Exam 37: Implementing Cisco Enterprise Network Core Technologies (ENCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The physical security department received a report that an unauthorized person followed an authorized individual to enter a secured premise. The incident was documented and given to a security specialist to analyze. Which step should be taken at this stage?

(Multiple Choice)
4.8/5
(39)

Refer to the exhibit. For IP 192.168.1.209, what are the risk level, activity, and next step? Refer to the exhibit. For IP 192.168.1.209, what are the risk level, activity, and next step?

(Multiple Choice)
4.9/5
(32)

Which action should be taken when the HTTP response code 301 is received from a web application?

(Multiple Choice)
4.8/5
(38)

What is a principle of Infrastructure as Code?

(Multiple Choice)
4.7/5
(36)

A malware outbreak is detected by the SIEM and is confirmed as a true positive. The incident response team follows the playbook to mitigate the threat. What is the first action for the incident response team?

(Multiple Choice)
4.8/5
(41)

A new malware variant is discovered hidden in pirated software that is distributed on the Internet. Executives have asked for an organizational risk assessment. The security officer is given a list of all assets. According to NIST, which two elements are missing to calculate the risk assessment? (Choose two.)

(Multiple Choice)
4.8/5
(35)
Showing 101 - 106 of 106
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)