Which threat involves software being used to gain unauthorized access to a computer system?
Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaaSB . XaaSC . IaaSD . SaaSView AnswerAnswer: A Explanation: Cloud computing can be broken into the following three basic models: + Infrastructure as...
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . Group PolicyB . Access Control PolicyC . Device Management PolicyD . Platform Service PolicyView AnswerAnswer: D Explanation: Cisco...
TAXII protocol?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...
Which statement about IOS zone-based firewalls is true?
Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D
What is the primary role of the Cisco Email Security Appliance?
What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and...
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B
Inline posture node?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an Inline posture node?A . RADIUS Change of AuthorizationB . device trackingC . DHCP snoopingD . VLAN hoppingView AnswerAnswer: A
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...