What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
Question 42
What is a function of 3DES in reference to cryptography?
Question 43
Which two activities can be done using Cisco DNA Center? (Choose two.)
Question 44
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Question 45
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Question 46
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
Question 47
What is the function of SDN southbound API protocols?
Question 48
DRAG DROP -Drag and drop the threats from the left onto examples of that threat on the right.Select and Place:
Question 49
What is the difference between Cross-site Scripting and SQL Injection attacks?
Question 50
DRAG DROP -Drag and drop the common security threats from the left onto the definitions on the right.Select and Place: