andyB . snmp-server host inside 10.255.254.1 version 3...
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?A . transparentB . redirectionC . forwardD . proxy gatewayView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: A,D Explanation: Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and...