Exam B Flashcards
DoS attacks are categorized as what?
A. phishing attacks
B. flood attacks
C. virus attacks
D. trojan attacks
flood attacks
Which Cisco solution integrates Encrypted Traffic Analytics to perform enhanced visibility, promote compliance, shorten response times, and provide administrators with the information needed to provide educated and automated decisions to secure the environment?
A. Cisco SDN
B. Cisco ISE
C. Cisco Security Compliance Solution
D. Cisco DNA Center
Cisco DNA Center
Which Cisco security solution stops exfiltration using HTTPS?
A. Cisco CTA
B. Cisco AnyConnect
C. Cisco FTD
D. Cisco ASA
Cisco CTA
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
A. The Umbrella Roaming client stops and tracks malicious activity on hosts, and AMP for Endpoints tracks only URL-based threats.
B. The Umbrella Roaming Client authenticates users and provides segmentation, and AMP for Endpoints allows only for VPN connectivity
C. AMP for Endpoints authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.
D. AMP for Endpoints stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.
AMP for Endpoints stops and tracks malicious activity on hosts
What is a benefit of flexible NetFlow records?
A. They have customized traffic identification
B. They are used for accounting
C. They monitor a packet from Layer 2 to Layer 5
D. They are used for security
They have customized traffic identification
An engineer recently completed the system setup on a Cisco WSA. Which URL information does the system send to SensorBase Network servers?
A. Summarized server-name information and MD5-hashed path information
B. none because SensorBase Network Participation is disabled by default
C. URL information collected from clients that connect to the Cisco WSA using Cisco AnyConnect
D. complete URL, without obfuscating the path segments
complete URL
What is the purpose of the Cisco Endpoint IoC feature?
A. It is an incident response tool
B. It provides precompromise detection
C. It is a signature-based engine
D. It provides stealth threat prevention
It is an incident response tool
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
A. api/v1/fie/config
B. api/v1/onboarding/workflow
C. api/v1/onboarding/pnp-device
D. api/v1/onboarding/pnp-device/import
api/v1/onboarding/pnp-device/import
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
A. a malware spreading across the user device
B. an infection spreading across the network
C. an infection spreading across the LDAP or Active Directory domain from a user account
D. a malware spreading across the LDAP or Active Directory domain from a user account
a malware spreading across the user device
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file. What type of Outbreak Control list must the SHA-256 hash value for the file be added to in order to accomplish this?
A. Advanced Custom Detection
B. Blocked Application
C. Simple Custom Detection
D. Isolation
Blocked Application
Which feature does the IaaS model provide?
A. granular control of data
B. software-defined network segmentation
C. dedicated, restricted workstations
D. automatic updates and patching of software
dedicated
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
A. VMware APIC
B. VMware vRealize
C. VMware fusion
D. VMware horizons
VMware vRealize
Which two capabilities does an MDM provide? (Choose two)
A. delivery of network malware reports to an inbox in a schedule
B. unified management of mobile devices, Macs, and PCs from a centralized dashboard
C. enforcement of device security policies from a centralized dashboard
D. manual identification and classification of client devices
E. unified management of Android and Apple devices from a centralized dashboard
unified management of mobile devices, Macs, and PCs from a centralized dashboard
enforcement of device security policies from a centralized dashboard
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two)
A. Use intrusion prevention system.
B. Block all TXT DNS records.
C. Enforce security over port 53.
D. Use next generation firewalls.
E. Use Cisco Umbrella.
Enforce security over port 53.
Use Cisco Umbrella.
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two)
A. It prevents use of compromised accounts and social engineering.
B. It prevents all zero-day attacks coming from the Internet.
C. It automatically removes malicious emails from users’ inbox.
D. It prevents trojan horse malware using sensors.
E. It secures all passwords that are shared in video conferences.
It prevents all zero-day attacks coming from the Internet.
It automatically removes malicious emails from users’ inbox.
Which capability is provided by application visibility and control?
A. reputation filtering
B. data obfuscation
C. data encryption
D. deep packet inspection
deep packet inspection
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
A. EAPOL
B. SSH
C. RADIUS
D. TACACS+
TACACS+
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
A. CDP
B. NTP
C. syslog
D. DNS
NTP
What is the difference between EPP and EDR?
A. EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.
B. Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.
C. EDR focuses solely on prevention at the perimeter.
D. Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.
Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
A. ntp server 192.168.1.110 key 1 prefer
B. ntp peer 192.168.1.110 prefer key 1
C. ntp server 192.168.1.110 primary key 1
D. ntp peer 192.168.1.110 key 1 primary
ntp server 192.168.1.110 key 1 prefer
Which algorithm is an NGE hash function?
A. HMAC
B. SHA-1
C. MD5
D. SHA-2
SHA-2
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
A. file prevalence
B. file discovery
C. file conviction
D. file manager
file prevalence
```During a recent security audit, a Cisco IOS router with a working IPSEC configuration using IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command. The VPN peer is a SOHO router with a dynamically assigned IP address. Dynamic DNS has been configured on the SOHO router to map the dynamic IP address to the host name of vpn.sohoroutercompany.com. In addition to the command crypto isakmp key Cisc123456789 hostname vpn.sohoroutercompany.com, what other two commands are now required on the Cisco IOS router for the VPN to continue to function after the wildcard command is removed? (Choose two)
A. ip host vpn.sohoroutercompany.com <VPN>
B. crypto isakmp identity hostname
C. Add the dynamic keyword to the existing crypto map command
D. fqdn vpn.sohoroutercompany.com <VPN>
E. ip name-server <DNS>```</DNS></VPN></VPN>
```ip host vpn.sohoroutercompany.com <VPN></VPN>
crypto isakmp identity hostname```
Which command is used to log all events to a destination collector 209.165.201.10?
A. CiscoASA(config-pmap-c)# flow-export event-type all destination 209.165.201.10
B. CiscoASA(config-cmap)# flow-export event-type flow-update destination 209.165.201.10
C. CiscoASA(config-pmap-c)# flow-export event-type flow-update destination 209.165.201.10
D. CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.10
CiscoASA(config-pmap-c)# flow-export event-type all destination 209.165.201.10
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two)
A. using Cisco ISE
B. using Cisco FTD
C. using an inline IPS/IDS in the network
D. using Cisco ESA
E. using Cisco Umbrella
using Cisco ESA
using Cisco Umbrella
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
A. CoA request
B. AAA attributes
C. carrier-grade NAT
D. AV pair
CoA request