Which of the following is an example of a SQL injection attack?
Which of the following is an example of a SQL injection attack? A. an attacker exploits a vulnerability in a webpage to send SQL code to the database instead of a password B. an attacker installs a database on a corporate network to store user names and passwords C. an attacker attempts to gain access […]
Which of the following attacks can be mitigated by encoding or escaping output and by validating or sanitizing
Which of the following attacks can be mitigated by encoding or escaping output and by validating or sanitizing user input? A. XSS attacks B. rootkit attacks C. DDoS attacks D. phishing attacks Explanation: Cross-site scripting (XSS) attacks can be mitigated by encoding or escaping output and by validating or sanitizing user input. XSS attacks are […]
Which of the following APIs enable communication between the SDN controller and devices in the data plane?
Which of the following APIs enable communication between the SDN controller and devices in the data plane? A. northbound APIs B. westbound APIs C. eastbound APIs D. southbound APIs Explanation: Southbound Application Programming Interfaces (APIs) enable communication between the Software-Defined Networking (SDN) controller and devices in the data plane. An SDN controller primarily uses two […]
Which of the following statements is true regarding the aaa new-model command?
Which of the following statements is true regarding the aaa new-model command? A. The aaa new-model command must be issued after enabling AAA authentication on a router. B. The aaa new-model command has been deprecated in Cisco IOS versions 12.3 and later. C. The aaa new-model command configures AAA to work only with TACACS+ servers. […]
Which of the following statements is true regarding stateful failover for IPSec?
Which of the following statements is true regarding stateful failover for IPSec? A. RRI cannot be used with stateful failover for IPSec. B. HSRP cannot be used with stateful failover for IPSec. C. The active and standby devices in a stateful failover configuration must be identical devices and must run identical IOS software versions. D. […]
Which of the following is a project management concept in which software developers merge code changes into a
Which of the following is a project management concept in which software developers merge code changes into a central repository multiple times a day? A. CD B. CI C. DevSecOps D. DevOps Explanation: Continuous Integration (CI) is a project management concept in which software developers merge code changes into a central repository multiple times per […]
Which of the following statements best describes the service that a customer might purchase for cloud-based ap
Which of the following statements best describes the service that a customer might purchase for cloud-based application development from a PaaS provider? A. The customer purchases virtual storage from a provider on which to store source code. B. The customer rents software from the provider and does not need to develop applications. C. The customer […]
Which of the following types of authentication is represented by using a four-digit PIN to access a mobile dev
Which of the following types of authentication is represented by using a four-digit PIN to access a mobile device? A. multifactor B. FIM C. mutual D. single-factor Explanation: Single-factor authentication is represented by using a four-digit personal identification number (PIN) to access a mobile device. Single-factor authentication occurs when a single type of information is […]
You have implemented a modern version of Cisco pxGrid to share data between heterogenous security products on
You have implemented a modern version of Cisco pxGrid to share data between heterogenous security products on your company’s network. Which of the following data formats will pxGrid use to share the data? A. SGML B. XML C. JSON D. HTML Explanation: Cisco Platform Exchange Grid (pxGrid) will use JavaScript Object Notation (JSON) to share […]
Which of the following best describes an MTA?
Which of the following best describes an MTA? A. a list of recipients for which email will be accepted B. a component that accepts email messages from a MUA C. an email server D. a list of rules that control which senders can connect to a listener E. an email client F. a component that […]