Which threat involves software being used to gain unauthorized access to a computer system?

Which threat involves software being used to gain unauthorized access to a computer system?A . virusB . NTP amplificationC . ping of deathD . HTTP floodView AnswerAnswer: A

March 19, 2024 No Comments READ MORE +

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?A . PaaSB . XaaSC . IaaSD . SaaSView AnswerAnswer: A Explanation: Cloud computing can be broken into the following three basic models: + Infrastructure as...

March 19, 2024 No Comments READ MORE +

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?A . Group PolicyB . Access Control PolicyC . Device Management PolicyD . Platform Service PolicyView AnswerAnswer: D Explanation: Cisco...

March 19, 2024 No Comments READ MORE +

TAXII protocol?

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?A . STIXB . XMPPC . pxGridD . SMTPView AnswerAnswer: A Explanation: TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport

March 19, 2024 No Comments READ MORE +

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?A . SmurfB . distributed denial of serviceC . cross-site scriptingD . rootkit exploitView AnswerAnswer: C Explanation: Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The...

March 19, 2024 No Comments READ MORE +

Which statement about IOS zone-based firewalls is true?

Which statement about IOS zone-based firewalls is true?A . An unassigned interface can communicate with assigned interfacesB . Only one interface can be assigned to a zone.C . An interface can be assigned to multiple zones.D . An interface can be assigned only to one zone.View AnswerAnswer: D

March 19, 2024 No Comments READ MORE +

What is the primary role of the Cisco Email Security Appliance?

What is the primary role of the Cisco Email Security Appliance?A . Mail Submission AgentB . Mail Transfer AgentC . Mail Delivery AgentD . Mail User AgentView AnswerAnswer: B Explanation: Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and...

March 19, 2024 No Comments READ MORE +

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?A . quality of serviceB . time synchronizationC . network address translationsD . intrusion policyView AnswerAnswer: B

March 19, 2024 No Comments READ MORE +

Inline posture node?

Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an Inline posture node?A . RADIUS Change of AuthorizationB . device trackingC . DHCP snoopingD . VLAN hoppingView AnswerAnswer: A

March 19, 2024 No Comments READ MORE +

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.B . A sysopt command can be used to enable NSEL on a specific interface.C . NSEL can be used without a...

March 18, 2024 No Comments READ MORE +