Exam A Flashcards
An engineer wants to assign a printer to a different VLAN than it is statically configured on the switch port. Which CoA type should the engineer use?
A. CoA-Terminate
B. No-CoA
C. Port-Bounce
D. CoA-Reauth
Port-Bounce
An administrator needs to be able to have a router securely with a network management system. The connections must be authenticated but not encrypted. While meeting these requirements, which command will create a group that allows a user on the network management system access to the router?
A. snmp-server group v2c
B. snmp-server group v3 priv write
C. snmp-server group v3 auth
D. snmp-server group v2c write
snmp-server group v3 auth
What are two core components of a Cisco Umbrella solution? (Choose two)
A. Cloud container platform
B. DNS layer security
C. Cisco ISE
D. Transport Layer Security
E. Cloud access security broker
DNS layer security
Cloud access security broker
Which solution provides a comprehensive views of internet domains, IP address, and autonomous system to help pinpoint attackers and malicious infrastructures?
A. Cisco Advanced Malware Investigate
B. Cisco Umbrella Investigate
C. Cisco Tetration Cloud
D. Cisco Thread Indication Database
Cisco Umbrella Investigate
A network engineer has been tasked with configuring OSPF neighbor authentication on the WAN router for a branch office. The WAN router connects to the OSPF backbone area via an MPLS circuit that terminates on interface GigabitEthernet 0/0/0. The router id for this router is tied to the loopback0 interface. The password used for neighbor authentication should be encrypted when transmitted over the WAN. Which two IOS commands are required to enable OSPF neighbor authentication on this scenario? (Choose two)
A. ip ospf message-digest-key under the GigabitEthernet0/0/0 interface configuration
B. ip ospf authentication-key under Loopback0 interface configuration
C. service password-encryption under global configuration mode
D. area 0 authentication under the OSPF routing process configuration
E. area 0 authentication message-digest under the OSPF routing process configuration
ip ospf message-digest-key under the GigabitEthernet0/0/0 interface configuration
area 0 authentication message-digest under the OSPF routing process configuration
How can Cisco Tetration connect to something within customer/3rd party network if the customer/3rd party network doesn’t allow incoming connections?
A. Reverse tunnel
B. GRE tunnel
C. Source NAT
D. Destination NAT
Reverse tunnel
Which Cisco security platform is integrated into an organization’s cloud environment on AWS, google cloud, or AZUR to provide agentless visibility across the network by using advance machine learning and behavioral analytics?
A. Cisco ISE cloud
B. Cisco Stealthwatch cloud
C. Cisco ASAv
D. Cisco AMP cloud
Cisco Stealthwatch cloud
An engineer is configuring DHCP snooping on a cisco switch and wants to ensure that a DHCP packet will be dropped. Under which condition this will occur?
A. A packet from a DHCP server is received from inside the network or firewall
B. A packet is received on an untrusted interface and the source MAC Address and the DHCP client hardware address do not match
C. A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is 0.0.0.0
D. All packets are dropped until the administrator manually enters the approved servers into the DHCP snooping database
A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is 0.0.0.0
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. Application settings
B. Destination lists
C. Content categories
D. Security settings
Destination lists
While using Cisco Firepower’s Security Intelligence policies, which two criteria is blocking based upon? (Choose two)
A. IP addresses
B. URLs
C. port numbers
D. protocol IDs
E. MAC addresses
IP addresses
URLs
Which actions configure the IEEE 802.11x Flexible Authentication feature to support Layer 3 authentications mechanisms?
A. Modify the Dot1X configuration on the VPN server to send Layer 3 authentications to an external authentication database.
B. Add MAB into the switch to allow redirection to a Layer 3 device for authentication
C. Identify the devices using this feature and create a policy that allows them to pass Layer2 authentication
D. Configure WebAuth so the hosts are redirected to a web page for authentication
Configure WebAuth so the hosts are redirected to a web page for authentication
Which action adds IOCs to customize detections for a new attack?
A. Upload the IOCs into the installed Endpoint IOC feature within Cisco AMP For Endpoints.
B. Use the initiate Endpoint IOC scan feature to gather the IOC information and push it to the clients.
C. Modify the base policy within Cisco AMP for Endpoints to include simple custom detections.
D. Add a custom Advanced detection to include the IOCs needed within Cisco For endpoints.
Upload the IOCs into the installed Endpoint IOC feature within Cisco AMP For Endpoints.
Which platform besides the Cisco ASA should be deployed to provide content redirection using Direct-To-Tower methods without the need for the customer to send traffic using PAC files or third-party proxies?
A. Cisco ASR
B. Cisco ISR
C. Cisco WSA
D. Cisco CWS
Cisco CWS
An organization is using CSR1000v routers in their private cloud infrastructure. They must upgrade their code to address vulnerabilities within their running code version. Who is responsible for these upgrades?
A. The cloud vendor is responsible for updating all code hosted in the cloud
B. The cloud service provider must be asked perform the upgrade
C. The organization must upgrade the code for the devices they manage
D. The CSR1000v is upgraded automatically as new code becomes available
The organization must upgrade the code for the devices they manage
Which action blocks specific IP address whenever a computer with Cisco AMP for Endpoints installed connects to the network?
A. Create a simple custom detection policy and add the IP address
B. Create an application block list and add the IP address
C. Create an advanced custom detection policy and add the IP address
D. Create an IP Block & Allow list and add the IP address
Create an IP Block & Allow list and add the IP address
A company has an infrastructure ACI policy on its perimeter router that denies RFC1918 address, unused address ranges, any packets that use the IP address range that is assigned to the internal IP infrastructure, and 127.0.0.1. All these rules apply to incoming traffic from the internet. Which two attacks are prevented by using this method? (Choose two)
A. Losing the line protocol keep-alives and routing protocol update
B. Spoofing the IP address of another customer to steal service
C. DoS attack that cause high CPU utilization
D. Gaining of access to network devices using a spoofed address
E. Routing processor resource exhaustion
Spoofing the IP address of another customer to steal service
Gaining of access to network devices using a spoofed address
Which two tasks are required when a decryption policy is implemented on a Cisco WSA? (Choose two)
A. Upload a root certificate and private key
B. Enable HTTPS attack protection
C. Enable real-time revocation status checking
D. Configure invalid certificate handing
E. Enable the HTTPS proxy
Upload a root certificate and private key
Enable the HTTPS proxy
What is a difference between GRE over IPsec and IPsec with crypto map?
A. GRE over IPsec supports non-IP protocols
B. Multicast traffic is supported by IPsec with crypto map
C. GRE provides its own encryption mechanism
D. IPsec with crypto map offers better scalability
GRE over IPsec supports non-IP protocols
Which attack gives unauthorized access to files on the web server?
A. Broadcast storm
B. DHCP snooping
C. Distributed DoS
D. Path transversal
Path transversal
Which VPN provides scalability for organizations with many remote sites?
A. SSL VPN
B. Site-to-site IPsec
C. DMVPN
D. GRE over IPsec
DMVPN
When an assessment of cloud services and applications is conducted, which tool is used to show user activity and data usage across the applications?
A. Cisco ISE
B. Cisco ASA
C. Cisco AMP Private Cloud
D. Cisco Cloudlock
Cisco Cloudlock
What are two examples of code injection vulnerabilities? (Choose two)
A. Session hijacking
B. Cross-site-scripting
C. XML external entity injection
D. Arbitrary command injection
E. SQL injection
Cross-site-scripting
SQL injection
A network engineer must secure a Cisco switch from a MAC address flooding attack by allowing only the MAC address of currently connected PC on port Gi1/0/28. Which Cisco IOS command must be run to check if that MAC address is currently known and is the only MAC address allowed on that port?
A. show port-security
B. show port-security interface GigabitEthernet 1/0/28
C. show port-security address
show port-security interface GigabitEthernet 1/0/28
Which problem is solved by deploying a multicontext firewall?
A. Overlapping IP addressing plan
B. Faster inspection
C. More secure policy
D. Resilient high availability design
Overlapping IP addressing plan
What are two targets in cross-site scripting attacks? (Choose two)
A. Footer
B. Cookie
C. Image
D. Input
E. Header
Cookie
Input
An administrator wants to ensure that the organization’s remote access VPN devices can connect to the VPN without the user logging into the devices. Which action accomplishes this task?
A. Modify the Cisco AnyConnect Client image to start before logon and use the users cached credentials for authentication
B. Change the Cisco AnyConnect Connection Profile to allow for authentication prior to logon and use the user certificate for authentication
C. Configure the Start Before Logon feature in the Cisco AnyConnect Client and use certificate authentication
D. Add the Auto Connect feature in the Cisco AnyConnect Group Policy and use the machine certificate as the authentication indentity
Configure the Start Before Logon feature in the Cisco AnyConnect Client and use certificate authentication
Which API technology with SDN architecture is used to communicate with a controller and network devices such as routers and switches?
A. Northbound APIs
B. Unprotected APIs
C. Southbound APIs
D. Rest APIs
Southbound APIs
Which security mechanism is designed to protect against offline brute-force attacks?
A. Salt
B. CAPTCHA
C. MFA
D. Token
MFA
Which process is used to obtain a certificate from a CA?
A. Enrollment
B. Signing
C. Approval
D. Registration
Enrollment
Which two products are used to forecast capacity needs accurately in real time? (Choose two)
A. Cisco Workload Optimization Manager
B. Cisco Cloudlock
C. Cisco AppDynamics
D. Cisco Umbrella
E. Cisco Tetration
Cisco Workload Optimization Manager
Cisco AppDynamics
Which two algorithms must be used when an engineer is creating a connection that will have classified data across it? (Choose two)
A. SHA-384
B. RC4
C. RSA-3072
D. AES-256
E. ECDSA-256
SHA-384
AES-256
Which common exploit method is TLS 1.3 designed to prevent?
A. Man-in-the-middle attack
B. Cross-site-request forgery
C. Cross-site-scripting
D. Denial-of-service attack
Man-in-the-middle attack
A website administrator wants to prevent SQL injection attacks the company’s customer database, which is referenced by the web server. Which two methods help prevent SQL injection attacks? (Choose two)
A. using load balancers with NAT
B. enforcing TLS 1.3 only
C. using SSL certificates
D. using web application firewalls
E. performing input validation
using web application firewalls
performing input validation
Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco implementation (Choose two)
A. ADC
B. ERSPAN
C. Cisco ASA
D. NetFlow
E. Cisco Secure Workload
ERSPAN
NetFlow
An engineer is configuring a Cisco Cloud Email Security instance to send logs to an external server for auditing. For security purposes, a username and SSH key has been generated on the remote log server that accepts only the SSHv2 protocol. Which log retrieval method must be configured in the log subscription?
A. Syslog push
B. FTP push
C. Manually download
D. SCP push
SCP push
A network Administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants to limit the strain on firewall resources. Which method must be used to send these logs to Cisco Security Analytics and Logging?
A. SFTP using the FMC CLI
B. HTTP POST using the Security Analytics FMC plugin
C. Direct connection using SNMP traps
D. Syslog using the Secure Event Connector
Syslog using the Secure Event Connector
Refer to the exhibit.
*Jul 1 15:33:50.027: ISAKMP: (0):Enqueued KEY_MGR_SESSION_CLOSED for Tunnel0 deletion
*Jul 1 15:33:50.027: ISAKMP: (0):Deleting peer node by peer_reap for 2.2.2.2: D1250B0
*Jul 1 15:33:50.029: ISAKMP: (1001):peer does not do paranoid keepalives.
*Jul 1 15:33:54.781: ISAKMP-PAK: (0) received packet from 2.2.2.2 dport 500 sport 500 Global (N) NEW SA
*Jul 1 15:33:54.781: ISAKMP: (0):Created a peer struct for 2.2.2.2, peer port 500
*Jul 1 15:33:54.781: ISAKMP: (0):New peer created peer = 0x11026528 peer_handle = 0x80000004
*Jul 1 15:33:54.781: ISAKMP: (0):Locking peer struct 0x11026528, refcount 1 for crypto_isakmp_process_block
*Jul 1 15:33:54.782: ISAKMP: (0):local port 500, remote port 500
*Jul 1 15:33:54.782: ISAKMP: (0):Find a dup sa in the avl tree during calling isadb_insert sa = 104E3C68
*Jul 1 15:33:54.782: ISAKMP: (0):Input = IKE_MESG_FROM_PEER, IKE_MM_EXCH
*Jul 1 15:33:54.782: ISAKMP: (0):Old State = IKE_READY New State = IKE_R_MM1
Which command results in these messages when attempting to troubleshoot an IPsec VPN connection?
A. debug crypto ipsec
B. debug crypto isakmp
C. debug crypto isakmp connection
D. debug crypto ipsec endpoint
debug crypto isakmp
What describes the function of the
crypto isakmp key C1$c449400824 address 0.0.0.0 0.0.0.0
command when configuring an IPsec VPN tunnel on a Cisco IOS router?
A. It configures the IP address and subnet mask of the VPN server
B. It allows connections from any hosts using the defined preshared key
C. It defines that all data is going to be encrypted via the VPN
D. It drops spoofed VPN traffic using 0.0.0.0 as the source or destination IP address
It allows connections from any hosts using the defined preshared key
Which two activities are performed using Cisco DNA Center? (Choose two)
A. DNS
B. DHCP
C. design
D. provision
E. accounting
design
provision
What is the ideal deployment mode to use when you need to manage separate security policies for multiple customers on a Cisco ASA device?
A. spanned cluster mode
B. IRB mode
C. VRF mode
D. multiple context mode
multiple context mode
Which algorithm does ISAKMP use to securely derive encryption and integrity keys?
A. AES
B. Diffie-Hellman
C. 3DES
D. RSA
Diffie-Hellman