my cards 5 Flashcards
my cards 5
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
A. by forcing DNS queries to the corporate name servers
B. by modifying the registry for DNS lookups
C. by using the Cisco Umbrella roaming client
D. by using Active Directory group policies to enforce Cisco Umbrella DNS servers
C. by using the Cisco Umbrella roaming client
DRAG DROP -
Drag and drop the deployment models from the left onto the corresponding explanations on the right.
Select and Place:
routed
passive
passive with ERSPAN
transparent
A GRE tunnel is utilized in this solutionn
This solution allows inspection between hots on the same subnet
attacks are not prevented by this solution
this solution does not provide filtering between hots on the same subnet
passive with ERSPAN - A GRE tunnel is utilized in this solution
transparent - This solution allows inspection between hots on the same subnet
passive - attacks are not prevented by this solution
routed - this solution does not provide filtering between hots on the same subnet
An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source. Which two steps must be taken to accomplish this task? (Choose two.)
A. Choose the interface for syncing to the NTP server.
B. Specify the NTP version
C. Set the NTP DNS hostname
D. Set the authentication key.
E. Configure the NTP stratum
A. Choose the interface for syncing to the NTP server
D. Set the authentication key.
Which two capabilities of Integration APIs are utilized with Cisco DNA Center? (Choose two.)
A. Upgrade software on switches and routers
B. Third party reporting
C. Connect to ITSM platforms
D. Create new SSIDs on a wireless LAN controller
E. Automatically deploy new virtual routers
B. Third party reporting
C. Connect to ITSM platforms
3 x subheadings:
1) IT Service Management (ITSM) Integration
2) IP Address Management (IPAM) Integration
3) Third party Reporting Integration
What is the most common type of data exfiltration that organizations currently experience?
A. encrypted SMTP
B. SQL database injections
C. HTTPS file upload site
D. Microsoft Windows network shares
D. Microsoft Windows network shares
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
A. teardrop
B. smurf
C. LAND
D. SYN flood
A. teardrop
DRAG DROP -
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
Select and Place:
esp-3des
esp-aes-256
esp-md5-hmac
esp-sha-hmac
authenticatoin
encryption
HMAC -> AUTHENTICATION
authentication:
esp-md5-hmac
esp-sha-hmac
encryption:
esp-3des
esp-aes-256
An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
A. Configure Dynamic ARP inspection and add entries in the DHCP snooping database.
B. Configure DHCP snooping and set trusted interfaces for all client connections.
C. Configure Dynamic ARP inspection and antispoofing ACLs in the DHCP snooping database.
D. Configure DHCP snooping and set a trusted interface for the DHCP server.
D. Configure DHCP snooping and set a trusted interface for the DHCP server.
DoS attacks are categorized as what?
A. flood attacks
B. virus attacks
C. trojan attacks
D. phishing attacks
A. flood attacks
What is the process of performing automated static and dynamic analysis of files in an isolated environment against preloaded behavioral indicators for threat analysis?
A. advanced sandboxing
B. adaptive scanning
C. deep visibility scan
D. point-in-time checks
A. advanced sandboxing
What are two benefits of Flexible NetFlow records? (Choose two.)
A. They provide accounting and billing enhancements.
B. They allow the user to configure flow information to perform customized traffic identification.
C. They provide monitoring of a wider range of IP packet information from Layer2 to 4.
D. They provide attack prevention by dropping the traffic.
E. They converge multiple accounting technologies into one accounting mechanism.
B. They allow the user to configure flow information to perform customized traffic identification.
E. They converge multiple accounting technologies into one accounting mechanism.
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG.
The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
A. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI.
B. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI.
C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI
D. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI.
C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
A. requires an additional license
B. performs transparent redirection
C. supports SSL decryption
D. supports VMware vMotion on VMware ESXi
A. requires an additional license
What are two workload security models? (Choose two.)
A. SaaS
B. PaaS
C. off-premises
D. on-premises
E. IaaS
C. off-premises
D. on-premises
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
A. Add Dropbox to the Cloudlock Authentication and API section in the Cloudlock portal.
B. Add Cloudlock to the Dropbox admin portal.
C. Send an API request to Cloudlock from Dropbox admin portal.
D. Authorize Dropbox within the Platform settings in the Cloudlock portal.
D. Authorize Dropbox within the Platform settings in the Cloudlock portal.
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
A. CoA-NAK
B. CoA-NCL
C. CoA-MAB
D. CoA-ACK
D. CoA-ACK
DRAG DROP -
Drag and drop the security solutions from the left onto the benefits they provide on the right.
Select and Place:
Full contextual awareness
NGIPS
Cisco AMP for Endpoints
Collective Security Intelligence
detection, blocking, tracking, analysis, and remediation to protect the enterprise against targeted and persistent malware attacks
policy enforcement based on complete visibility of users, mobile devices, client-side applications, communication between virtual machines, vulnerabilities, threats, and URLs
unmatched security and web reputation intelligence provides real-time threat intelligence and security protection
superior threat prevention and mitigation for known and unknown threats
Cisco AMP for Endpoints - detection, blocking, tracking, analysis, and remediation to protect the enterprise against targeted and persistent malware attacks
Full contextual awareness - policy enforcement based on complete visibility of users, mobile devices, client-side applications, communication between virtual machines, vulnerabilities, threats, and URLs
Collective Security Intelligence - unmatched security and web reputation intelligence provides real-time threat intelligence and security protection
NGIPS - superior threat prevention and mitigation for known and unknown threats
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
A. GET VPN supports Remote Access VPNs
B. GET VPN uses multiple security associations for connections
C. GET VPN natively supports MPLS and private IP networks.
D. GET VPN interoperates with non-Cisco devices.
C. GET VPN natively supports MPLS and private IP networks.
Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (10.00 to 6.00) on the Cisco ESA. Which action will the system perform to desirable any links in messages that match the filter?
A. Defang
B. FilterAction
C. Quarantine
D. ScreenAction
A. Defang
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
A. IaC
B. IaaS
C. PaaS
D. SaaS
D. SaaS
What is a characteristic of an EDR solution and not of an EPP solution?
A. performs signature-based detection
B. decrypts SSL traffic for better visibility
C. stops all ransomware attacks
D. retrospective analysis
D. retrospective analysis
What is a benefit of using Cisco Umbrella?
A. Files are scanned for viruses before they are allowed to run.
B. All Internet traffic is encrypted.
C. It prevents malicious inbound traffic.
D. Attacks can be mitigated before the application connection occurs.
D. Attacks can be mitigated before the application connection occurs.
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella?
A. DNS hijacking
B. cache poisoning
C. DNS tunneling
D. DNS flood attack
C. DNS tunneling
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
A. Link Aggregation
B. Reverse ARP
C. private VLANs
D. Dynamic ARP Inspection
D. Dynamic ARP Inspection
Which command is used to log all events to a destination collector 209.165.201.10?
A. CiscoASA(config-pmap-c)# flow-export event-type all destination 209.165.201.10
B. CiscoASA(config-cmap)# flow-export event-type flow-update destination 209.165.201.10
C. CiscoASA(config-pmap-c)# flow-export event-type flow-update destination 209.165.201.10
D. CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.10
A. CiscoASA(config-pmap-c)# flow-export event-type all destination 209.165.201.10
Inside a class-map
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?
A. AES-256
B. IKEv1
C. ESP
D. AES-192
C. ESP
An administrator is testing new configuration on a network device. The network device had a previously established association with the NTP server but is no longer processing time updates. What is the cause of this issue?
A. The server changed its time source to stratum 1.
B. The network device is sending the wrong password to the server.
C. NTP authentication has been configured on the network device.
D. NTP authentication has been configured on the NTP server.
C. NTP authentication has been configured on the network device.
An engineer is configuring device-hardening on a router in order to prevent credentials from being seen if the router configuration was compromised. Which command should be used?
A. service password-encryption
B. username <username> privilege 15 password <password>
C. username <username> password <password>
D. service password-recovery</password></username></password></username>
A. service password-encryption
What is a feature of container orchestration?
A. ability to deploy Kubernetes clusters in air-gapped sites
B. automated daily updates
C. ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane
D. ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane
A. ability to deploy Kubernetes clusters in air-gapped sites
During a recent security audit, a Cisco IOS router with a working IPSEC configuration using IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command. The VPN peer is a SOHO router with a dynamically assigned IP address. Dynamic DNS has been configured on the SOHO router to map the dynamic IP address to the host name of vpn.sohoroutercompany.com. In addition to the command crypto isakmp key Cisc123456789 hostname vpn.sohoroutercompany.com, what other two commands are now required on the Cisco IOS router far the VPN to continue to function after the wildcard command is removed? (Choose two.)
A. ip host vpn.sohoroutercompany.com <VPN>
B. crypto isakmp identity hostname
C. Add the dynamic keyword to the existing crypto map command
D. fqdn vpn.sohoroutercompany.com <VPN>
E. ip name-server <DNS></DNS></VPN></VPN>
B. crypto isakmp identity hostname
E. ip name-server <DNS></DNS>
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
A. probes
B. posture assessment
C. Cisco AnyConnect Secure Mobility Client
D. Cisco pxGrid
A. probes
What are two functions of IKEv1 but not IKEv2? (Choose two.)
A. IKEv1 conversations are initiated by the IKE_SA_INIT message.
B. With IKEv1, aggressive mode negotiates faster than main mode.
C. IKEv1 uses EAP for authentication.
D. NAT-T is supported in IKEv1 but not in IKEv2.
E. With IKEv1, when using aggressive mode, the initiator and responder identities are passed in cleartext.
B. With IKEv1, aggressive mode negotiates faster than main mode.
E. With IKEv1, when using aggressive mode, the initiator and responder identities are passed in cleartext.
Which action controls the amount of URI text that is stored in Cisco WSA log files?
A. Configure the advancedproxyconfig command with the HTTPS subcommand.
B. Configure a small log-entry size.
C. Configure the datasecurityconfig command.
D. Configure a maximum packet size.
A. Configure the advancedproxyconfig command with the HTTPS subcommand.
Where are individual sites specified to be black listed in Cisco Umbrella?
A. security settings
B. content categories
C. destination lists
D. application settings
C. destination lists
What is the most commonly used protocol for network telemetry?
A. NetFlow
B. SNMP
C. TFTP
D. SMTP
A. NetFlow
Which two Cisco ISE components enforce security policies on noncompliant endpoints by blocking network access? (Choose two.)
A. Apex licensing
B. TACACS+
C. profiling
D. DHCP and SNMP probes
E. posture agents
C. profiling
E. posture agents
What is a difference between DMVPN and sVTI?
A. DMVPN provides interoperability with other vendors, whereas sVTI does not.
B. DMVPN supports static tunnel establishment, whereas sVTI does not.
C. DMVPN supports dynamic tunnel establishment, whereas sVTI does not.
D. DMVPN supports tunnel encryption, whereas sVTI does not.
C. DMVPN supports dynamic tunnel establishment, whereas sVTI does not.
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains, IPs, and files, and helps to pinpoint attackers’ infrastructures and predict future threat?
A. Cisco Umbrella Investigate
B. Cisco Stealthwatch
C. Cisco pxGrid
D. Cisco Stealthwatch Cloud
A. Cisco Umbrella Investigate
Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?
A. NTP
B. SNMP
C. syslog
D. NetFlow
D. NetFlow
Which threat intelligence standard contains malware hashes?
A. advanced persistent threat
B. open command and control
C. structured threat information expression
D. trusted automated exchange of indicator information
C. structured threat information expression STIX