Exam F Flashcards
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scriptingwrong
B. DDoS
C. buffer overflow
D. water holing
buffer overflow
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A. SMTPwrong
B. pxGrid
C. STIX
D. XMPP
STIX
Which two preventive measures are used to control cross-site scripting? (Choose two)
A. Disable cookie inspection in the HTML inspection engine.wrong
B. Incorporate contextual output encoding/escaping
C. Enable client-side scripts on a per-domain basis
D. Run untrusted HTML input through an HTML sanitization engine.
E. Same Site cookie attribute should not be used.
Incorporate contextual output encoding/escaping
Enable client-side scripts on a per-domain basis
Which two mechanisms are used to control phishing attacks? (Choose two)
A. Use antispyware software.wrong
B. Implement email filtering techniques.
C. Revoke expired CRL of the websites.
D. Enable browser alerts for fraudulent websites.
E. Define security group memberships.
Implement email filtering techniques.
Enable browser alerts for fraudulent websites.
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. rootkit exploitwrong
B. Smurf
C. distributed denial of service
D. cross-site scripting
cross-site scripting
Which two behavioral patterns characterize a ping of death attack? (Choose two)
A. Malformed packets are used to crash systems.
B. The attack is fragmented into groups of 8 octets before transmission.
C. The attack is fragmented into groups of 16 octets before transmission.
D. Publicly accessible DNS servers are typically used to execute the attack.
E. Short synchronized bursts of traffic are used to disrupt TCP connections.
Malformed packets are used to crash systems.
The attack is fragmented into groups of 8 octets before transmission.
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
A spear phishing campaign is aimed at a specific person versus a group of people.
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
A. Patch for cross-site scripting.
B. Perform backups to the private cloud.
C. Protect systems with an up-to-date antimalware program.
D. Protect against input validation and character escapes in the endpoint.
E. Install a spam and virus email filter.
Protect systems with an up-to-date antimalware program.
Install a spam and virus email filter.
Which two capabilities does TAXII support? (Choose two)
A. Binding
B. Exchange
C. Mitigating
D. Pull messaging
E. Correlation
Binding
Pull messaging
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. web page images
B. database
C. Linux and Windows operating systems
D. user input validation in a web page or web application
user input validation in a web page or web application
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
A. Secure the connection between the web and the app tier.
B. Use prepared statements and parameterized queries.
C. Check integer, float, or Boolean string parameters to ensure accurate values.
D. Block SQL code execution in the web application database login.
E. Write SQL code instead of using object-relational mapping libraries.
Use prepared statements and parameterized queries.
Check integer, float, or Boolean string parameters to ensure accurate values.
Which form of attack is launched using botnets?
A. DDOS
B. EIDDOS
C. TCP flood
D. virus
DDOS
Which type of attack is social engineering?
A. trojan
B. malware
C. phishing
D. MITM
phishing
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
A. profile
B. url
C. terminal
D. selfsigned
profile
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
A. ARP spoofing
B. exploits
C. malware
D. eavesdropping
E. denial-of-service attacks
exploits
malware
What are two rootkit types? (Choose two)
A. bootloader
B. buffer mode
C. registry
D. virtual
E. user mode
bootloader
user mode
Which threat involves software being used to gain unauthorized access to a computer system?
A. ping of death
B. HTTP flood
C. virus
D. NTP amplification
virus
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
A. 3DES
B. DES
C. RSA
D. AES
RSA
Which two descriptions of AES encryption are true? (Choose two)
A. AES is more secure than 3DES.
B. AES can use a 168-bit key for encryption.
C. AES can use a 256-bit key for encryption.
D. AES encrypts and decrypts a key three times in sequence.
E. AES is less secure than 3DES.
AES is more secure than 3DES.
AES can use a 256-bit key for encryption.
Which algorithm provides encryption and authentication for data plane communication?
A. SHA-96
B. SHA-384
C. AES-GCM
D. AES-256
AES-GCM
Which two key and block sizes are valid for AES? (Choose two)
A. 128-bit block size, 192-bit key length
B. 128-bit block size, 256-bit key length
C. 64-bit block size, 168-bit key length
D. 192-bit block size, 256-bit key length
E. 64-bit block size, 112-bit key length
128-bit block size, 192-bit key length
128-bit block size, 256-bit key length
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
GET VPN
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
The IPsec configuration that is set up on the active device must be duplicated on the standby device
The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Which VPN technology can support a multivendor environment and secure traffic between sites?
A. SSL VPN
B. GET VPN
C. FlexVPN
D. DMVPN
GET VPN
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
A. Change isakmp to ikev2 in the command on hostA.
B. Enter the command with a different password on hostB.
C. Enter the same command on hostB.
D. Change the password on hostA to the default password.
Enter the same command on hostB.
What is a difference between FlexVPN and DMVPN?
A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
FlexVPN uses IKEv2
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
A. TLSv1.2
B. TLSv1.1
C. BJTLSv1
D. DTLSv1
DTLSv1
What is a commonality between DMVPN and FlexVPN technologies?
A. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
B. FlexVPN and DMVPN use the new key management protocol
C. FlexVPN and DMVPN use the same hashing algorithms
D. IOS routers run the same NHRP code for DMVPN and FlexVPN
IOS routers run the same NHRP code for DMVPN and FlexVPN
Which functions of an SDN architecture require southbound APIs to enable communication?
A. management console and the cloud
B. management console and the SDN controller
C. SDN controller and the cloud
D. SDN controller and the network elements
SDN controller and the network elements
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
A. accounting
B. encryption
C. assurance
D. automation
E. authentication
assurance
automation
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
A. SDN controller and the cloud
B. management console and the cloud
C. management console and the SDN controller
D. SDN controller and the management solution
SDN controller and the management solution
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
A. push
B. options
C. connect
D. put
E. get
push
put
Which API is used for Content Security?
A. OpenVuln API
B. IOS XR API
C. NX-OS API
D. AsyncOS API
AsyncOS API
Which option is the main function of Cisco Firepower impact flags?
A. They alert administrators when critical events occur.
B. They identify data that the ASA sends to the Firepower module.
C. They correlate data about intrusions and vulnerability.
D. They highlight known and suspected malicious IP addresses in reports.
They correlate data about intrusions and vulnerability.
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
A. Cisco FTDv configured in routed mode and IPv6 configured
B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
D. Cisco FTDv with two management interfaces and one traffic interface configured
E. Cisco FTDv with one management interface and two traffic interfaces configured
Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
A. Endpoint Trust List
B. Secured Collaboration Proxy
C. Certificate Trust List
D. Enterprise Proxy Service
Certificate Trust List
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
A. routed mode
B. active mode
C. transparent mode
D. inline mode
E. passive monitor-only mode
inline mode
passive monitor-only mode
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
A. time synchronization
B. network address translations
C. quality of service
D. intrusion policy
time synchronization
Which information is required when adding a device to Firepower Management Center?
A. encryption method
B. username and password
C. device serial number
D. registration key
registration key
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
A. Protocol
B. Source
C. Port
D. Application
E. Rule
Source
Rule
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
A. Security Intelligence
B. URL Filtering
C. Impact Flags
D. Health Monitoring
Impact Flags
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?
A. protect
B. malware
C. URL filtering
D. control
protect
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?
A. health policy
B. correlation policy
C. system policy
D. health awareness policy
E. access control policy
health policy
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
A. Its events match all traffic classes in parallel.
B. It tracks the flow continuously and provides updates every 10 seconds.
C. It tracks flow-create, flow-teardown, and flow-denied events.
D. It provides stateless IP flow tracking that exports all records of a specific flow.
It tracks flow-create
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
A. SSL
B. packet decoder
C. SIP
D. modbus
E. inline normalization
SSL
SIP
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
A. user deployment of Layer 3 networks
B. multiple context mode
C. clustering
D. IPv6
user deployment of Layer 3 networks
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?
A. routed mode
B. transparent mode
C. multiple zone mode
D. multiple context mode
multiple context mode
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
A. Define a NetFlow collector by using the flow-export command.
B. Enable NetFlow Version 9.
C. Create an ACL to allow UDP traffic on port 9996.
D. Create a class map to match interesting traffic.
E. Apply NetFlow Exporter to the outside interface in the inbound direction.
Define a NetFlow collector by using the flow-export command.
Apply NetFlow Exporter to the outside interface in the inbound direction.
How many interfaces per bridge group does an ASA bridge group deployment support?
A. up to 8
B. up to 4
C. up to 16
D. up to 2
up to 4
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
A. Intrusion
B. Correlation
C. Access Control
D. Network Discovery
Network Discovery
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
A. It inspects hosts that meet the profile with more intrusion rules.
B. It defines a traffic baseline for traffic anomaly deduction.
C. It allows traffic if it does not meet the profile.
D. It blocks traffic if it does not meet the profile.
It defines a traffic baseline for traffic anomaly deduction.
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
B. A flow-export event type must be defined under a policy.
C. NSEL can be used without a collector configured.
D. A sysopt command can be used to enable NSEL on a specific interface.
A flow-export event type must be defined under a policy.
Which ASA deployment mode can provide separation of management on a shared appliance?
A. transparent firewall mode
B. routed mode
C. multiple context mode
D. DMZ multiple zone mode
multiple context mode
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
A. Device Management Policy
B. Group Policy
C. Platform Service Policy
D. Access Control Policy
Platform Service Policy
```Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
A. configure manager <key> add host
B. configure system add <host><key>
C. configure manager add <host><key>
D. configure manager delete```</key></host></key></host></key>
configure manager add <host><key>
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?
A. ip flow monitor input
B. flow-export destination inside 1.1.1.1 2055
C. flow exporter
D. ip flow-export destination 1.1.1.1 2055
flow-export destination inside 1.1.1.1 2055
Which statement about IOS zone-based firewalls is true?
A. An unassigned interface can communicate with assigned interfaces
B. An interface can be assigned to multiple zones.
C. An interface can be assigned only to one zone.
D. Only one interface can be assigned to a zone.
An interface can be assigned only to one zone.
What is a characteristic of Firepower NGIPS inline deployment mode?
A. It must have inline interface pairs configured.
B. ASA with Firepower module cannot be deployed.
C. It is out-of-band from traffic.
D. It cannot take actions such as blocking traffic.
It must have inline interface pairs configured.
Which technology is used to improve web traffic performance by proxy caching?
A. FireSIGHT
B. WSA
C. ASA
D. Firepower
WSA
What is the primary benefit of deploying an ESA in hybrid mode?
A. You can fine-tune its settings to provide the optimum balance between security and performance for your environment
B. It provides the lowest total cost of ownership by reducing the need for physical appliances
C. It provides email security while supporting the transition to the cloud
D. It provides maximum protection and control of outbound messages
It provides email security while supporting the transition to the cloud
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
A. redirection
B. forward
C. transparent
D. proxy gateway
transparent
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
A. It alerts users when the WSA decrypts their traffic.
B. It provides enhanced HTTPS application detection for AsyncOS.
C. It decrypts HTTPS application traffic for unauthenticated users.
D. It decrypts HTTPS application traffic for authenticated users.
It provides enhanced HTTPS application detection for AsyncOS.
What is the primary role of the Cisco Email Security Appliance?
A. Mail Submission Agent
B. Mail User Agent
C. Mail Transfer Agent
D. Mail Delivery Agent
Mail Transfer Agent
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
A. RAT
B. white list
C. Sophos engine
D. outbreak filters
E. DLP
Sophos engine
outbreak filters
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
A. Configure the advancedproxyconfig command with the HTTPS subcommand
B. Configure a maximum packet size.
C. Configure a small log-entry size.
D. Configure the datasecurityconfig command
Configure the advancedproxyconfig command with the HTTPS subcommand
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
A. NetFlow
B. Data loss prevention
C. Time-based one-time passwords
D. Heuristic-based filtering
E. Geolocation-based filtering
Data loss prevention
Geolocation-based filtering
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)
A. reference a Proxy Auto Config file
B. configure policy-based routing on the network infrastructure
C. use Web Cache Communication Protocol
D. configure the proxy IP address in the web-browser settings
E. configure Active Directory Group Policies to push proxy settings
reference a Proxy Auto Config file
use Web Cache Communication Protocol
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations. Which task can you perform to determine where each message was lost?
A. Perform a trace.
B. Configure the trackingconfig command to enable message tracking.
C. Review the log files.
D. Generate a system report.
Configure the trackingconfig command to enable message tracking.
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
A. It can handle explicit HTTP requests.
B. It requires a proxy for the client web browser.
C. Layer 4 switches can automatically redirect traffic destined to port 80.
D. It requires a PAC file for the client web browser.
E. WCCP v2-enabled devices can automatically redirect traffic destined to port 80.
Layer 4 switches can automatically redirect traffic destined to port 80.
WCCP v2-enabled devices can automatically redirect traffic destined to port 80.
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?
A. RAT
B. HAT
C. SAT
D. BAT
RAT
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
A. antispam
B. DDoS
C. encryption
D. antivirus
E. DLP
encryption
DLP
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
A. AMP Reputation Center
B. IP Blacklist Center
C. IP and Domain Reputation Center
D. File Reputation Center
IP and Domain Reputation Center
Why would a user choose an on-premises ESA versus the CES solution?
A. Demand is unpredictable.
B. ESA is deployed inline.
C. Sensitive data must remain onsite.
D. The server team wants to outsource this service.
Sensitive data must remain onsite.
Which deployment model is the most secure when considering risks to cloud adoption?
A. Public Cloud
B. Community Cloud
C. Private Cloud
D. Hybrid Cloud
Private Cloud
Which technology reduces data loss by identifying sensitive information stored in public computing environments?
A. Cisco HyperFlex
B. Cisco Cloudlock
C. Cisco Firepower
D. Cisco SDA
Cisco Cloudlock
On which part of the IT environment does DevSecOps focus?
A. application development
B. perimeter network
C. data center
D. wireless network
application development
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
A. Tetration
B. Firepower
C. Nexus
D. Stealthwatch
Tetration
In which cloud services model is the tenant responsible for virtual machine OS patching?
A. SaaS
B. PaaS
C. UCaaS
D. IaaS
IaaS
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
A. XaaS
B. PaaS
C. SaaS
D. IaaS
PaaS
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
A. virtual machine
B. hypervisor
C. application
D. network
application
What is the function of Cisco Cloudlock for data security?
A. user and entity behavior analytics
B. controls malicious cloud apps
C. detects anomalies
D. data loss prevention
data loss prevention
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
A. It sends the application information to an administrator to act on.
B. It discovers and controls cloud apps that are connected to a company’s corporate environment.
C. It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
D. It deletes any application that does not belong in the network.
It discovers and controls cloud apps that are connected to a company’s corporate environment.
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
A. Cisco Identity Services Engine with PxGrid services enabled
B. Cisco Identity Services Engine and AnyConnect Posture module
C. Cisco ASA firewall with Dynamic Access Policies configured
D. Cisco Stealthwatch and Cisco Identity Services Engine integration
Cisco Identity Services Engine and AnyConnect Posture module
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
A. It allows the endpoint to authenticate with 802.1x or MAB.
B. It allows CoA to be applied if the endpoint status is compliant.
C. It adds endpoints to identity groups dynamically.
D. It verifies that the endpoint has the latest Microsoft security patches installed.
It allows the endpoint to authenticate with 802.1x or MAB.
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two)
A. single sign-on
B. local web auth
C. multiple factor auth
D. central web auth
E. TACACS+
local web auth
central web auth
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline posture node?
A. RADIUS Change of Authorization
B. DHCP snooping
C. device tracking
D. VLAN hopping
RADIUS Change of Authorization
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
A. Windows service
B. computer identity
C. default browser
D. Windows firewall
E. user identity
Windows service
Windows firewall