Security Flashcards
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
A. The ESA immediately makes another attempt to upload the file.
B. The file upload is abandoned.
C. AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.
D. The file is queued for upload when connectivity is restored
B. The file upload is abandoned.
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
A. PaaS
B. XaaS
C. IaaS
D. SaaS
A. PaaS
Why would a user choose an on-premises ESA versus the CES solution?
A. Sensitive data must remain onsite.
B. Demand is unpredictable.
C. The server team wants to outsource this service.
D. ESA is deployed inline.
A. Sensitive data must remain onsite.
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)
A. Sophos engine
B. white list
C. RAT
D. outbreak filters
E. DLP
A. Sophos engine
D. outbreak filters
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)
A. The Cisco WSA responds with its own IP address only if it is running in explicit mode.
B. The Cisco WSA is configured in a web browser only if it is running in transparent mode.
C. The Cisco WSA responds with its own IP address only if it is running in transparent mode.
D. The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
E. When the Cisco WSA is running in transparent mode, it uses the WSAג€™s own IP address as the HTTP request destination.
A. The Cisco WSA responds with its own IP address only if it is running in explicit mode.
D. The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
A. Modify web proxy settings.
B. Modify outbound malware scanning policies.
C. Modify identification profiles.
D. Modify an access policy.
A. Modify web proxy settings.
What is a characteristic of Firepower NGIPS inline deployment mode?
A. ASA with Firepower module cannot be deployed
B. It cannot take actions such as blocking traffic
C. It is out-of-band from traffic
D. It must have inline interface pairs configured
D. It must have inline interface pairs configured
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
A. Configure Directory Harvest Attack Prevention
B. Bypass LDAP access queries in the recipient access table.
C. Use Bounce Verification.
D. Configure incoming content filters.
Configure Directory Harvest Attack Prevention
In which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two.)
A. use Web Cache Communication Protocol
B. configure AD Group Policies to push proxy settings
C. configure the proxy IP address in the web-browser settings
D. configure policy-based routing on the network infrastructure
E. reference a Proxy Auto-Config file
A. use Web Cache Communication Protocol
D. configure policy-based routing on the network infrastructure
What is the function of the Context Directory Agent?
A. reads the AD logs to map IP addresses to usernames
B. relays user authentication requests from Cisco WSA to AD
C. maintains users group memberships
D. accepts user authentication requests on behalf of Cisco WSA for user identification
A. reads the AD logs to map IP addresses to usernames
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the Chat and Instant Messaging category. Which reputation score should be selected to accomplish this goal?
A. 5
B. 10
C. 3
D. 1
D. 1
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
A. The policy was created to send a message to quarantine instead of drop.
B. The file has a reputation score that is below the threshold.
C. The file has a reputation score that is above the threshold.
D. The policy was created to disable file analysis.
D. The policy was created to disable file analysis.
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?
A. SYN flood
B. slowloris
C. phishing
D. pharming
A. SYN flood
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
A. Threat Intelligence Director
B. Encrypted Traffic Analytics.
C. Cognitive Threat Analytics.
D. Cisco Talos Intelligence
A. Threat Intelligence Director
An organization has a Cisco ESA set up with DLP policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide this capability?
A. deliver and add disclaimer text
B. quarantine and send a DLP violation notification
C. quarantine and alter the subject header with a DLP violation
D. deliver and send copies to other recipient
B. quarantine and send a DLP violation notification
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)
A. Deploy the Cisco ESA in the DMZ.
B. Use outbreak filters from SenderBase.
C. Configure a recipient access table.
D. Enable a message tracking service.
E. Scan quarantined emails using AntiVirus signatures.
B. Use outbreak filters from SenderBase.
E. Scan quarantined emails using AntiVirus signatures.
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
A. Use destination block lists.
B. Configure application block lists.
C. Configure the intelligent proxy.
D. Set content settings to High.
C. Configure the intelligent proxy.
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
A. SQL injection
B. phishing
C. buffer overflow
D. DoS
B. phishing
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application-specific activity. After enabling the AVC engine, what must be done to implement this?
A. Use security services to configure the traffic monitor.
B. Use URL categorization to prevent application traffic.
C. Use an access policy group to configure application control settings.
D. Use web security reporting to validate engine functionality.
C. Use an access policy group to configure application control settings.
Which functions of an SDN architecture require southbound APIs to enable communication?
A. SDN controller and the network elements
B. management console and the SDN controller
C. management console and the cloud
D. SDN controller and the cloud
A) SDN controller and the network elements
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
A. put
B. options
C. get
D. push
E. connect
A. put
C. get
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
A. SDN controller and the cloud
B. management console and the SDN controller
C. management console and the cloud
D. SDN controller and the management solution
D) SDN controller and the management solution
What is a feature of the open platform capabilities of Cisco DNA Center?
A. application adapters
B. domain integration
C. intent-based APIs
D. automation adapters
C) intent-based APIs
The Cisco DNA Center open platform for intent-based networking provides 360-degree extensibility across multiple components, including:
● Intent-based APIs
● Process adapters
● Domain adapters
● SDKs
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
A. create an SNMP pull mechanism for managing AMP
B. gather network telemetry information from AMP for endpoints
C. get the process and PID information from the computers in the network
D. gather the network interface information about the computers AMP sees
import requests
client_id=adflkjlkjad
ap_key=alkjdljlf;a3dadfaf
url=’https://api.amp.cisco.com/v1/computers’
response=requests.get(url, auth=(client_id, api_key))
response_json=response.json()
for computer in response_json[‘data’]
network_addresses=computer[‘network_addresses’]
mac = network_interface.get(‘mac’)
ip = network_interface.get(‘ip’)
ipv6 = network_interface.get(‘ipv6’)
print(mac, ip, ipv6)
D. Gather the network interface information about the computers AMP sees