Exam E Flashcards
Which function is performed by certificate authorities but is a limitation of registration authorities?
A. CRL publishing
B. verifying user identity
C. certificate re-enrollment
D. accepts enrollment requests
CRL publishing
Which encryption algorithm provides highly secure VPN communications?
A. DES
B. 3DES
C. AES 256
D. AES 128
AES 256
A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?
A. Cisco NGFW
B. Cisco AMP for Endpoints
C. Cisco Duo
D. Cisco AnyConnect
Cisco Duo
How does a WCCP-configured router identify if the Cisco WSA is functional?
A. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router.
B. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the WSA.
C. The router sends a Here-I-Am message every 10 seconds, and the WSA acknowledges with an I-See-You message.
D. The WSA sends a Here-I-Am message every 10 seconds, and the router acknowledges with an I-See-You message.
The WSA sends a Here-I-Am message every 10 seconds
What is a feature of NetFlow Secure Event Logging?
A. It exports only records that indicate significant events in a flow.
B. It supports v5 and v8 templates.
C. It filters NSEL events based on the traffic and event type through RSVP.
D. It delivers data records to NSEL collectors through NetFlow over TCP only.
It exports only records that indicate significant events in a flow.
An administrator needs to configure the Cisco ASA via ASDM such that the network management system can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration? (Choose two)
A. Specify the SNMP manager and UDP port.
B. Specify a community string.
C. Add an SNMP USM entry.
D. Add an SNMP host access entry.
E. Specify an SNMP user group.
Specify the SNMP manager and UDP port.
Add an SNMP host access entry.
Which technology enables integration between Cisco ISE and other platforms to gather and share network and vulnerability data and SIEM and location information?
A. pxGrid
B. SNMP
C. NetFlow
D. Cisco Talos
pxGrid
A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco security appliance meets these requirements?
A. Cisco Cloud Orchestrator
B. Cisco Stealthwatch Cloud
C. Cisco ASAv
D. Cisco WSAv
Cisco ASAv
What is a benefit of using Cisco Tetration?
A. It collects policy compliance data and process details.
B. It collects telemetry data from servers and then uses software sensors to analyze flow information.
C. It collects near-real time data from servers and inventories the software packages that exist on servers
D. It collects enforcement data from servers and collects interpacket variation.
It collects near-real time data from servers and inventories the software packages that exist on servers
Which standard is used to automate exchanging cyber threat information?
A. IoC
B. TAXII
C. MITRE
D. STIX
TAXII
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
A. Cisco Encrypted Traffic Analytics
B. Cisco CTA
C. Cisco Umbrella
D. Cisco Stealthwatch
Cisco Stealthwatch
An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?
A. IP Reputation Filtering
B. Anti-Virus Filtering
C. File Analysis
D. Intelligent Multi-Scan
Intelligent Multi-Scan
Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection, enabling the platform to identify and output various applications within the network traffic flows?
A. Cisco ASAv
B. Cisco Prime Infrastructure
C. Cisco NBAR2
D. Account on Resolution
Cisco NBAR2
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD. The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
A. Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not.
B. Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not.
C. Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not.
D. Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not.
Cisco FTD because it enables interactive blocking and blocking with reset natively
An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway. The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of certificate should be presented to the end-user to accomplish this goal?
A. third-party
B. SubCA
C. self-signed
D. organization owned root
organization owned root