In what ways can ACLs protect the data plane? (Choose five)
What does the Cisco AnyConnect Client auto-download check on the target client system? (Choose three)
Which of the following examples of security controls matches the Administrative category of security controls? (Choose two)
Which ESA listener would need to be configured to accept mail from a POP/IMAP system?
Which of the actions are possible using Cisco Configuration Professional Express?
A tunnel has been created and established with a branch office. You need to verify that traffic is traversing the connection. Which command will provide this information?
Which statements describe the functions of the Security Audit feature? (Choose four)
Which option is true of using cryptographic hashes?
Which IDS sensor action will send an ARC response to completely block the attacker's IP address?
What is the purpose of FISMA information security compliance regulation?
Which type of IPS leverages global correlation services?
Which networking technology returns a message to the same direction it was received in, in order to reach the proper destination endpoint?
Which STP attack mitigation features causes an interface to be placed in an errdisabled state if a BPDU is received on that port?
Which feature can you use to place a rate limit on traffic that is handled by a Cisco device's route processor?
Which statements about DHCP snooping are true? (Choose two)
What mode will allow the Cisco ASA to act as an additional hop in the network?
Which command could you use to determine the number TACACS+ authentication attempts that have recently timed out?
Which one of the following statements describes the DoS and DDoS Attacks?
Which two statements describe features of the state table? (Choose two)
Which tasks could you perform by deploying a third party MDM solution with Cisco ISE? (Choose two)
A sensitive document was recently accessed by an unauthorized user. Specifications about a new product were changed to erroneous data. Which security principle violations have occurred in this scenario? (Choose two)
Which two statements accurately describe how ACLs function with Cisco ASA? (Choose two)
Which option correctly defines asymmetric encryption?
Select one of the following statements that describes the password attacks.
You need to implement a solution that allows administrators to perform remote wipes on mobile devices. This solution must also prevent users from connecting to endpoints with jail-broken mobile devices. What should you do?
Which of the following describes the Script kiddies as a category of individuals who attack computer systems and operations?
Which 802.1X component would refer to an endpoint in an 802.1X infrastructure?
What is the purpose of HIPAA information security compliance regulation?
What are some of the security functions that can be managed using Cisco Configuration Professional? (Choose five)
Which assessment should be performed first to determine an organization's ability to defend and respond to network attacks?
What are requirements when integrating Cisco ISE and Active Directory? (Choose two)
What are the steps associated with the Containment, eradication, and recovery incident response phase? (Choose three)
There is currently an issue with some clients establishing an AnyConnect SSL VPN. The affected users differ from time to time. What could help explain this problem?
Attacks may take a variety of forms. Which of the following describes the Enumeration and fingerprinting as a threat category?
Which of the following describes the function of Cisco IPS?
Which options are security services provided by digital signatures? (Choose three)
Which of the following methods describes Network mapping attack?
During which attack phase would an attacker use a provision such as registry edits to keep the malware on the system?
A client needs to telecommute from home to the office, and requires a VPN connection. Only work related traffic should traverse the tunnel, Internet traffic should not. Which technology would allow for this operation?
Which of the following describes the function of Cisco ISR?
A client on your network is seeking advice from you in regards to the type of host-based security for their home network. They state that they have three devices, which share an Internet connection through a single home server. The home server is directly connected to the ISP router. Their main concern is primarily on traffic going through the home server to and from the other three devices. What should you recommend that would require the least amount of administrative overhead and associated set up cost?
Which sensor action will cause an IPS to block the IP address of an attacker for a specified period?
Which of the following actions belong to the Disposition phase of the secure network life cycle? (Choose two)
Select the statements that represent threats to network infrastructure. (Choose four)
Suppose you want to change the minimum password length using the CLI from Cisco Configuration Professional. What should you do first?
Which statement is true when using zone-based firewalls on a Cisco router?
Select one of the following statements that describes the trust exploitation threats.
Which of the following describes the function of Cisco IronPort?
Which threats are the most serious?
Attacks may take a variety of forms. Which of the following describes the Spoofing as a threat category?
A private contractor for the military is archiving medical records. Which classification level should be applied to these?
What can be used to offload the processing of encrypted data? (Choose two)
Which statement about IPS deployments is true?
Which of the following methods describes Man-in-the-middle attack? (Choose two)
A company opens a new mid-sized branch office. Which Cisco ESA models would ideally be deployed to this office? (Choose three)