Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
Which SNMPv3 configuration must be used to support the strongest security possible?
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current
encryption technology?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
Which risk is created when using an Internet browser to access cloud-based service?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?