- (Exam Topic 3)
What must be enabled to secure SaaS-based applications?
Correct Answer:
C
- (Exam Topic 2)
An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems. The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?
Correct Answer:
C
Reference: https://tools.ietf.org/html/rfc3954
- (Exam Topic 1)
What is a commonality between DMVPN and FlexVPN technologies?
Correct Answer:
D
Reference: https://packetpushers.net/cisco-flexvpn-dmvpn-high-level-design/
- (Exam Topic 3)
Refer to the exhibit.
Consider that any feature of DNS requests, such as the length off the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Correct Answer:
D
- (Exam Topic 1)
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
Correct Answer:
B