Question 386

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA.
Which Cisco ASA command must be used?
  • Question 387

    What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
  • Question 388

    Refer to the exhibit.

    Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
  • Question 389

    An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
  • Question 390

    How is DNS tunneling used to exfiltrate data out of a corporate network?