Which Cisco software agent uses content scanning to identify sensitive content and controls
Which Cisco software agent uses content scanning to identify sensitive content and controls the transfer of sensitive content off the local endpoint over removable storage, locally or network- attached hardware, or network applications?
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco IronPort S-Series web security appliances to localize web traffic patterns in the network and to enable the local fulfillment of content requests?
Which two methods do the routers at the regional office, branch office, and telecommuter location use to preve
Refer to the exhibit. A distributed DoS attack has been detected. The attack appears to have sources from many hosts in network X/24. An operator in the network operation center is notified of this attack and must take preventive action. To block all offending traffic, the network operator announces a BGP route, with the next-hop attribute of 172.31.1.1, for the X/24 network of the attacker.
Which two methods do the routers at the regional office, branch office, and telecommuter location use to prevent traffic going to and from the attacker? (Choose two.)
Which three statements about the exhibit are true?
Refer to the exhibit. Which three statements about the exhibit are true?
(Choose three)
Which diagram shows a correctly configured network for a transparent firewall?
Refer to the exhibit. Which diagram shows a correctly configured network for a transparent firewall?
what traffic will be logged to the AAA server?
Refer to the exhibit. Given the configuration that is shown, what traffic will be logged to the AAA server?
Which two statements provide the correct information for the fields that they reference?
Refer to the exhibit. Assume that you want to configure the Cisco VPN client so that it can make remote access VPN connections to a Cisco ASA adaptive security appliance using a preshared key. Which two statements provide the correct information for the fields that they reference? (Choose two.)
Which two mistakes did the administrator make?
Refer to the exhibit. The security policy for XYZ Corporation allows only the following traffic through the corporate adaptive security appliance:
–outbound NTP traffic from the inside network to any outside destination
–FTP traffic from the inside network to the FTP server on the DMZ
–outbound HTTP traffic from the inside network to any outside destination
–FTP traffic from the outside 192.168.6.0/24 network to the FTP server on the DMZ
–any HTTP traffic from the outside to the web server on the DMZ
The network administrator configured access rules to meet the requirements of the security policy but made two mistakes. Which two mistakes did the administrator make? (Choose two.)
Which two statements about these interfaces are true?
Refer to the exhibit. The Cisco ASA adaptive security appliance is using software version 8.0 with the default configuration. The interfaces that are shown in the exhibit are configured with the security levels that are shown, and they are enableD. Management-only mode is disabled on m0/0. Which two statements about these interfaces are true? (Choose two.)
Which task or set of tasks will accomplish this?
Refer to the exhibit. The network administrator for this site wants to enable hosts on DMZ1 to make
HTTP connections to host 172.25.3.8. Which task or set of tasks will accomplish this?