<< Prev Question Next Question >>

Question 142/229

Which Cisco ASA SSL VPN feature provides support for PCI compliance by allowing for the validation of two sets of username and password credentials on the SSL VPN login page?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (229q)
Question 1: Which interface on the Cisco Email Security Appliance has HT...
Question 2: Which three user roles are partially defined by default in P...
Question 3: With Cisco ASA active/standby failover, what is needed to en...
Question 4: Which configuration option causes an ASA with IPS module to ...
Question 5: When deploying Cisco FirePOWER appliances, which option must...
Question 6: What can you use to access the Cisco IPS secure command and ...
Question 7: An engineer wants to improve web traffic performance by prox...
Question 8: Refer to the exhibit. What CLI command generated the output?...
Question 9: An engineer is configuring a cisco ESA and wants to control ...
Question 10: After configuring an ISR with the Cisco Cloud Web Security c...
Question 11: Which platform has message tracking enabled by default?...
Question 12: (Exhibit) Refer to the exhibit. Which configuration below wo...
Question 13: Which two options are the basic parts of a Snort rule? (Choo...
Question 14: Which Cisco Security IntelliShield Alert Manager Service com...
Question 15: Which three statements about Cisco ASA CX are true? (Choose ...
Question 16: Elliptic curve cryptography is a stronger more efficient cry...
Question 17: Which three features does Cisco CX provide? (Choose three.)...
Question 18: Which two tasks can the network discovery feature perform? (...
Question 19: Which IPS signature engine inspects the IP protocol packets ...
Question 20: Which two options are characteristics of router-based IPS? (...
Question 21: Which two software can be installed on a Cisco ASA-5545-X ap...
Question 22: Which Cisco technology prevents targeted malware attacks, pr...
Question 23: Which Cisco WSA is intended for deployment in organizations ...
Question 24: Refer to the exhibit. The security engineer has configured c...
Question 25: (Exhibit) Which three statements about the Cisco IPS applian...
Question 26: What is the default antispam policy for positively identifie...
Question 27: Which four methods are used to deploy transparent mode traff...
Question 28: What are three best practices for a Cisco Intrusion Preventi...
Question 29: Which Cisco ESA command is used to edit the ciphers that are...
Question 30: Which is the default IP address and admin port setting for h...
Question 31: Which Cisco IOS command uses the default class map to limit ...
Question 32: A Cisco ASA requires an additional feature license to enable...
Question 33: An engineer is using the policy trace tool to troubleshoot a...
Question 34: Which version of AsyncOS for web is required to deploy the W...
Question 35: Which Cisco Firepower rule action displays a HTTP warning pa...
Question 36: A user wants to deploy your managed device in Layer 3 routed...
Question 37: Which IPS engine detects ARP spoofing?...
Question 38: Which two statements regarding the basic setup of the Cisco ...
Question 39: Which four statements are correct regarding management acces...
Question 40: Which option lists the minimum requirements to deploy a mana...
Question 41: Which Option of SNMPv3 ensure authentication but no encrypti...
Question 42: Which two dynamic routing protocols are supported in Firepow...
Question 43: Which two services must remain as on-premises equipment when...
Question 44: Connections are being denied because of SenderBase Reputatio...
Question 45: Which three functions can Cisco Application Visibility and C...
Question 46: How many interfaces can a Cisco ASA bridge group support and...
Question 47: Which command applies WCCP redirection on the inside interfa...
Question 48: Which statement about the default configuration of an IPS se...
Question 49: In order to set up HTTPS decryption on the Cisco Web Securit...
Question 50: Using the default modular policy framework global configurat...
Question 51: Your corporate finance department purchased a new non-web-ba...
Question 52: Which Cisco Web Security Appliance design requires minimal c...
Question 53: In a Cisco AMP for Networks deployment, which disposition is...
Question 54: On which platforms can you run CWS connector? (choose two)...
Question 55: Which Cisco Web Security Appliance deployment mode requires ...
Question 56: Which option lists the minimum requirements to deploy a mana...
Question 57: Which Cisco technology provides spam filtering and email pro...
Question 58: A security engineer is configuring user identity for the Cis...
Question 59: Which two methods are used to deploy transparent mode traffi...
Question 60: Which IPS signature regular expression CLI command matches a...
Question 61: Which antispam technology assumes that email from server A, ...
Question 62: How does a user access a Cisco Web Security Appliance for in...
Question 63: Where in the Cisco ASA appliance CLI are Active/Active Failo...
Question 64: When a Cisco Email Security Appliance joins a cluster, which...
Question 65: What three alert notification options are available in Cisco...
Question 66: Upon receiving a digital certificate, what are three steps t...
Question 67: Which action cloud reduce the security of the management int...
Question 68: Cisco's ASA CX includes which two URL categories? (Choose tw...
Question 69: Refer to the exhibit. Which four rows exhibit the correct WC...
Question 70: Which settings are required when deploying Cisco IPS in high...
Question 71: An ASA with an IPS module must be configured to drop traffic...
Question 72: Who or what calculates the signature fidelity rating in a Ci...
Question 73: Which command sets the number of packets to log on a Cisco I...
Question 74: An engineer wants to cluster an existing ESA physical applia...
Question 75: What are three benefits of the Cisco AnyConnect Secure Mobil...
Question 76: What CLI command configures IP-based access to restrict GUI ...
Question 77: Which Cisco technology secures the network through malware f...
Question 78: Which CLI command is used to generate firewall debug message...
Question 79: A Cisco Web Security Appliance's policy can provide visibili...
Question 80: Which set of commands changes the FTP client timeout when th...
Question 81: Which Cisco technology is a customizable web-based alerting ...
Question 82: A network engineer can assign IPS event action overrides to ...
Question 83: What can Cisco Prime Security Manager (PRSM) be used to achi...
Question 84: What is the authentication method for an encryption envelope...
Question 85: Joe was asked to secure access to the Cisco Web Security App...
Question 86: With Cisco IDM, which rate limit option specifies the maximu...
Question 87: What is the CLI command to create a new Message Filter in a ...
Question 88: Which option represents the cisco event aggregation product?...
Question 89: Which two commands are used to verify that CWS redirection i...
Question 90: Which Cisco technology combats viruses and malware with viru...
Question 91: When learning accept mode is set to auto, and the action is ...
Question 92: With Cisco AMP for Endpoints on Windows, which three engines...
Question 93: Which five system management protocols are supported by the ...
Question 94: Which statement about the Cisco CWS web filtering policy beh...
Question 95: Which feature of the Cisco Hybrid Email Security services en...
Question 96: What are the initial actions that can be performed on an inc...
Question 97: Which SSL traffic decryption feature is used when decrypting...
Question 98: Which five system management and reporting protocols are sup...
Question 99: Which two GUI options display users' activity in Cisco Web S...
Question 100: Which Cisco ASA platform should be selected if the requireme...
Question 101: Which two authentication options can be leveraged for direct...
Question 102: An engineer is configuring cisco ESA with a multilayer appro...
Question 103: Which two practices are recommended for implementing NIPS at...
Question 104: Which devices support cluster?
Question 105: An engineer must architect an AMP private cloud deployment. ...
Question 106: Which three zones are used for anomaly detection? (Choose th...
Question 107: What command alters the SSL ciphers used by the Cisco Email ...
Question 108: Which two options are features of the Cisco Email Security A...
Question 109: Which Cisco monitoring solution displays information and imp...
Question 110: Which two options are the correct URL and credentials used t...
Question 111: An engineer is configuring AMP for the first time and can't ...
Question 112: Which five system management protocols are supported by the ...
Question 113: Which information does the show scansafe statistics command ...
Question 114: In the Predefined URL Category Filtering configuration page ...
Question 115: To enable the Cisco ASA Host Scan with remediation capabilit...
Question 116: Which type of interface do you configure to receive traffic ...
Question 117: Which two design considerations are required to add the Cisc...
Question 118: Which Cisco AMP file disposition valid?...
Question 119: Which Cisco technology secures the network through malware f...
Question 120: What Event Action in an IPS signature is used to stop an att...
Question 121: Which option describes what occurs with asymmetric routing w...
Question 122: An IPS is configured to fail-closed and you observe that all...
Question 123: Which option describes the role of the Learning Accept Mode ...
Question 124: Which command verifies that CWS redirection is working on a ...
Question 125: Which command is used on the cisco firepower threat defense ...
Question 126: A network security design engineer is considering using a Ci...
Question 127: Which three options are IPS signature classifications? (Choo...
Question 128: How are HTTP requests handled by the Cisco WSA?...
Question 129: Which statement about the Cisco ASA botnet traffic filter is...
Question 130: Which command establishes a virtual console session to a CX ...
Question 131: What is the default CX Management 0/0 IP address on a Cisco ...
Question 132: What is the default IP range of the external zone?...
Question 133: The security team needs to limit the number of e-mails they ...
Question 134: A Cisco AnyConnect user profile can be pushed to the PC of a...
Question 135: By default, which access rule is applied inbound to the insi...
Question 136: Which command is used to enable strong ciphers on the Cisco ...
Question 137: An engineer wants to configure a method to verify the authen...
Question 138: Which Cisco AMP for Endpoints, what is meant by simple custo...
Question 139: Which two benefits are provided by the dynamic dashboard in ...
Question 140: With Cisco FirePOWER Threat Defense software, which interfac...
Question 141: What is the access-list command on a Cisco IPS appliance use...
Question 142: Which Cisco ASA SSL VPN feature provides support for PCI com...
Question 143: Refer to the exhibit. The system administrator of mydomain.c...
Question 144: Which three search parameters are supported by the Email Sec...
Question 145: (Exhibit) What is the status of OS Identification?...
Question 146: In cisco firePOWER 5.x and 6.0, which type of traffic causes...
Question 147: Which statement about the Cisco ASA CX role in inspecting SS...
Question 148: A Cisco Email Security Appliance uses which message filter t...
Question 149: (Exhibit) To what extent will the Cisco IPS sensor contribut...
Question 150: Which four parameters must be defined in an ISAKMP policy wh...
Question 151: A new Cisco IPS device has been placed on the network withou...
Question 152: The Web Security Appliance has identities defined for facult...
Question 153: Which three statements concerning keystroke logger detection...
Question 154: Which two statements about Cisco Cloud Web Security function...
Question 155: Which Cisco WSA is intended for deployment in organizations ...
Question 156: In the cisco email security appliance, which tool be used to...
Question 157: For which task can PRSM be used?...
Question 158: Which four advanced endpoint assessment statements are corre...
Question 159: During initial configuration, the Cisco ASA can be configure...
Question 160: Which three options are characteristics of router-based IPS?...
Question 161: Which three webtype ACL statements are correct? (Choose thre...
Question 162: A network engineer may use which three types of certificates...
Question 163: Refer to the exhibit. When designing the network to redirect...
Question 164: What is the default antispam policy for positively identifie...
Question 165: Which three zones are used for anomaly detection in a Cisco ...
Question 166: Who or what calculates the signature fidelity rating?...
Question 167: Which command verifies that the correct CWS license key info...
Question 168: Which two configuration steps are required for implementing ...
Question 169: Which description of an advantage of utilizing IPS virtual s...
Question 170: Which two routing options are valid with cisco firePOWER thr...
Question 171: Which Cisco technology is a modular security service that co...
Question 172: Which two commands are valid URL filtering commands? (Choose...
Question 173: Which Cisco ASA object group type offers the most flexibilit...
Question 174: Access the configuration of the Cisco Email Security Applian...
Question 175: You ran the ssh generate-key command on the Cisco IPS and no...
Question 176: (Exhibit) Which signature definition is virtual sensor 0 ass...
Question 177: Which two statement about Cisco Firepower file and intrusion...
Question 178: Cisco AVC allows control of which three of the following? (C...
Question 179: Which policy must you edit to make changes to the Snort prep...
Question 180: Which two types of digital certificate enrollment processes ...
Question 181: Which step is required when you configure URL filtering to C...
Question 182: An engineer is configuring a Cisco Email Security Appliance ...
Question 183: Which two ports does the ISR G2 connector for CWS support re...
Question 184: When attempting to tunnel FTP traffic through a stateful fir...
Question 185: What are two benefits of using SPAN with promiscuous mode de...
Question 186: What step is required to enable HTTPS Proxy on the Cisco Web...
Question 187: Which three statements about threat ratings are true? (Choos...
Question 188: Which statement about Cisco IPS Manager Express is true?...
Question 189: Which two TCP ports can allow the Cisco Firepower Management...
Question 190: A network engineer wants to deploy a virtual cisco ESA and w...
Question 191: A user is deploying a Cisco IPS appliance in a data center t...
Question 192: Which port is used for CLI Secure shell access?...
Question 193: A network administrator noticed all traffic that is redirect...
Question 194: A customer is concerned with their employee`s internet usage...
Question 195: What is the function of the Web Proxy Auto Discovery protoco...
Question 196: The helpdesk was asked to provide a record of delivery for a...
Question 197: When centralized message tracking is enabled on the Cisco ES...
Question 198: (Exhibit) What action will the sensor take regarding IP addr...
Question 199: (Exhibit) Which two statements about Signature 1104 are true...
Question 200: When https traffic is scanned, which component of the full U...
Question 201: Which signature engine is responsible for ICMP inspection on...
Question 202: Which two Cisco IPS events will generate an IP log? (Choose ...
Question 203: After adding a remote-access IPsec tunnel via the VPN wizard...
Question 204: Which command allows the administrator to access the Cisco W...
Question 205: When using Cisco AMP for Networks, which feature copies a fi...
Question 206: When does the Cisco ASA send traffic to the Cisco ASA IPS mo...
Question 207: Using the Cisco WSA GUI, where should an operator navigate t...
Question 208: At which value do custom signatures begin?...
Question 209: Which three functions can Cisco Application Visibility and C...
Question 210: In cisco Firepower 6.0, which policy contains the button tha...
Question 211: Which information does whoami command display in a WSA?...
Question 212: An engineering team has implemented Transparent User Identif...
Question 213: Which statement about Cisco ASA multicast routing support is...
Question 214: Within Cisco IPS anomaly detection, what is the default IP r...
Question 215: Which three access control actions permit traffic to pass th...
Question 216: Which three options are valid event actions for a Cisco IPS?...
Question 217: Which action is possible when a signature is triggered on th...
Question 218: What is the correct deployment for an IPS appliance in a net...
Question 219: An engineer manages a Cisco Intrusion Prevention System via ...
Question 220: Which technique is deployed to harden network devices?...
Question 221: Which commands are required to configure SSH on router? (Cho...
Question 222: An engineer must deploy AMP with cloud protection. Which mac...
Question 223: Remote clients have reported application slowness. The remot...
Question 224: Refer to the exhibit. The system administrator of mydomain.c...
Question 225: Which Cisco IPS CLI command shows the most fired signature?...
Question 226: When creating an SSL policy on Cisco FirePOWER, which three ...
Question 227: Refer to the exhibit. What Cisco ESA CLI command generated t...
Question 228: Which statement regarding hashing is correct?...
Question 229: What does the anomaly detection Cisco IOS IPS component dete...