You are attempting to locate some missing messages by using the Message Tracking feature on a Cisco ESA.
You are attempting to locate some missing messages by using the Message Tracking feature on a Cisco ESA. Which of the following statements is correct? A. A maximum of 250 results can be displayed. B. Quarantined messages will not appear in the search results. C. Tracking searches are case sensitive. D. Message tracking must first […]
Which of the following suppression types is not an option when you are creating a suppression for an intrusion
Which of the following suppression types is not an option when you are creating a suppression for an intrusion policy? A. destination B. source C. rule D. protocol Explanation: The protocol suppression type is not an option when you are creating a suppression for an intrusion policy. Intrusion policies can be modified to include alerts, […]
Which of the following is a term used to describe a network of compromised computers used to perform a DDoS at
Which of the following is a term used to describe a network of compromised computers used to perform a DDoS attack? A. honeynet B. black hole C. botnet D. sinkhole E. honeypot Explanation: A botnet is a network of compromised computers, known as zombies, which can be used to send spam as well as perform […]
You have issued the flow-export destination inside 10.10.10.110 command on a Cisco ASA.
You have issued the flow-export destination inside 10.10.10.110 command on a Cisco ASA. Which of the following NSEL event types will be exported to the specified collector by default? A. only flow-denied events B. only flow-create events C. only flow-teardown events D. all E. none Explanation: After issuing the flow-export destination inside 10.10.10.110 command on […]
Which of the following is a SaaS subscription that can detect real-time threats on the local network?
Which of the following is a SaaS subscription that can detect real-time threats on the local network? A. Cisco Umbrella B. Cisco Stealthwatch Enterprise C. Cisco WSA D. Cisco ESA E. Cisco Stealthwatch Cloud Explanation: Cisco Stealthwatch Cloud is a Software as a Service (SaaS) subscription that can detect real-time threats on the local network. […]
Which of the following statements is true regarding ECC?
Which of the following statements is true regarding ECC? A. ECC is slower than RSA because ECC is an asymmetric encryption method. B. ECC is stronger than RSA because ECC is a symmetric encryption method. C. ECC is faster than RSA because ECC uses prime number factoring. D. ECC is more efficient than RSA because […]
You want to configure a Cisco ASA to send NSEL data for a specific event type to a collector IP address.
You want to configure a Cisco ASA to send NSEL data for a specific event type to a collector IP address. Where should you define the collector IP address to achieve this goal? A. within a service map B. globally with the flow-export destination command C. within a class map D. within a policy map […]
Which of the following is not supported by FlexVPN?
Which of the following is not supported by FlexVPN? A. NHRP B. dynamic routing protocols C. connectivity over public transport networks D. IKEv1 E. connectivity to non-Cisco routers F. IKEv2 Explanation: Internet Key Exchange version 1 (IKEv1) is not supported by FlexVPN. FlexVPN supports only IKE version 2 (IKEv2). By contrast, Dynamic Multipoint Virtual Private […]
You deploy a Cisco NGIPSv device with the included Control license and Protection license.
You deploy a Cisco NGIPSv device with the included Control license and Protection license. Which feature cannot be enabled by this combination of licenses? A. Security Intelligence filtering B. AMP for Networks C. intrusion detection and prevention D. user and application control E. file control Explanation: Cisco Advanced Malware Protection (AMP) for Networks cannot be […]
Which Cisco AMP for Endpoints engine is a complete client-side antivirus solution?
Which Cisco AMP for Endpoints engine is a complete client-side antivirus solution? A. TETRA B. Ethos C. WSA D. Spero Explanation: Of the available choices, only the Cisco Advanced Malware Protection (AMP) for Endpoints TETRA engine is a complete client-side antivirus solution. Cisco AMP is a cloud-based technology that conducts malware analysis that is less […]