Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?A . aaa server radius dynamic-authorB . aaa new-modelC . auth-type allD . ip device-trackingView AnswerAnswer: D
On which part of the IT environment does DevSecOps focus?
On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?A . user input validation in a web page or web applicationB . Linux and Windows operating systemsC . databaseD . web page imagesView AnswerAnswer: A Explanation: SQL injection usually occurs when you ask a user for input, like their...
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?A . CorrelationB . IntrusionC . Access ControlD . Network DiscoveryView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/introduction_to_network_discovery_and_identity.html
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)A . Cisco FTDv configured in routed mode and managed by an FMCv installed in AWSB . Cisco FTDv with one management interface and two traffic interfaces configuredC . Cisco FTDv configured in routed mode and managed...
Which solution should be used to meet this requirement?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being accessed via the firewall which requires that the administrator input the bad URL categories that the organization wants blocked into the access policy. Which solution should be used to meet this requirement?A...
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)A . virtualizationB . middlewareC . operating systemsD . applicationsE . dataView AnswerAnswer: D,E Explanation: Customers must manage applications and data in PaaS.
What is an attribute of the DevSecOps process?
What is an attribute of the DevSecOps process?A . mandated security controls and check listsB . security scanning and theoretical vulnerabilitiesC . development securityD . isolated security teamView AnswerAnswer: C Explanation: DevSecOps (development, security, and operations) is a concept used in recent years to describe how to movesecurity activities to...
Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two.)
Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two.)A . Assignments to endpoint groups are made dynamically, based on endpoint attributes.B . Endpoint supplicant configuration is deployed.C . A centralized management solution is deployed.D . Patch management remediation is performed.E ....
Which feature should be used to accomplish this?
An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?A . NetFlowB . Packet TracerC . Network DiscoveryD . Access ControlView AnswerAnswer: C Explanation: Reference:...