Which interface mode does a Cisco Secure IPS device use to block suspicious traffic?
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
Which risk is created when using an Internet browser to access cloud-based service?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
Which feature is configured for managed devices in the device platform settings of the Firepower Management
Center?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the
NTP server and is not filtering any traffic. The show ntp association detail command indicates that the
configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue?
How many interfaces per bridge group does an ASA bridge group deployment support?