Cisco Exam Answers
Cisco Exam Answers
Cisco Exam Answers
DDoS
Patient records
DDoS
9. What are the two goals of ensuring data integrity? (Choose two
options).
11. What actions will an IDS take when detecting malicious traffic?
Confidentiality
15. Which stage of the kill chain used by attackers focuses on target
identification and selection?
Recognition
TRUE
17. What is the primary function of the Cisco Security Incident
Response Team?
Speech recognition
Fingerprints
Trap (honeypot)
20. What technology creates a security token that allows a user to log
in to a desired web application using credentials from a social
network?
Open Authorization
21. Which two tools used for incident detection can be used to detect
anomalous behavior, command and control traffic, and infected hosts?
(Choose two options).
NetFlow