Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?

(Multiple Choice)
4.8/5
(36)

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

(Multiple Choice)
4.9/5
(31)

How many interfaces per bridge group does an ASA bridge group deployment support?

(Multiple Choice)
4.7/5
(40)

  Refer to the exhibit. What does the API do when connected to a Cisco security appliance? Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

(Multiple Choice)
4.7/5
(37)

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

(Multiple Choice)
4.8/5
(28)

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?

(Multiple Choice)
4.7/5
(41)

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?

(Multiple Choice)
4.8/5
(34)

What is the difference between Cross-site Scripting and SQL Injection attacks?

(Multiple Choice)
4.8/5
(40)

What is an attribute of the DevSecOps process?

(Multiple Choice)
4.9/5
(29)

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

(Multiple Choice)
4.8/5
(35)

Which information is required when adding a device to Firepower Management Center?

(Multiple Choice)
4.8/5
(42)

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

(Multiple Choice)
4.8/5
(45)

What is a benefit of using Cisco FMC over Cisco ASDM?

(Multiple Choice)
4.8/5
(30)

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)

(Multiple Choice)
4.8/5
(40)

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

(Multiple Choice)
4.9/5
(36)

Which type of attack is social engineering?

(Multiple Choice)
4.8/5
(32)

What is a characteristic of Cisco ASA NetFlow v9 Secure Event Logging?

(Multiple Choice)
4.8/5
(37)

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?

(Multiple Choice)
4.7/5
(34)

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

(Multiple Choice)
4.8/5
(38)

What is the function of the Context Directory Agent?

(Multiple Choice)
4.8/5
(40)
Showing 181 - 200 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)