Tag Archives: threat

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

A. real-time threat management to stop DDoS attacks to the core and access networks B. real-time awareness of users, devices, and traffic on the network C. malware control D. dynamic threat control for web traffic Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is provided by the Stealthwatch component of… Read More »

Drag and drop the threat defense solutions from the left onto their descriptions on the right.

Drag and drop the threat defense solutions from the left onto their descriptions on the right. Select and Place: Answer: Explanation:  No answer description available for this question Show AnswerDiscussion The post Drag and drop the threat defense solutions from the left onto their descriptions on the right. appeared first on Majanto.

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

A. Cisco Firepower and FireSIGHT B. Cisco Stealthwatch system C. Advanced Malware Protection D. Cisco Web Security Appliance Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis? appeared first on Majanto.

Which OWASP threat does this example demonstrate?

Refer to the exhibit. Which OWASP threat does this example demonstrate? A. broken access control B. cross-site scripting C. SQL injection D. man-in-the-middle Answer: Option B. Explanation:  Reference: https://owasp.org/www-chapter-coimbatore/assets/files/Web%20Application%20Security%20Adithyan%20AK.pdf Show AnswerDiscussion The post Which OWASP threat does this example demonstrate? appeared first on Majanto.

Which type of threat occurs when an attacker can send hostile data to an interpreter within an application?

A. sensitive data exposure B. broken authentication C. cross-site scripting D. injection Answer: Option D. Explanation:  Reference: https://owasp.org/www-project-top-ten/OWASP_Top_Ten_2017/Top_10-2017_A1-Injection Show AnswerDiscussion The post Which type of threat occurs when an attacker can send hostile data to an interpreter within an application? appeared first on Majanto.

Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right.

DRAG DROP Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. Select and Place: Answer: Explanation:  No answer description available for this question. Show AnswerDiscussion The post Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on… Read More »