Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?A . It allows traffic if it does not meet the profile.B . It defines a traffic baseline for traffic anomaly deduction.C . It inspects hosts that meet the profile with more intrusion rules.D . It blocks...
On which part of the IT environment does DevSecOps focus?
On which part of the IT environment does DevSecOps focus?A . application developmentB . wireless networkC . data centerD . perimeter networkView AnswerAnswer: A
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?A . It tracks flow-create, flow-teardown, and flow-denied events.B . It provides stateless IP flow tracking that exports all records of a specific flow.C . It tracks the flow continuously and provides updates every 10 seconds.D . Its events...
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which two preventive measures are used to control cross-site scripting? (Choose two)A . Enable client-side scripts on a per-domain basis.B . Incorporate contextual output encoding/escaping.C . Disable cookie inspection in the HTML inspection engine.D . Run untrusted HTML input through an HTML sanitization engine.E . Same Site cookie attribute should...
Which type of attack is social engineering?
Which type of attack is social engineering?A . trojanB . phishingC . malwareD . MITMView AnswerAnswer: B Explanation: Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company...
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?A . It allows the administrator to quarantine malicious files so that the application can function, just Not maliciously.B . It discovers and controls cloud apps that are connected to a company’s corporate environment.C . It...
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?A . 3DESB . RSAC . DESD . AESView AnswerAnswer: B Explanation: Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation,as well...
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automaticallyB . The active and standby devices can run different versions of the...
Which ASA deployment mode can provide separation of management on a shared appliance?
Which ASA deployment mode can provide separation of management on a shared appliance?A . DMZ multiple zone modeB . transparent firewall modeC . multiple context modeD . routed modeView AnswerAnswer: C
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)A . packet decoderB . SIPC . modbusD . inline normalizationE . SSLView AnswerAnswer: B, E Explanation: Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application...