Exam C Flashcards

1
Q

Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two)

A. NTLMSSP
B. Kerberos
C. CHAP
D. TACACS+
E. RADIUS

A

NTLMSSP

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?

A. Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal.

B. Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal.

C. Send an API request to Cisco Cloudlock from Dropbox admin portal.

D. Add Cisco Cloudlock to the Dropbox admin portal.

A

Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a benefit of using Cisco Umbrella?

A. DNS queries are resolved faster.

B. Attacks can be mitigated before the application connection occurs.

C. Files are scanned for viruses before they are allowed to run.

D. It prevents malicious inbound traffic.

A

Attacks can be mitigated before the application connection occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which security solution is used for posture assessment of the endpoints in a BYOD solution?

A. Cisco FTD
B. Cisco ASA
C. Cisco Umbrella
D. Cisco ISE

A

Cisco ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?

A. supports VMware vMotion on VMware ESXi
B. requires an additional license
C. performs transparent redirection
D. supports SSL decryption

A

supports VMware vMotion on VMware ESXi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are two benefits of using an MDM solution? (Choose two)

A. grants administrators a way to remotely wipe a lost or stolen device

B. provides simple and streamlined login experience for multiple applications and users

C. native integration that helps secure applications across multiple cloud platforms or on-premises environments

D. encrypts data that is stored on endpoints

E. allows for centralized management of endpoint device applications and configurations

A

grants administrators a way to remotely wipe a lost or stolen device

allows for centralized management of endpoint device applications and configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are two benefits of using Cisco Duo as an MFA solution? (Choose two)

A. grants administrators a way to remotely wipe a lost or stolen device

B. provides simple and streamlined login experience for multiple applications and users

C. native integration that helps secure applications across multiple cloud platforms or on-premises environments

D. encrypts data that is stored on endpoints

E. allows for centralized management of endpoint device applications and configurations

A

provides simple and streamlined login experience for multiple applications and users

native integration that helps secure applications across multiple cloud platforms or on-premises environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a benefit of using GET VPN over FlexVPN within a VPN deployment?

A. GET VPN supports Remote Access VPNs
B. GET VPN natively supports MPLS and private IP networks
C. GET VPN uses multiple security associations for connections
D. GET VPN interoperates with non-Cisco devices

A

GET VPN natively supports MPLS and private IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?

A. Cisco Umbrella
B. Cisco AMP for Endpoints
C. Cisco ISE
D. Cisco Stealthwatch

A

Cisco ISE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?

A. NTP
B. syslog
C. SNMP
D. NetFlow

A

NetFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term for the concept of limiting communication between applications or containers on the same node?

A. container orchestration
B. software-defined access
C. microservicing
D. microsegmentation

A

microsegmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a characteristic of an EDR solution and not of an EPP solution?

A. stops all ransomware attacks
B. retrospective analysis
C. decrypts SSL traffic for better visibility
D. performs signature-based detection

A

retrospective analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?

A. hybrid cloud
B. private cloud
C. public cloud
D. community cloud

A

community cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Cisco AMP for Endpoints provide next-generation protection?

A. It encrypts data on user endpoints to protect against ransomware.
B. It leverages an endpoint protection platform and endpoint detection and response.
C. It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers.
D. It integrates with Cisco FTD devices.

A

It leverages an endpoint protection platform and endpoint detection and response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two)

A. Segment different departments to different IP blocks and enable Dynamic ARP inspection on all VLANs

B. Ensure that noncompliant endpoints are segmented off to contain any potential damage.

C. Ensure that a user cannot enter the network of another department.

D. Perform a posture check to allow only network access to those Windows devices that are already patched.

E. Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW.

A

Ensure that noncompliant endpoints are segmented off to contain any potential damage.

Perform a posture check to allow only network access to those Windows devices that are already patched.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two)

A. REST uses methods such as GET, PUT, POST, and DELETE.
B. REST codes can be compiled with any programming language.
C. REST is a Linux platform-based architecture.
D. The POST action replaces existing data at the URL path.
E. REST uses HTTP to send a request to a web service.

A

REST uses methods such as GET, PUT, POST, and DELETE.

REST uses HTTP to send a request to a web service.

17
Q

What is the process In DevSecOps where all changes in the central code repository are merged and synchronized?

A. CD
B. EP
C. CI
D. QA

A

CI

18
Q

Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?

A. Cisco ISE
B. Cisco NAC
C. Cisco TACACS+
D. Cisco WSA

A

Cisco ISE

19
Q

Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?

A. IaC
B. SaaS
C. IaaS
D. PaaS

A

SaaS

20
Q

How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?

A. It deploys an AWS Lambda system
B. It automates resource resizing
C. It optimizes a flow path
D. It sets up a workload forensic score

A

It automates resource resizing

21
Q

Email security has become a high priority task for a security engineer at a large multi- national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco ESA. Which action will the system perform to disable any links in messages that match the filter?

A. Defang
B. Quarantine
C. FilterAction
D. ScreenAction

A

Defang

22
Q

What are two workloaded security models? (Choose two)

A. SaaS
B. IaaS
C. on-premises
D. off-premises
E. PaaS

A

on-premises

off-premises

23
Q

Which API method and required attribute are used to add a device into DNAC with the native API?

A. lastSyncTime and pid
B. POST and name
C. userSudiSerialNos and deviceInfo
D. GET and serialNumber

A

POST and name

24
Q

What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?

A. mobile device management
B. mobile content management
C. mobile application management
D. mobile access management

A

mobile device management

25
Q

What is the most common type of data exfiltration that organizations currently experience?

A. HTTPS file upload site
B. Microsoft Windows network shares
C. SQL database injections
D. encrypted SMTP

A

HTTPS file upload site

26
Q

An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source. Which two steps must be taken to accomplish this task? (Choose two)

A. Specify the NTP version
B. Configure the NTP stratum
C. Set the authentication key
D. Choose the interface for syncing to the NTP server
E. Set the NTP DNS hostname

A

Set the authentication key

Set the NTP DNS hostname

27
Q

Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two)

A. It must include the current date.
B. It must reside in the trusted store of the WSA.
C. It must reside in the trusted store of the endpoint.
D. It must have been signed by an internal CA.
E. It must contain a SAN.

A

It must include the current date.

It must reside in the trusted store of the WSA.