my cards Flashcards
Topic 1
Which functions of an SDN architecture require southbound APIs to enable communication?
A. SDN controller and the network elements
B. management console and the SDN controller
C. management console and the cloud
D. SDN controller and the cloud
A. SDN controller and the network elements
southbound APIs are used to communicate between the SDN controller and t
Topic 1
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
A. put
B. options
C. get
D. push
E. connect
A. put
C. get
GET – Retrieves data from the specified o
Available request methods are:
Topic 1
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
A. SDN controller and the cloud
B. management console and the SDN controller
C. management console and the cloud
D. SDN controller and the management solution
D. SDN controller and the management solution
Northbound APIs (SDN northbound APIs) are typically RESTful APIs that ar
Topic 1
What is a feature of the open platform capabilities of Cisco DNA Center?
A. application adapters
B. domain integration
C. intent-based APIs
D. automation adapters
C. intent-based APIs
Intent APIs: The Intent APIs are northbound REST APIs that expose specif
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
import requests client_id = 'a1b2c3d4e5' api_key = 'a1b2c3d4-e5f6-g7h8' url = 'https://api.amp.cisco.com/v1/computers' response = requests.get(url, auth=(client_id, api_key)) response_json = response.json() for computer in response_json['data']: network_addresses = computer['network_addresses'] for network_interface in network_addresses: mac = network_interface.get('mac') ip network_interface.get('ip') ipv6 network_interface.get('ipv6') print(mac, ip, ipv6)
A. create an SNMP pull mechanism for managing AMP
B. gather network telemetry information from AMP for endpoints
C. get the process and PID information from the computers in the network
D. gather the network interface information about the computers AMP sees
D. gather the network interface information about the computers AMP sees
Topic 1
Which form of attack is launched using botnets?
A. TCP flood
B. DDOS
C. DOS
D. virus
B. DDOS
A botnet is a collection of compromised machines that the attacker can m
Topic 1
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
C. cross-site scripting
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
A. user input validation in a web page or web application
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
A. The attack is fragmented into groups of 16 octets before transmission.
B. The attack is fragmented into groups of 8 octets before transmission.
C. Short synchronized bursts of traffic are used to disrupt TCP connections.
D. Malformed packets are used to crash systems.
E. Publicly accessible DNS servers are typically used to execute the attack.
B. The attack is fragmented into groups of 8 octets before transmission.
D. Malformed packets are used to crash systems.
A Ping of death attack is a type of denial-of-service attack that sends
Which two mechanisms are used to control phishing attacks? (Choose two.)
A. Enable browser alerts for fraudulent websites.
B. Define security group memberships.
C. Revoke expired CRL of the websites.
D. Use antispyware software.
E. Implement email filtering techniques.
A. Enable browser alerts for fraudulent websites
E. Implement email filtering techniques
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B. water holing
C. DDoS
D. buffer overflow
D. buffer overflow
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
A. Check integer, float, or Boolean string parameters to ensure accurate values.
B. Use prepared statements and parameterized queries.
C. Secure the connection between the web and the app tier.
D. Write SQL code instead of using object-relational mapping libraries.
E. Block SQL code execution in the web application database login.
A. Check integer, float, or Boolean string parameters to ensure accurate values.
B. Use prepared statements and parameterized queries.
https://tools.cisco.com/security/center/resources/sql_injection.html
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
A. phishing
B. brute force
C. man-in-the-middle
D. DDOS
E. tear drop
A. phishing Most
B. brute force Most
What are two rootkit types? (Choose two.)
A. registry
B. buffer mode
C. user mode
D. bootloader
E. virtual
C. user mode
D. bootloader
How is DNS tunneling used to exfiltrate data out of a corporate network?
A. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers
B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data
C. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network
D. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks
B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data Most Voted
Which type of attack is social engineering?
A. trojan
B. MITM
C. phishing
D. malware
C. phishing
What are two DDoS attack categories? (Choose two.)
A. protocol
B. source-based
C. database
D. sequential
E. volume-based
A. protocol
E. volume-based
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
A. man-in-the-middle
B. LDAP injection
C. insecure API
D. cross-site scripting
A. man-in-the-middle
How does Cisco Advanced Phishing Protection protect users?
A. It utilizes sensors that send messages securely.
B. It uses machine learning and real-time behavior analytics.
C. It validates the sender by using DKIM.
D. It determines which identities are perceived by the sender.
B. It uses machine learning and real-time behavior analytics. Most Voted
How does DNS Tunneling exfiltrate data?
A. An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
B. An attacker opens a reverse DNS shell to get into the client’s system and install malware on it.
C. An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
D. An attacker uses a non-standard DNS port to gain access to the organization’s DNS servers in order to poison the resolutions.
A. An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A. unencrypted links for traffic
B. weak passwords for authentication
C. improper file security
D. software bugs on applications
A. unencrypted links for traffic
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?
A. SYN flood
B. slowloris
C. phishing
D. pharming
A. SYN flood Most Voted
Which two preventive measures are used to control cross-site scripting? (Choose two.)
A. Enable client-side scripts on a per-domain basis.
B. Incorporate contextual output encoding/escaping.
C. Disable cookie inspection in the HTML inspection engine.
D. Run untrusted HTML input through an HTML sanitization engine.
E. SameSite cookie attribute should not be used.
B. Incorporate contextual output encoding/escaping.
D. Run untrusted HTML input through an HTML sanitization engine.
Which threat involves software being used to gain unauthorized access to a computer system?
A. ping of death
B. HTTP flood
C. NTP amplification
D. virus
D. virus
Which two capabilities does TAXII support? (Choose two.)
A. exchange
B. pull messaging
C. binding
D. correlation
E. mitigating
A. exchange.
B. pull messaging.
TAXII is an exchange utility using Pull Messaging, Push Messaging
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Which algorithm provides encryption and authentication for data plane communication?
A. AES-GCM
B. SHA-96
C. AES-256
D. SHA-384
A. AES-GCM
DRAG DROP -
Drag and drop the capabilities from the left onto the correct technologies on the right.
Select and Place:
- detection, blocking, tracking, analysis, and remediation to protect against targeted persistent malware attacks
- superior threat prevention and mitigation for known and unknown threats
- application-layer control and ability to enforce usage and tailor detection policies based on custom applications and URLs
- combined integrated solution of strong defense and web protection, visibility, and controlling
solutions:
1. Next Generation Intrusion Prevention System
2. Advanced Malware Protection
3 application control and URL filtering
4. Cisco Web Security Appliance
- Next Generation Intrusion Prevention System - 2. superior threat prevention and mitigation for known and unknown threats
- Advanced Malware Protection - 1. detection, blocking, tracking, analysis, and remediation to protect against targeted persistent malware attacks
3 application control and URL filtering - 3. application-layer control and ability to enforce usage and tailor detection policies based on custom applications and URL
- Cisco Web Security Appliance - 4. combined integrated solution of strong defense and web protection, visibility, and controlling
Encryption
Which two key and block sizes are valid for AES? (Choose two.)
A. 64-bit block size, 112-bit key length
B. 64-bit block size, 168-bit key length
C. 128-bit block size, 192-bit key length
D. 128-bit block size, 256-bit key length
E. 192-bit block size, 256-bit key length
C. 128-bit block size, 192-bit key length
D. 128-bit block size, 256-bit key length
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
Encryption
Which two descriptions of AES encryption are true? (Choose two.)
A. AES is less secure than 3DES.
B. AES is more secure than 3DES.
C. AES can use a 168-bit key for encryption.
D. AES can use a 256-bit key for encryption.
E. AES encrypts and decrypts a key three times in sequence.
B. AES is more secure than 3DES.
D. AES can use a 256-bit key for encryption.
TAXII
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A. STIX
B. XMPP
C. pxGrid
D. SMTP
A. STIX
VPN
DRAG DROP -
Drag and drop the descriptions from the left onto the correct protocol versions on the right. (ikev1, ikev2
Select and Place:
standard includes NAT-T
uses six packets in main mode to establish phase 1
users four packets to establish phase 1 and phase 2
users three packets in aggressive mode to estabilsh phase 1
uses EAP for authenticate remote access clients
IKEv1:
uses six packets in main mode to establish phase 1
users three packets in aggressive mode to estabilsh phase 1
IKEv2:
standard includes NAT-T
users four packets to establish phase 1 and phase 2
uses EAP for authenticate remote access clients
VPN
Which VPN technology can support a multivendor environment and secure traffic between sites?
A. SSL VPN
B. GET VPN
C. FlexVPN
D. DMVPN
C. FlexVPN
VPN
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
D. GET VPN
VPN
What is a commonality between DMVPN and FlexVPN technologies?
A. FlexVPN and DMVPN use the new key management protocol, IKEv2
B. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
C. IOS routers run the same NHRP code for DMVPN and FlexVPN
D. FlexVPN and DMVPN use the same hashing algorithms
C. IOS routers run the same NHRP code for DMVPN and FlexVPN
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
A. DTLSv1
B. TLSv1
C. TLSv1.1
D. TLSv1.2
A. DTLSv1
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?
A. Talos
B. PSIRT
C. SCIRT
D. DEVNET
A. Talos
VULNERABILITIES
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
A. Common Vulnerabilities, Exploits and Threats
B. Common Vulnerabilities and Exposures
C. Common Exploits and Vulnerabilities
D. Common Security Exploits
B. Common Vulnerabilities and Exposures
DNAC
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)
A. accounting
B. assurance
C. automation
D. authentication
E. encryption
B. assurance
C. automation