What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before...

May 28, 2022 No Comments READ MORE +

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?A . Common Security ExploitsB . Common Vulnerabilities and ExposuresC . Common Exploits and VulnerabilitiesD . Common Vulnerabilities, Exploits and ThreatsView AnswerAnswer: B Explanation: Reference: CCNP And CCIE Security Core SCOR...

May 27, 2022 No Comments READ MORE +

Which probe must be enabled for this type of profiling to work?

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group . Which probe must be enabled for this type of profiling to work?A . NetFlowB . NMAPC . SNMPD . DHCPView AnswerAnswer: B Explanation: Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling

May 27, 2022 No Comments READ MORE +

What is a commonality between DMVPN and FlexVPN technologies?

What is a commonality between DMVPN and FlexVPN technologies?A . FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokesB . FlexVPN and DMVPN use the new key management protocolC . FlexVPN and DMVPN use the same hashing algorithmsD . IOS routers run the same NHRP code for DMVPN...

May 27, 2022 No Comments READ MORE +

Where are individual sites specified to be blacklisted in Cisco Umbrella?

Where are individual sites specified to be blacklisted in Cisco Umbrella?A . application settingsB . content categoriesC . security settingsD . destination listsView AnswerAnswer: D Explanation: Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists

May 27, 2022 No Comments READ MORE +

Which technology is used to improve web traffic performance by proxy caching?

Which technology is used to improve web traffic performance by proxy caching?A . WSAB . FirepowerC . Fire SIGHTD . ASAView AnswerAnswer: A

May 26, 2022 No Comments READ MORE +

applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security IntelligenceB . Cisco Application Visibility and ControlC . Cisco Model Driven TelemetryD . Cisco DNA...

May 26, 2022 No Comments READ MORE +

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?A . controlB . malwareC . URL filteringD . protectView AnswerAnswer: D

May 26, 2022 No Comments READ MORE +

Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A

May 26, 2022 No Comments READ MORE +

Which task can you perform to determine where each message was lost?

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?A . Configure the trackingconfig command to enable message tracking.B . Generate a system report.C . Review the log files.D ....

May 26, 2022 No Comments READ MORE +