What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...
Which probe must be enabled for this type of profiling to work?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group . Which probe must be enabled for this type of profiling to work?A . NetFlowB . NMAPC . SNMPD . DHCPView AnswerAnswer: B Explanation: Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling
What is a commonality between DMVPN and FlexVPN technologies?
What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists
Which technology is used to improve web traffic performance by proxy caching?
Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . Fire SIGHTD . ASAView AnswerAnswer: A
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security IntelligenceB . Cisco Application Visibility and ControlC . Cisco Model Driven TelemetryD . Cisco DNA...
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D
Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A
Which task can you perform to determine where each message was lost?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking.B . Generate a system report.C . Review the log files.D ....