- (Exam Topic 1)
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Correct Answer:
B
- (Exam Topic 1)
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
Correct Answer:
B
- (Exam Topic 2)
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?
Correct Answer:
D
- (Exam Topic 1)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
Correct Answer:
DE
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputablesource. It is usually done through email. The goal is to steal sensitive data like credit card and login information,or to install malware on the victim’s machine.
- (Exam Topic 2)
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two)
Correct Answer:
AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-configguide-v623/secu