Which of the following is not an example of a knowledge factor in an MFA environment?
Which of the following is not an example of a knowledge factor in an MFA environment? A. your workstation’s location B. a PIN C. a password D. your mother’s maiden name Explanation: Your workstation’s location is an example of a location-based factor, not a knowledge factor, in a multifactor authentication (MFA) environment. Three authentication factors […]
You want to use an RSA SecureID identity store to access Cisco ISE administratively.
You want to use an RSA SecureID identity store to access Cisco ISE administratively. Which of the following will you configure? A. external authentication and internal authorization B. internal authentication and external authorization C. internal authentication and authorization D. external authentication and authorization Explanation: You will configure external authentication and internal authorization for Cisco Identity […]
Which of the following best describes interpacket variation data that is collected by Cisco Tetration Analytic
Which of the following best describes interpacket variation data that is collected by Cisco Tetration Analytics? A. It includes variation in buffer utilization and is derived outside the packet header. B. It contains information about endpoints, when a flow started, and the length of a flow. C. It provides application visibility and generates microsegmentation policy. […]
Which of the following is used to describe a method of transferring traffic by using legitimate communication
Which of the following is used to describe a method of transferring traffic by using legitimate communication channels? A. an open channel B. an overt channel C. a covert channel D. a back door channel Explanation: An overt channel is a method of sending traffic by using legitimate communication channels. An overt channel is a […]
Which of the following statements is accurate about the Optimized web proxy cache mode on a Cisco WSA?
Which of the following statements is accurate about the Optimized web proxy cache mode on a Cisco WSA? A. It caches negative responses. B. It performs the least caching of all the modes. C. It allows customization of caching parameters. D. It performs the most caching of all the modes. Explanation: The Optimized web proxy […]
Which of the following Cisco Cloudlock custom policy categories monitors content based on a regular expression
Which of the following Cisco Cloudlock custom policy categories monitors content based on a regular expression that is created by an administrator? A. Custom Regex B. Event Analysis C. Context-Only D. Salesforce Report Export Activity Explanation: Of the available choices, the Cisco Cloudlock Custom Regex custom policy category monitors content based on a regular expression […]
Which of the following is a cloud computing deployment model that shares infrastructure with multiple organiza
Which of the following is a cloud computing deployment model that shares infrastructure with multiple organizations that have common needs? A. private B. community C. hybrid D. public Explanation: Community is a cloud computing deployment model that shares infrastructure with multiple organizations that have common needs. Hybrid can use a mixture of public and private […]
You are configuring a bridge group on a Cisco ASA device that is operating in routed mode.
You are configuring a bridge group on a Cisco ASA device that is operating in routed mode. Which of the following is true? A. The ASA device supports a maximum of four bridge groups. B. The BVI IP address can be on a separate subnet from the group members. C. The bridge group can contain […]
You are configuring the Cisco AppDynamics Monitoring Extension for use with AWS EC2.
You are configuring the Cisco AppDynamics Monitoring Extension for use with AWS EC2. You want to run the extension inside an EC2 instance that uses an IAM profile. You have already configured a Machine Agent and installed the extension. Now, you are editing the config.yaml file in order to connect the extension to the EC2 […]
Which solution integrates with Cisco Umbrella to provide file reputation services?
Which solution integrates with Cisco Umbrella to provide file reputation services? A. AnyConnect B. AMP C. SafeSearch D. OpenDNS E. Talos Explanation: Advanced Malware Protection (AMP) integrates with Cisco Umbrella to provide file reputation services as well as file sandboxing and retrospective file analysis. The file reputation service that is used by AMP attempts to […]