Exam D Flashcards
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two)
A. Create NTLM or Kerberos authentication realm and enable transparent user identification
B. The eDirectory client must be installed on each client workstation
C. Deploy a separate eDirectory server; the client IP address is recorded in this server
D. Create an LDAP authentication realm and disable transparent user identification
E. Deploy a separate Active Directory agent such as Cisco Context Directory Agent
Create NTLM or Kerberos authentication realm and enable transparent user identification
Deploy a separate Active Directory agent such as Cisco Context Directory Agent
Which MDM configuration provides scalability?
A. BYOD support without extra appliance or licenses
B. enabling use of device features such as camera use
C. pushing WPA2-Enterprise settings automatically to devices
D. automatic device classification with level 7 fingerprinting
pushing WPA2-Enterprise settings automatically to devices
```An engineer is configuring device-hardening on a router in order to prevent credentials from being seen if the router configuration was compromised. Which command should be used?
A. username < username> password
B. username privilege 15 password
C. service password-recovery
D. service password-encryption```
service password-encryption
What are two security benefits of an MDM deployment? (Choose two)
A. distributed software upgrade
B. robust security policy enforcement
C. on-device content management
D. privacy control checks
E. distributed dashboard
robust security policy enforcement
on-device content management
Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?
A. Cisco Advanced Malware Protection
B. Cisco Stealthwatch
C. Cisco Identity Services Engine
D. Cisco AnyConnect
Cisco Stealthwatch
A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two)
A. RADIUS communication must be permitted between the ISE server and the domain controller
B. The ISE account must be a domain administrator in Active Directory to perform JOIN operations
C. Active Directory only supports user authentication by using MSCHAPv2
D. LDAP communication must be permitted between the ISE server and the domain controller
E. Active Directory supports user and machine authentication by using MSCHAPv2
LDAP communication must be permitted between the ISE server and the domain controller
Active Directory supports user and machine authentication by using MSCHAPv2
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
A. CoA-ACK
B. CoA-NAK
C. CoA-MAB
D. CoA-NCL
CoA-ACK
What is a feature of container orchestration?
A. ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane
B. ability to deploy Kubernetes clusters in air-gapped sites
C. ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane
D. automated daily updates
ability to deploy Kubernetes clusters in air-gapped sites
Which metric is used by the monitoring agent to collect and output packet loss and jitter information?
A. WSAv performance
B. AVC performance
C. RTP performance
D. OTCP performance
RTP performance
Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?
A. Cisco AMP for Endpoints
B. Cisco AnyConnect
C. Cisco Umbrella
D. Cisco Duo
Cisco AMP for Endpoints
Which two components do southbound APIs use to communicate with downstream devices? (Choose two)
A. services running over the network
B. external application APIs
C. OpenFlow
D. applications running over the network
E. OpFlex
OpenFlow
OpFlex
Which solution detects threats across a private network, public clouds, and encrypted traffic?
A. Cisco Stealthwatch
B. Cisco CTA
C. Cisco Encrypted Traffic Analytics
D. Cisco Umbrella
Cisco Stealthwatch
Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated?
A. Cisco Talos
B. Cisco Stealthwatch Cloud
C. Cisco Cloudlock
D. Cisco Umbrella Investigate
Cisco Cloudlock
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?
A. container orchestration
B. cloud application security broker
C. compile-time instrumentation
D. continuous integration and continuous deployment
continuous integration and continuous deployment
Which type of attack is MFA an effective deterrent for?
A. ping of death
B. phishing
C. teardrop
D. syn flood
phishing
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?
A. Install the Cisco Umbrella root CA onto the user’s device.
B. Modify the user’s browser settings to suppress errors from Cisco Umbrella.
C. Upload the organization root CA to Cisco Umbrella.
D. Restrict access to only websites with trusted third-party signed certificates.
Install the Cisco Umbrella root CA onto the user’s device.
A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic. The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue?
A. Resynchronization of NTP is not forced
B. NTP is not configured to use a working server
C. An access list entry for UDP port 123 on the inside interface is missing
D. An access list entry for UDP port 123 on the outside interface is missing
NTP is not configured to use a working server
Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?
A. inbound
B. north-south
C. east-west
D. outbound
outbound
Which solution should be leveraged for secure access of a CI/CD pipeline?
A. SSL WebVPN
B. remote access client
C. Duo Network Gateway
D. Cisco FTD network gateway
Duo Network Gateway
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella?
A. DNS tunneling
B. DNS flood attack
C. cache poisoning
D. DNS hijacking
DNS tunneling
Which system performs compliance checks and remote wiping?
A. OTP
B. MDM
C. AMP
D. ISE
MDM
Why is it important to patch endpoints consistently?
A. Patching helps to mitigate vulnerabilities.
B. Patching reduces the attack surface of the infrastructure.
C. Patching is required per the vendor contract.
D. Patching allows for creating a honeypot.
Patching helps to mitigate vulnerabilities.
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two)
A. It is defined as a Transparent proxy deployment.
B. In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.
C. The PAC file, which references the proxy, is deployed to the client web browser.
D. It is defined as an Explicit proxy deployment.
E. It is defined as a Bridge proxy deployment.
The PAC file, which references the proxy, is deployed to the client web browser.
It is defined as an Explicit proxy deployment.
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
A. by modifying the registry for DNS lookups
B. by using Active Directory group policies to enforce Cisco Umbrella DNS servers
C. by forcing DNS queries to the corporate name servers
D. by using the Cisco Umbrella roaming client
by using the Cisco Umbrella roaming client
Which function is included when Cisco AMP is added to web security?
A. multifactor, authentication-based user identity
B. detailed analytics of the unknown file’s behavior
C. phishing detection on emails
D. threat prevention on an infected endpoint
detailed analytics of the unknown file’s behavior
When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two)
A. continuous monitoring of all files that are located on connected endpoints
B. macro-based protection to keep connected endpoints safe
C. signature-based endpoint protection on company endpoints
D. email integration to protect endpoints from malicious content that is located in email
E. real-time feeds from global threat intelligence centers
continuous monitoring of all files that are located on connected endpoints
real-time feeds from global threat intelligence centers