Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Answer :
user input validation in a web page or web application
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Answer :
exploits
malware
What two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints?
Answer :
exploits
malware
Which threat involves software being used to gain unauthorized access to a computer system?
Answer :
virus
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?
Answer :
RADIUS Change of Authorization
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?
Answer :
Configure the trackingconfig command to enable message tracking
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Answer :
Platform Exchange Grid
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
Answer :
Common Vulnerabilities and Exposures
What is the purpose of the My Devices Portal in a Cisco ISE environment?
Answer :
to register new laptops and mobile devices
Which Dos attack uses fragmented packets to crash a target machine?