my cards 6 Flashcards
my cards 6
Which two capabilities does an MDM provide? (Choose two.)
A. manual identification and classification of client devices
B. unified management of mobile devices, Macs, and PCs from a centralized dashboard
C. delivery of network malware reports to an inbox in a schedule
D. enforcement of device security policies from a centralized dashboard
E. unified management of Android and Apple devices from a centralized dashboard
B. unified management of mobile devices, Macs, and PCs from a centralized dashboard
D. enforcement of device security policies from a centralized dashboard
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
A. Use Cisco Umbrella
B. Use next generation firewalls.
C. Block all ‘TXT’ DNS records.
D. Use intrusion prevention system.
E. Enforce security over port 53.
A. Use Cisco Umbrella
E. Enforce security over port 53.
What is a capability of Cisco ASA NetFlow?
A. It sends NetFlow data records from active and standby ASAs in an active-standby failover pair.
B. It logs all event types only to the same collector.
C. It filters NSEL events based on traffic.
D. It generates NSEL events even if the MPF is not configured.
C. It filters NSEL events based on traffic
Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to the network?
A. Threat Centric NAC
B. Cisco TrustSec
C. Posture
D. Profiler
C. Posture
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?
A. cloud application security broker
B. compile-time instrumentation
C. container orchestration
D. continuous integration and continuous deployment
D. continuous integration and continuous deployment
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
A. It applies the next identification profile policy.
B. It applies the global policy.
C. It applies the advanced policy.
D. It blocks the request.
B. It applies the global policy.
What is a benefit of using Cisco ISE for device compliance?
A. outbreak control
B. retrospective analysis
C. device analysis
D. zero-trust approach
D. zero-trust approach
Based on the NIST 800-145 guide, which cloud architecture is provisioned for exclusive use by a specific group of consumers from different organizations and may be owned, managed, and operated by one or more of those organizations?
A. community cloud
B. private cloud
C. public cloud
D. hybrid cloud
A. community cloud
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
requires secret keys
requires more time
diffie-hellman exchange
3des
Asymetric
Symetric
Asymetric
requires more time
diffie-hellman exchange
Symetric
3des
requires secret keys
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
A. VMware horizons
B. VMware vRealize
C. VMware APIC
D. VMware fusion
B. VMware vRealize
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to ensure that bandwidth is available for VPN users needing access to corporate resources on the 10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the network?
A. Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network.
B. Configure VPN load balancing to send non-corporate traffic straight to the internet.
C. Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.
D. Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.
C. Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
A. It can grant third-party SIEM integrations write access to the S3 bucket.
B. Data can be stored offline for 30 days.
C. No other applications except Cisco Umbrella can write to the S3 bucket.
D. It is included in the license cost for the multi-org console of Cisco Umbrella.
A. It can grant third-party SIEM integrations write access to the S3 bucket.
Which algorithm is an NGE hash function?
A. HMAC
B. SHA-1
C. MD5
D. SHA-2
D. SHA-2
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
A. EAPOL
B. SSH
C. RADIUS
D. TACACS+
D. TACACS+
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
A. It prevents use of compromised accounts and social engineering.
B. It automatically removes malicious emails from users’ inbox.
C. It secures all passwords that are shared in video conferences.
D. It prevents trojan horse malware using sensors.
E. It prevents all zero-day attacks coming from the Internet.
A. It prevents use of compromised accounts and social engineering.
B. It automatically removes malicious emails from users’ inbox.
In which two customer environments is the Cisco WSAv connector traffic direction method selected? (Choose two.)
A. Customer owns ASA Appliance and Virtual Form Factor is required.
B. Customer does not own Cisco hardware and needs Explicit Proxy.
C. Customer owns ASA Appliance and SSL Tunneling is required.
D. Customer needs to support roaming users.
E. Customer does not own Cisco hardware and needs Transparent Redirection (WCCP).
A. Customer owns ASA Appliance and Virtual Form Factor is required.
E. Customer does not own Cisco hardware and needs Transparent Redirection (WCCP).
Which capability is provided by application visibility and control?
A. data obfuscation
B. deep packet inspection
C. reputation filtering
D. data encryption
B. deep packet inspection
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the network?
A. pxGrid
B. Profiling
C. Posture
D. MAB
C. Posture
Which two fields are defined in the NetFlow flow? (Choose two.)
A. destination port
B. Layer 4 protocol type
C. output logical interface
D. class of service bits
E. type of service byte
A. destination port
E. type of service byte
- Source IP address
- Destination IP address
- Source port number
- Destination port number
- Layer 3 protocol type (ex. TCP, UDP)
- ToS (type of service) byte
- Input logical interface
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
A. northbound API
B. westbound API
C. eastbound API
D. southbound API
D. southbound API
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
4 .info files in the picture
A. W32/AutoRun worm
B. HeartBleed SSL Bug
C. Eternal Blue Windows
D. Spectre Worm
A. W32/AutoRun worm
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Cisc433392759. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
A. ntp server 192.168.1.110 primary key 1
B. ntp server 192.168.1.110 key 1 prefer
C. ntp peer 192.168.1.110 prefer key 1
D. ntp peer 192.168.1.110 key 1 primary
B. ntp server 192.168.1.110 key 1 prefer
Which function is included when Cisco AMP is added to web security?
A. detailed analytics of the unknown file’s behavior
B. multifactor, authentication-based user identity
C. threat prevention on an infected endpoint
D. phishing detection on emails
A. detailed analytics of the unknown file’s behavior
An organization is moving toward the zero-trust model. Which Cisco solution enables administrators to deploy and control microsegmentation of endpoints that are connected to a Cisco Data Center Virtual Edge, Cisco Application Virtual Switch, Microsoft vSwitch, and VMware vSphere Distributed Switch?
A. Cisco Tetration
B. Cisco DCNM
C. Cisco Stealthwatch
D. Cisco ACI
D. Cisco ACI
What is offered by an EPP solution but not an EDR solution?
A. investigation
B. containment
C. sandboxing
D. detection
C. sandboxing
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?
A. endpoint isolation
B. retrospective security
C. advanced search
D. advanced investigation
B. retrospective security
Which feature is used in a push model to allow for session identification host reauthentication and session termination?
A. CoA request
B. carrier-grade NAT
C. AAA attributes
D. AV pair
A. CoA request
What is the term for the concept of limiting communication between applications or containers on the same node?
A. software-defined access
B. microservicing
C. microsegmentation
D. container orchestration
C. microsegmentation
An engineer is configuring Cisco WSA and needs to ensure end clients are protected against DNS spoofing attacks. Which deployment method accomplishes this goal?
A. transparent mode
B. Web Cache Communication Protocol
C. explicit forward
D. single-context mode
C. explicit forward
Explicit Proxy
- Client requests a website
- Browser connects first to WSA
- WSA connects to a website
- Firewall usually only allows web traffic from proxy
- DNS Resolutions done by WSA
Transparent Proxy
+ Client requests a website
+ Browser tries to connect to the website
+ Network Device redirects traffic to WSA using WCCP
+ WSA proxies the request
+ DNS Resolution is done by the Client
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?
A. adds a switch to Cisco DNA Center
B. receives information about a switch
C. deletes a switch from Cisco DNA Center
D. adds authentication to a switch
A. adds a switch to Cisco DNA Center
Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two.)
A. posture assessment
B. aaa authorization exec default local
C. tacacs-server host 10.1.1.250 key password
D. aaa server radius dynamic-author
E. CoA
D. aaa server radius dynamic-author
E. CoA
Which Cisco network security device supports contextual awareness?
A. ISE
B. Cisco IOS
C. Cisco ASA
D. Firepower
D. Firepower
When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.)
A. signature-based endpoint protection on company endpoints
B. email integration to protect endpoints from malicious content that is located in email
C. real-time feeds from global threat intelligence centers
D. macro-based protection to keep connected endpoints safe
E. continuous monitoring of all files that are located on connected endpoints
C. real-time feeds from global threat intelligence centers
E. continuous monitoring of all files that are located on connected endpoints
A company recently discovered an attack propagating throughout their Windows network via a file named abc123456789xyz.exe. The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list. Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise. What must be performed to ensure detection of the malicious file?
A. Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis.
B. Upload the malicious file to the Blocked Application Control List.
C. Upload the SHA-256 hash for the file to the Simple Custom Detection List.
D. Use an Advanced Custom Detection List instead of a Simple Custom Detection List.
C. Upload the SHA-256 hash for the file to the Simple Custom Detection List.
An engineer must set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration. Which switch port MAC address security setting must be used?
A. aging
B. static
C. sticky
D. maximum
C. sticky
Which service allows a user export application usage and performance statistics with Cisco Application Visibility and Control?
A. NetFlow
B. SNORT
C. SNMP
D. 802.1X
A. NetFlow
Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?
A. Cisco Stealthwatch
B. Cisco Umbrella
C. Cisco AMP for Endpoints
D. Cisco ISE
D. Cisco ISE
the key is provisioning
Which parameter is required when configuring a NetFlow exporter on a Cisco router?
A. exporter name
B. exporter description
C. source interface
D. DSCP value
A. exporter name
Which type of encryption uses a public key and a private key?
A. nonlinear
B. symmetric
C. linear
D. asymmetric
D. asymmetric
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
A. TLS
B. LDAP
C. SSL
D. WCCP
E. NTLM
B. LDAP
E. NTLM