You create a policy in Cisco Umbrella and use the default log settings.
You create a policy in Cisco Umbrella and use the default log settings. Which of the following statements are correct? (Choose two.) A. Only security events are logged. B. Activity logs are not stored. C. Activity logs are saved to an AWS S3 bucket managed by Cisco. D. No requests are logged. E. Activity logs […]
Which of the following policies on a Cisco Firepower NGIPS can provide a centralized source of information reg
Which of the following policies on a Cisco Firepower NGIPS can provide a centralized source of information regarding the status of registered devices? A. network discovery B. intrusion C. health D. network analysis Explanation: On a Cisco Firepower Next-Generation Intrusion Prevention System (NGIPS), a health policy can provide a centralized source of information regarding the […]
Which of the following statements are true regarding TACACS+? (Choose two.)
Which of the following statements are true regarding TACACS+? (Choose two.) A. It combines authorization and authentication functions. B. It encrypts the entire body of a packet. C. It provides router command authorization capabilities. D. It uses UDP for packet delivery. E. It was developed as an IETF-standard protocol. Explanation: Terminal Access Controller Access-Control System […]
Which of the following statements about Cisco ISE Guest and Web Authentication Services central web authentica
Which of the following statements about Cisco ISE Guest and Web Authentication Services central web authentication are true? A. It applies exclusively to wireless clients. B. It applies to all Guest portals. C. It applies only to Credentialed Guest portals. D. It applies exclusively to wired clients. Explanation: Cisco Identity Services Engine (ISE) Guest and […]