00:00

QUESTION 81

- (Exam Topic 1)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)

Correct Answer: CE

QUESTION 82

- (Exam Topic 3)
What is a benefit of using Cisco Tetration?

Correct Answer: C

QUESTION 83

- (Exam Topic 2)
An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?

Correct Answer: A
Reference:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/enterprise-network-security/white-paper

QUESTION 84

- (Exam Topic 2)
What is the role of an endpoint in protecting a user from a phishing attack?

Correct Answer: C

QUESTION 85

- (Exam Topic 1)
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Correct Answer: A
DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNSqueries and responses. DNS tunneling often includes data payloads that can be added to an attacked DNSserver and used to control a remote server and applications.