Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
Which security solution is used for posture assessment of the endpoints in a BYOD solution?
An engineer must enable Outbreak Filters globally on an AsyncOS for Cisco Secure Email Gateway to protect the network from large-scale malware attacks. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion
Prevention System?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a
connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
What provides visibility and awareness into what is currently occurring on the network?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
Refer to the exhibit. An engineer must configure a new Cisco ISE backend server as a RADIUS server to provide AAA for all access requests from the client to the ISE-Frontend server.
Which Cisco ISE configuration must be used?
When Cisco and other industry organizations publish and inform users of known security findings and
vulnerabilities, which name is used?