which five are supported by the Cisco Secure Desktop ?
Look at the following Cisco ASA SSL VPN pre-login checks carefully, which five are supported by
the Cisco Secure Desktop ?(Not all the checks are required.)
1. Register check
2. File check
3. Antivirus check
4. Antispam check
5. Personal firewall check
6. Certificate check
7. Windows version check
which alternative Cisco IOS method is available if GRE-over-IPsec tunnels could not be used?
While performing point-to-point secure WAN solutions over the Internet, which alternative Cisco
IOS method is available if GRE-over-IPsec tunnels could not be used?
Which one of the following methods can be used to scale Cisco Security MARS deployments?
Which one of the following methods can be used to scale Cisco Security MARS deployments?
Which functionality can be used by the Cisco Security MARS security appliance to achieve events aggregation?
Which functionality can be used by the Cisco Security MARS security appliance to achieve
events aggregation?
Which primary security design components should be addressed while performing EnterpriseInternet Access protec
Which primary security design components should be addressed while performing
EnterpriseInternet Access protection?(Not all design components are required.)
1. resource separation
2. network infrastructure device hardening
3. network signaling protection
4. boundary access control
5. compliance assessment
6. endpoint protection
Which items are the most common methods used for managing risk?
Which items are the most common methods used for managing risk?
Which option is correct about the relationship between the malware type and its description?
Which option is correct about the relationship between the malware type and its description?
1. virus
2. worms
3. botnets
4. spyware
5. Trojan horses
6. rootkits
a. collection of compromised computers under a common command-and-control infrastructure
b. typically used to monitor user actions
c. autonomously spreads to other systems without user interaction
d. malware that hides through evasion of the operating system security mechanisms
e. requires some user action to infect the system
f. malware that hides inside anoter legitimate looking application
Which item is correct about the relationship between the security risk management related term and its proper
Which item is correct about the relationship between the security risk management related term
and its proper definition?
1.asset
2.threat
3.vulnerability
4.risk
a. anything that has value to an organization
b. A weakness in a system or its design that could be exploited
c. The likelihood of a particular attack occurring and resulting in an undesirable consequence
d. Any circumstance or event with the potential to cause harm to an information system
Which function can be implemented by the Cisco Security Agent data access control feature?
Which function can be implemented by the Cisco Security Agent data access control feature?
Which series of steps correctly describes how a challenge-and-response authentication protocol functions?
Which series of steps correctly describes how a challenge-and-response authentication protocol
functions?