1.
Which of the following is an open framework used to guide an organization in making software security decisions that are in alignment with the organization's risk profile? (Select the best answer.)
2.
Which of the following attacks involves overwhelming a switch's CAM table? (Select the best answer.)
3.
Which of the following statements are true regarding a ZFW? (Select 2 choices.)
4.
Which of the following is true regarding loop guard? (Select the best answer.)
5.
Which of the following statements is true regarding the SA lifetime specified in a matching IKE policy? (Select the best answer.)
6.
Implementing which of the following features provides a cloudbased subscription method of URL filtering that can be used with Cisco's ZFW? (Select the best answer.)
7.
Which of the following statements is true regarding traditional stateful packetfiltering firewalls? (Select the best answer.)
8.
You are analyzing recent intrusion events in FireSIGHT Defense Center and notice several events with blue icons.
To which of the following vulnerability classifications do the blue icons correspond? (Select the best answer.)
9.
Which of the following SNMP actions are used by an NMS to extract information from an SNMP agent? (Select 2 choices.)
10.
Which of the following statements is true regarding stateful firewalls? (Select the best answer.)