Q: 11
What ate two categories of DDoS attacks? (Choose two.)
Options
Discussion
Option B but D also makes sense. Anyone else pick B for scanning?
Its D and E, kinda confused but think that's what my notes say. Can someone confirm?
Be respectful. No spam.
Q: 12
An automotive company provides new types of engines and special brakes for rally sports cars. The
company has a database of inventions and patents for their engines and technical information
Customers can access the database through the company's website after they register and identify
themselves. Which type of protected data is accessed by customers?
Options
Discussion
Not totally sure but pretty sure it's A. Anyone else think so?
Be respectful. No spam.
Q: 13
How is attacking a vulnerability categorized?
Options
Discussion
C matches the exploitation phase. No doubt on this one.
C That's the exploitation phase in the attack lifecycle. Pretty sure that's what Cisco expects here.
Be respectful. No spam.
Q: 14
Which attack method intercepts traffic on a switched network?
Options
Discussion
Is this covered in the official cert guide or better shown in labs? I've seen similar questions in practice exams lately.
Be respectful. No spam.
Q: 15
According to CVSS, what is a description of the attack vector score?
Options
Discussion
Option C fits what I've seen in the official guide. Attack vector in CVSS gives a higher score if the exploit can be done remotely, making it more severe. If you want more examples, check labs or practice questions.
Be respectful. No spam.
Q: 16
What is data encapsulation?
Options
Discussion
C tbh
D imo, unless the keyword is specifically about OSI or protocol headers, then B could be right.
Be respectful. No spam.
Q: 17
What is a benefit of agent-based protection when compared to agentless protection?
Options
Discussion
C tbh, clear question and good focus on endpoint local detection advantage.
Be respectful. No spam.
Q: 18
An engineer must configure network systems to detect command-and-control communications by
decrypting ingress and egress perimeter traffic and allowing network security devices to detect
malicious outbound communications. Which technology must be used to accomplish this task?
Options
Discussion
Not B, C. Saw a similar question on a practice test and certificates are what let perimeter devices decrypt traffic for inspection.
Had something like this in a mock before, it's C. Digital certificates are needed for decryption on perimeter devices so they can scan the traffic. Pretty straightforward if you're familiar with SSL/TLS inspection. Let me know if anyone picked differently.
C
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Official Cisco guides cover how digital certificates enable decryption for inspecting encrypted traffic. Practice labs are helpful to see how this lets network security devices catch command-and-control stuff. Pretty sure C is right, but open for discussion.
Be respectful. No spam.
Q: 19
What is the difference between a threat and a risk?
Options
Discussion
A or D? Saw a similar question in exam reports, pretty sure it's A.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2