PdfPrep.com

Valid Cisco 350-701 SCOR Exam Questions

Cisco 350-701 SCOR exam questions are valid for you to study this Cisco CCNP Security 350-701 SCOR exam. Cisco 350-701 SCOR exam tests your knowledge of implementing and operating core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements. Study the free updated and valid Cisco CCNP Security 350-701 SCOR exam questions below.

Page 1 of 66

Loading... Loading...
1. What is a prerequisite when integrating a Cisco ISE server and an AD domain?

Loading... Loading...
2. An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

Loading... Loading...
3. Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Loading... Loading...
4. Refer to the exhibit.





What will happen when this Python script is run?

Loading... Loading...
5. An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance .

Which product should be used to meet these requirements?

Loading... Loading...
6. Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Loading... Loading...
7. Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Loading... Loading...
8. An organization has a Cisco Stealthwatch Cloud deployment in their environment.

Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?

Loading... Loading...
9. What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Loading... Loading...
10. What are two characteristics of Cisco DNA Center APIs? (Choose two)

Page 2 of 66

Loading... Loading...
11. What is a benefit of conducting device compliance checks?

Loading... Loading...
12. In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)

Loading... Loading...
13. What is the benefit of installing Cisco AMP for Endpoints on a network?

Loading... Loading...
14. An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped .

How would this be accomplished?

Loading... Loading...
15. Refer to the exhibit.





What will happen when the Python script is executed?

Loading... Loading...
16. Refer to the exhibit.





When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates .

Which configuration item must be modified to allow this?

Loading... Loading...
17. An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform .

What should be used to meet these requirements?

Loading... Loading...
18. An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API .

Which solution should be used to accomplish this goal?

Loading... Loading...
19. Why is it important to implement MFA inside of an organization?

Loading... Loading...
20. A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views .

What must the administrator do to accomplish this?

Page 3 of 66

Loading... Loading...
21. An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms .

Which software should be used to accomplish this goal?

Loading... Loading...
22. What is a function of 3DES in reference to cryptography?

Loading... Loading...
23. Which risk is created when using an Internet browser to access cloud-based service?

Loading... Loading...
24. An organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation .

Which actions must be performed in order to provide this capability?

Loading... Loading...
25. Refer to the exhibit.





An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD is not behind a NAT device .

Which command is needed to enable this on the Cisco FTD?

Loading... Loading...
26. A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface .

How does the switch behave in this situation?

Loading... Loading...
27. What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?

Loading... Loading...
28. What is a benefit of performing device compliance?

Loading... Loading...
29. Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?

Loading... Loading...
30. Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?

Page 4 of 66

Loading... Loading...
31. An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and operate as a cloud-native CASB .

Which solution must be used for this implementation?

Loading... Loading...
32. What are two Trojan malware attacks? (Choose two)

Loading... Loading...
33. What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?

Loading... Loading...
34. What is a capability of Cisco ASA Netflow?

Loading... Loading...
35. Which component of Cisco umbrella architecture increases reliability of the service?

Loading... Loading...
36. What is the benefit of integrating Cisco ISE with a MDM solution?

Loading... Loading...
37. An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices .

What should be done to ensure that all subdomains of domain.com are blocked?

Loading... Loading...
38. An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network .

Which solution meets these requirements?

Loading... Loading...
39. An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs .

Which solution meets the needs of the organization?

Loading... Loading...
40. An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default .

Which technology must be used to implement these requirements?

Page 5 of 66

Loading... Loading...
41. A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy .

What should be done in order to support this?

Loading... Loading...
42. Which type of encryption uses a public key and private key?

Loading... Loading...
43. What are two features of NetFlow flow monitoring? (Choose two)

Loading... Loading...
44. A customer has various external HTTP resources available including Intranet Extranet and Internet, with a proxy configuration running in explicit mode .

Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?

Loading... Loading...
45. Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?

Loading... Loading...
46. An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence .

Which protocol accomplishes this goal?

Loading... Loading...
47. An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24 .

Which command on the hub will allow the administrator to accomplish this?

Loading... Loading...
48. What is a difference between an XSS attack and an SQL injection attack?

Loading... Loading...
49. An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems .

What must be done to meet these requirements?

Loading... Loading...
50. Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?

Page 6 of 66

Loading... Loading...
51. Which attribute has the ability to change during the RADIUS CoA?

Loading... Loading...
52. With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?

Loading... Loading...
53. A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise .

What must be done in order to ensure that the created is functioning as it should?

Loading... Loading...
54. A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment. They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth .

Which solution would be best for this and why?

Loading... Loading...
55. How does Cisco Workload Optimization Manager help mitigate application performance issues?

Loading... Loading...
56. An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address .

What must be done to resolve this issue?

Loading... Loading...
57. What is a difference between a DoS attack and a DDoS attack?

Loading... Loading...
58. Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)

Loading... Loading...
59. Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Loading... Loading...
60. What is the purpose of CA in a PKI?

Page 7 of 66

Loading... Loading...
61. Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

Loading... Loading...
62. Which parameter is required when configuring a Netflow exporter on a Cisco Router?

Loading... Loading...
63. Which category includes DoS Attacks?

Loading... Loading...
64. What are two advantages of using Cisco Any connect over DMVPN? (Choose two)

Loading... Loading...
65. When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

Loading... Loading...
66. Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

Loading... Loading...
67. What is a difference between GETVPN and IPsec?

Loading... Loading...
68. What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

Loading... Loading...
69. An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being accessed via the firewall which requires that the administrator input the bad URL categories that the organization wants blocked into the access policy .

Which solution should be used to meet this requirement?

Loading... Loading...
70. An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users .

What must be done on the Cisco WSA to support these requirements?

Page 8 of 66

Loading... Loading...
71. An administrator configures new authorization policies within Cisco ISE and has difficulty profiling the devices. Attributes for the new Cisco IP phones that are profiled based on the RADIUS authentication are seen however the attributes for CDP or DHCP are not .

What should the administrator do to address this issue?

Loading... Loading...
72. A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis .

What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

Loading... Loading...
73. An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management port conflicts with other communications on the network and must be changed .

What must be done to ensure that all devices can communicate together?

Loading... Loading...
74. Which service allows a user export application usage and performance statistics with Cisco Application Visibility and control?

Loading... Loading...
75. An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero .

What is the issue?

Loading... Loading...
76. In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

Loading... Loading...
77. Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Loading... Loading...
78. Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Loading... Loading...
79. Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)

Loading... Loading...
80. Which two mechanisms are used to control phishing attacks? (Choose two)

Page 9 of 66

Loading... Loading...
81. Which two behavioral patterns characterize a ping of death attack? (Choose two)

Loading... Loading...
82. Which two preventive measures are used to control cross-site scripting? (Choose two)

Loading... Loading...
83. What is the difference between deceptive phishing and spear phishing?

Loading... Loading...
84. Which attack is commonly associated with C and C++ programming languages?

Loading... Loading...
85. What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

Loading... Loading...
86. Which two capabilities does TAXII support? (Choose two)

Loading... Loading...
87. Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Loading... Loading...
88. Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Loading... Loading...
89. What are two rootkit types? (Choose two)

Loading... Loading...
90. Which form of attack is launched using botnets?

Page 10 of 66

Loading... Loading...
91. Which threat involves software being used to gain unauthorized access to a computer system?

Loading... Loading...
92. Which type of attack is social engineering?

Loading... Loading...
93. Which two key and block sizes are valid for AES? (Choose two)

Loading... Loading...
94. Which two descriptions of AES encryption are true? (Choose two)

Loading... Loading...
95. Which algorithm provides encryption and authentication for data plane communication?

Loading... Loading...
96. Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Loading... Loading...
97. What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

Loading... Loading...
98. Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Loading... Loading...
99. Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Loading... Loading...
100. Which VPN technology can support a multivendor environment and secure traffic between sites?

Page 11 of 66

Loading... Loading...
101. A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB .

What action is needed to authenticate the VPN?

Loading... Loading...
102. Refer to the exhibit.





A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status .

What is the problem according to this command output?

Loading... Loading...
103. What is a difference between FlexVPN and DMVPN?

Loading... Loading...
104. Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Loading... Loading...
105. What is a commonality between DMVPN and FlexVPN technologies?

Loading... Loading...
106. The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

Loading... Loading...
107. Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)

Loading... Loading...
108. Which functions of an SDN architecture require southbound APIs to enable communication?

Loading... Loading...
109. Which API is used for Content Security?

Loading... Loading...
110. Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Page 12 of 66

Loading... Loading...
111. Refer to the exhibit.





What is the result of this Python script of the Cisco DNA Center API?

Loading... Loading...
112. Refer to the exhibit.





What does the API do when connected to a Cisco security appliance?

Loading... Loading...
113. Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Loading... Loading...
114. Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Loading... Loading...
115. Which option is the main function of Cisco Firepower impact flags?

Loading... Loading...
116. On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?

Loading... Loading...
117. Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Loading... Loading...
118. Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Loading... Loading...
119. Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Loading... Loading...
120. Which information is required when adding a device to Firepower Management Center?

Page 13 of 66

Loading... Loading...
121. Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Loading... Loading...
122. The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic.

Where must the ASA be added on the Cisco UC Manager platform?

Loading... Loading...
123. Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Loading... Loading...
124. Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Loading... Loading...
125. Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

Loading... Loading...
126. Which statement about IOS zone-based firewalls is true?

Loading... Loading...
127. What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

Loading... Loading...
128. Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

Loading... Loading...
129. Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Loading... Loading...
130. Which ASA deployment mode can provide separation of management on a shared appliance?

Page 14 of 66

Loading... Loading...
131. What is a prerequisite when integrating a Cisco ISE server and an AD domain?

Loading... Loading...
132. An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

Loading... Loading...
133. Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Loading... Loading...
134. Refer to the exhibit.





What will happen when this Python script is run?

Loading... Loading...
135. An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance .

Which product should be used to meet these requirements?

Loading... Loading...
136. Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Loading... Loading...
137. Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Loading... Loading...
138. An organization has a Cisco Stealthwatch Cloud deployment in their environment.

Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?

Loading... Loading...
139. What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Loading... Loading...
140. What are two characteristics of Cisco DNA Center APIs? (Choose two)

Page 15 of 66

Loading... Loading...
141. What is a benefit of conducting device compliance checks?

Loading... Loading...
142. In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)

Loading... Loading...
143. What is the benefit of installing Cisco AMP for Endpoints on a network?

Loading... Loading...
144. An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped .

How would this be accomplished?

Loading... Loading...
145. Refer to the exhibit.





What will happen when the Python script is executed?

Loading... Loading...
146. Refer to the exhibit.





When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates .

Which configuration item must be modified to allow this?

Loading... Loading...
147. An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform .

What should be used to meet these requirements?

Loading... Loading...
148. An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API .

Which solution should be used to accomplish this goal?

Loading... Loading...
149. Why is it important to implement MFA inside of an organization?

Loading... Loading...
150. A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views .

What must the administrator do to accomplish this?

Page 16 of 66

Loading... Loading...
151. An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms .

Which software should be used to accomplish this goal?

Loading... Loading...
152. What is a function of 3DES in reference to cryptography?

Loading... Loading...
153. Which risk is created when using an Internet browser to access cloud-based service?

Loading... Loading...
154. An organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation .

Which actions must be performed in order to provide this capability?

Loading... Loading...
155. Refer to the exhibit.





An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD is not behind a NAT device .

Which command is needed to enable this on the Cisco FTD?

Loading... Loading...
156. A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface .

How does the switch behave in this situation?

Loading... Loading...
157. What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?

Loading... Loading...
158. What is a benefit of performing device compliance?

Loading... Loading...
159. Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?

Loading... Loading...
160. Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?

Page 17 of 66

Loading... Loading...
161. An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and operate as a cloud-native CASB .

Which solution must be used for this implementation?

Loading... Loading...
162. What are two Trojan malware attacks? (Choose two)

Loading... Loading...
163. What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?

Loading... Loading...
164. What is a capability of Cisco ASA Netflow?

Loading... Loading...
165. Which component of Cisco umbrella architecture increases reliability of the service?

Loading... Loading...
166. What is the benefit of integrating Cisco ISE with a MDM solution?

Loading... Loading...
167. An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices .

What should be done to ensure that all subdomains of domain.com are blocked?

Loading... Loading...
168. An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network .

Which solution meets these requirements?

Loading... Loading...
169. An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs .

Which solution meets the needs of the organization?

Loading... Loading...
170. An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default .

Which technology must be used to implement these requirements?

Page 18 of 66

Loading... Loading...
171. A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy .

What should be done in order to support this?

Loading... Loading...
172. Which type of encryption uses a public key and private key?

Loading... Loading...
173. What are two features of NetFlow flow monitoring? (Choose two)

Loading... Loading...
174. A customer has various external HTTP resources available including Intranet Extranet and Internet, with a proxy configuration running in explicit mode .

Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?

Loading... Loading...
175. Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?

Loading... Loading...
176. An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence .

Which protocol accomplishes this goal?

Loading... Loading...
177. An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24 .

Which command on the hub will allow the administrator to accomplish this?

Loading... Loading...
178. What is a difference between an XSS attack and an SQL injection attack?

Loading... Loading...
179. An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems .

What must be done to meet these requirements?

Loading... Loading...
180. Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?

Page 19 of 66

Loading... Loading...
181. Which attribute has the ability to change during the RADIUS CoA?

Loading... Loading...
182. With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?

Loading... Loading...
183. A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise .

What must be done in order to ensure that the created is functioning as it should?

Loading... Loading...
184. A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment. They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth .

Which solution would be best for this and why?

Loading... Loading...
185. How does Cisco Workload Optimization Manager help mitigate application performance issues?

Loading... Loading...
186. An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address .

What must be done to resolve this issue?

Loading... Loading...
187. What is a difference between a DoS attack and a DDoS attack?

Loading... Loading...
188. Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)

Loading... Loading...
189. Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

Loading... Loading...
190. What is the purpose of CA in a PKI?

Page 20 of 66

Loading... Loading...
191. Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

Loading... Loading...
192. Which parameter is required when configuring a Netflow exporter on a Cisco Router?

Loading... Loading...
193. Which category includes DoS Attacks?

Loading... Loading...
194. What are two advantages of using Cisco Any connect over DMVPN? (Choose two)

Loading... Loading...
195. When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

Loading... Loading...
196. Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

Loading... Loading...
197. What is a difference between GETVPN and IPsec?

Loading... Loading...
198. What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

Loading... Loading...
199. An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being accessed via the firewall which requires that the administrator input the bad URL categories that the organization wants blocked into the access policy .

Which solution should be used to meet this requirement?

Loading... Loading...
200. An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users .

What must be done on the Cisco WSA to support these requirements?

Page 21 of 66

Loading... Loading...
201. An administrator configures new authorization policies within Cisco ISE and has difficulty profiling the devices. Attributes for the new Cisco IP phones that are profiled based on the RADIUS authentication are seen however the attributes for CDP or DHCP are not .

What should the administrator do to address this issue?

Loading... Loading...
202. A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis .

What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

Loading... Loading...
203. An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management port conflicts with other communications on the network and must be changed .

What must be done to ensure that all devices can communicate together?

Loading... Loading...
204. Which service allows a user export application usage and performance statistics with Cisco Application Visibility and control?

Loading... Loading...
205. An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero .

What is the issue?

Loading... Loading...
206. In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

Loading... Loading...
207. Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Loading... Loading...
208. Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

Loading... Loading...
209. Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)

Loading... Loading...
210. Which two mechanisms are used to control phishing attacks? (Choose two)

Page 22 of 66

Loading... Loading...
211. Which two behavioral patterns characterize a ping of death attack? (Choose two)

Loading... Loading...
212. Which two preventive measures are used to control cross-site scripting? (Choose two)

Loading... Loading...
213. What is the difference between deceptive phishing and spear phishing?

Loading... Loading...
214. Which attack is commonly associated with C and C++ programming languages?

Loading... Loading...
215. What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

Loading... Loading...
216. Which two capabilities does TAXII support? (Choose two)

Loading... Loading...
217. Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

Loading... Loading...
218. Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Loading... Loading...
219. What are two rootkit types? (Choose two)

Loading... Loading...
220. Which form of attack is launched using botnets?

Page 23 of 66

Loading... Loading...
221. Which threat involves software being used to gain unauthorized access to a computer system?

Loading... Loading...
222. Which type of attack is social engineering?

Loading... Loading...
223. Which two key and block sizes are valid for AES? (Choose two)

Loading... Loading...
224. Which two descriptions of AES encryption are true? (Choose two)

Loading... Loading...
225. Which algorithm provides encryption and authentication for data plane communication?

Loading... Loading...
226. Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

Loading... Loading...
227. What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

Loading... Loading...
228. Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Loading... Loading...
229. Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Loading... Loading...
230. Which VPN technology can support a multivendor environment and secure traffic between sites?

Page 24 of 66

Loading... Loading...
231. A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB .

What action is needed to authenticate the VPN?

Loading... Loading...
232. Refer to the exhibit.





A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status .

What is the problem according to this command output?

Loading... Loading...
233. What is a difference between FlexVPN and DMVPN?

Loading... Loading...
234. Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Loading... Loading...
235. What is a commonality between DMVPN and FlexVPN technologies?

Loading... Loading...
236. The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

Loading... Loading...
237. Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)

Loading... Loading...
238. Which functions of an SDN architecture require southbound APIs to enable communication?

Loading... Loading...
239. Which API is used for Content Security?

Loading... Loading...
240. Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Page 25 of 66

Loading... Loading...
241. Refer to the exhibit.





What is the result of this Python script of the Cisco DNA Center API?

Loading... Loading...
242. Refer to the exhibit.





What does the API do when connected to a Cisco security appliance?

Loading... Loading...
243. Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Loading... Loading...
244. Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Loading... Loading...
245. Which option is the main function of Cisco Firepower impact flags?

Loading... Loading...
246. On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?

Loading... Loading...
247. Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?

Loading... Loading...
248. Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Loading... Loading...
249. Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Loading... Loading...
250. Which information is required when adding a device to Firepower Management Center?

Page 26 of 66

Loading... Loading...
251. Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Loading... Loading...
252. The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic.

Where must the ASA be added on the Cisco UC Manager platform?

Loading... Loading...
253. Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Loading... Loading...
254. Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Loading... Loading...
255. Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

Loading... Loading...
256. Which statement about IOS zone-based firewalls is true?

Loading... Loading...
257. What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

Loading... Loading...
258. Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

Loading... Loading...
259. Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Loading... Loading...
260. Which ASA deployment mode can provide separation of management on a shared appliance?

Page 27 of 66

Loading... Loading...
261. An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to sites but other sites are not accessible due to an error.

Why is the error occurring?

Loading... Loading...
262. What are the two types Of managed Intercloud Fabric deployment models? (Choose two)

Loading... Loading...
263. Which Cisco security solution protects remote users against phishing attacks when they are not

connected to the VPN?

Loading... Loading...
264. An engineer is configuring 802. 1 X authentication on Cisco switches in the network and is using COA as a mechanism.

Which port on the firewall must be opened to allow the COA traffic to traverse the network?

Loading... Loading...
265. How is DNS tunneling used to exflltrate data out of a corporate network?

Loading... Loading...
266. An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA Which Cisco ASA command must be used?

Loading... Loading...
267. An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network.

Which product should be used to accomplish this goal?

Loading... Loading...
268. Refer to the exhibit.





When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates.

Which configuration item must be modified to allow this?

Loading... Loading...
269. Refer to the exhibit.





What will happen when this Python script is run?

Loading... Loading...
270. network administrator needs to find out what assets currently exist on the network. Third party systems need to be able to feed host data into Cisco Firepower.

What must be configured to accomplish this?

Page 28 of 66

Loading... Loading...
271. What is the role of an endpoint in protecting a user from a phishing attack?

Loading... Loading...
272. Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco talos?

Loading... Loading...
273. A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server. and the new device does not have a supplicant available.

What must be done in order to securely connect this device to the network?

Loading... Loading...
274. An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower.

Which feature should be used to accomplish this?

Loading... Loading...
275. An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance.

Which product should be used to meet these requirements?

Loading... Loading...
276. With which components does a southbound API within a software-ciefined network architecture communicate?

Loading... Loading...
277. What is a prerequisite when integrating a Cisco ISE server and an AD domain?

Loading... Loading...
278. An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users. data, and applications. There is a requirement to use the Cisco cloud-native CASB and Cloud cybersecurity platform.

What should be used to meet these requirements?

Loading... Loading...
279. What are two characteristics of Cisco DNA Center APIs? (Choose two)

Loading... Loading...
280. When configuring ISAKMP for IKEv1 Phase 1 on a Cisco IOS router. an administrator needs to input the command crypto isakmp key cisco address 0. 0. 0. 0 . The administrator is not sure what the IP address in this command is used for.

What would be the effect of changing the IP address from 0. 0. 0. 0 to 1. 2. 3. 4?

Page 29 of 66

Loading... Loading...
281. Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

Loading... Loading...
282. A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.

How does the switch behave in this situation?

Loading... Loading...
283. What must be integrated with Cisco Threat Intelligence Director to provide information about security threats.

Which allows the SOC to proactively automate responses to those threats?

Loading... Loading...
284. Drag and drop the common security threats from left onto the definitions on the right.



Loading... Loading...
285. Drag and drop the descriptions from the left onto the correct protocol versions on the right.



Loading... Loading...
286. Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.



Loading... Loading...
287. Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web.



Loading... Loading...
288. Drag and drop the threats from the left onto examples of that threat on the right.



Loading... Loading...
289. Drag and drop the NetFlow export format from the left onto the descriptions on the right.



Loading... Loading...
290. Drag and drop the solutions from the left onto the solution’s benefits on the right.



Page 30 of 66

Loading... Loading...
291. What is the difference between Cross-site Scripting and SQL Injection, attacks?

Loading... Loading...
292. Art administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower.

Which feature should be used to accomplish this?

Loading... Loading...
293. Refer to the exhibit.





Which command was used to display this output?

Loading... Loading...
294. What is managed by Cisco Security Manager?

Loading... Loading...
295. Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained.

Which command should be configured on the switch interface in order to provide the user with network connectivity?

Loading... Loading...
296. Which feature is supported when deploying Cisco ASAv within the AWS public cloud?

Loading... Loading...
297. Which protocol provides the strongest throughput performance when using Cisco Anyconnect VPN?

Loading... Loading...
298. An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.

What action would allow the attacker to gain access to machine 1 but not machine 2?

Loading... Loading...
299. What are two DDoS attack categories? (Choose two)

Loading... Loading...
300. When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

Page 31 of 66

Loading... Loading...
301. How does Cisco Advanced Phishing Protection protect users?

Loading... Loading...
302. An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device.

Which mechanism should the engineer configure to accomplish this goal?

Loading... Loading...
303. Refer to the exhibit.





A network administrator configures command authorization for the admin5 user What is the admin5 user able to do on HQ_Router after this configuration?

Loading... Loading...
304. What provides visibility and awareness into what is currently occurring on the network?

Loading... Loading...
305. An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network.

Which action tests the routing?

Loading... Loading...
306. Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

Loading... Loading...
307. Which API is used for Content Security?

Loading... Loading...
308. What is a characteristic of Dynamic ARP Inspection?

Loading... Loading...
309. Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower

block based?

(Choose two.)

Loading... Loading...
310. Which type of attack is social engineering?

Page 32 of 66

Loading... Loading...
311. For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

Loading... Loading...
312. What is a benefit of using Cisco FMC over Cisco ASDM?

Loading... Loading...
313. Which two preventive measures are used to control cross-site scripting? (Choose two.)

Loading... Loading...
314. Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Loading... Loading...
315. Drag and drop the capabilities from the left onto the correct technologies on the right.



Loading... Loading...
316. Which information is required when adding a device to Firepower Management Center?

Loading... Loading...
317. Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?

Loading... Loading...
318. What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)

Loading... Loading...
319. Which compliance status is shown when a configured posture policy requirement is not

met?

Loading... Loading...
320. What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

Page 33 of 66

Loading... Loading...
321. What are two DDoS attack categories? (Choose two.)

Loading... Loading...
322. A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.

Which command achieves this goal?

Loading... Loading...
323. Which type of protection encrypts RSA keys when they are exported and imported?

Loading... Loading...
324. A cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict.

What is causing this issue?

Loading... Loading...
325. An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower.

Which feature should be used to accomplish this?

Loading... Loading...
326. Which attack is preventable by Cisco ESA but not by the Cisco WSA?

Loading... Loading...
327. A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad servers must be prevented.

Which two actiob must be taken in order to meet these requirements? (Choose Two)

Loading... Loading...
328. Which type of dashboard does Cisco DNA Center provide for complete control of the network?

Loading... Loading...
329. In an IaaS cloud services model, which security function is the provider responsible for managing?

Loading... Loading...
330. A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC and server, and the new device does not have a supplicant available.

What must be done in order to security connect this device in the network?

Page 34 of 66

Loading... Loading...
331. An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisco392368270. The server 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2. however is unable to do so.

Which command is required to enable the client to accept the server’s authentication key?

Loading... Loading...
332. What is the role of an endpoint in protecting a user from a phishing attack?

Loading... Loading...
333. Drag and drop the NetFlow export formats from the left onto the descriptions on the right?



Loading... Loading...
334. An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic.

Which action will accomplish this task?

Loading... Loading...
335. With which components does a southbound API within a software-defined network architecture communicate?

Loading... Loading...
336. A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower.

What must be configured to accomplish this?

Loading... Loading...
337. When configuring ISAKMP for IKEv1 Phase 1 on a Cisco IOS router, an administrator needs to input the command cry to isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP address in this command is used for.

What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?

Loading... Loading...
338. Which suspicious pattern enables the cisco Tetration platform to learn the normal behavior of users?

Loading... Loading...
339. Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.

Which two actions must be taken to ensure that interfaces are put back into services?

Loading... Loading...
340. What is the difference between Cross-site Scripting and SQL Injection attack?

Page 35 of 66

Loading... Loading...
341. A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network.

Where should the administrator begin troubleshooting to verify the authentication details?

Loading... Loading...
342. What is a prerequisite when integrating a Cisco ISE server and an AD domain?

Loading... Loading...
343. An organization recently installed a Cisco WSA and would like to take advantage of the A

VC engine to allow the organization to create a policy to control application specific activity.

After enabling the AVC engine, what must be done to implement this?

Loading... Loading...
344. Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

Loading... Loading...
345. Refer to the exhibit:





What will happen when this Python script is run?

Loading... Loading...
346. An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance.

Which product should be used to meet these requirements?

Loading... Loading...
347. Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Loading... Loading...
348. Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Loading... Loading...
349. An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but togs are not being received from the on-premise network.

What action will resolve this issue?

Loading... Loading...
350. What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Page 36 of 66

Loading... Loading...
351. What are two characteristics of Cisco DNA Center APIs? {Choose two.)

Loading... Loading...
352. What is a benefit of conducting device compliance checks?

Loading... Loading...
353. In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two.)

Loading... Loading...
354. An administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped.

How would this be accomplished?

Loading... Loading...
355. Refer to the exhibit





What will happen when the Python script is executed?

Loading... Loading...
356. Refer to the exhibit





When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates.

Which configuration item must be modified to allow this?

Loading... Loading...
357. An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud-native CA3B and cloud cybersecurity platform.

What should be used to meet these requirements?

Loading... Loading...
358. An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API.

Which solution should be used to accomplish this goal?

Loading... Loading...
359. Which feature requires a network discovery policy on the Cisco Firepower NGIPS?

Loading... Loading...
360. An engineer needs a cloud solution that with monitor traffic, create incidents based cn events, and integrate with other cloud solutions via an API.

Which solution should be used to accomplish this goal?

Page 37 of 66

Loading... Loading...
361. Why is it important to implement MFA inside of an organization?

Loading... Loading...
362. Drag and drop:

The solutions from the left onto the solution's benefits on the right.



Loading... Loading...
363. A network administrator is configuring SNMPv3 on a new router. The users have already been created, however an additional configuration is needed to facilitate access to the SNMP views.

What must the administrator do to accomplish this?

Loading... Loading...
364. An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms.

Which software should be used to accomplish this goal?

Loading... Loading...
365. Which two key and block sizes are valid for AES? (Choose two.)

Loading... Loading...
366. Refer to the exhibit.





Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Loading... Loading...
367. Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Loading... Loading...
368. Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Loading... Loading...
369. Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Loading... Loading...
370. What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

Page 38 of 66

Loading... Loading...
371. An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network.

What must be configured, based on a predefined threshold, to address this issue?

Loading... Loading...
372. What is the purpose of the certificate signing request when adding a new certificate for a server?

Loading... Loading...
373. In which cloud services model is the tenant responsible for virtual machine OS patching?

Loading... Loading...
374. What is the benefit of installing Cisco AMP for Endpoints on a network?

Loading... Loading...
375. Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Loading... Loading...
376. What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

Loading... Loading...
377. Which Dos attack uses fragmented packets to crash a target machine?

Loading... Loading...
378. Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)

Loading... Loading...
379. Which two cryptographic algorithms are used with IPsec? {Choose two.)

Loading... Loading...
380. Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

Page 39 of 66

Loading... Loading...
381. What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

Loading... Loading...
382. A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment.

Which tool should be used to accomplish this goal?

Loading... Loading...
383. An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE.

Which CoA type achieves this goal?

Loading... Loading...
384. Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

Loading... Loading...
385. What is the difference between deceptive phishing and spear phishing?

Loading... Loading...
386. What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

Loading... Loading...
387. Which attack is commonly associated with C and C++ programming languages?

Loading... Loading...
388. An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications.

Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

Loading... Loading...
389. What must be used to share data between multiple security products?

Loading... Loading...
390. How does Cisco Advanced Phishing Protection protect users?

Page 40 of 66

Loading... Loading...
391. Drag and drop the descriptions from the left onto the correct protocol versions on the right.



Loading... Loading...
392. What is the purpose of the My Devices Portal in a Cisco ISE environment?

Loading... Loading...
393. Which two activities can be done using Cisco DNA Center? (Choose two.)

Loading... Loading...
394. Which SNMPv3 configuration must be used to support the strongest security possible?

Loading... Loading...
395. Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Loading... Loading...
396. What is the function of the Context Directory Agent?

Loading... Loading...
397. Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Loading... Loading...
398. Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

Loading... Loading...
399. Drag and drop the threats from the left onto examples of that threat on the right



Loading... Loading...
400. What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

Page 41 of 66

Loading... Loading...
401. When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?

Loading... Loading...
402. Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Loading... Loading...
403. An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group.

Which probe must be enabled for this type of profiling to work?

Loading... Loading...
404. Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.



Loading... Loading...
405. A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability .

What is the connection status in both cases?

Loading... Loading...
406. What is a key difference between Cisco Firepower and Cisco ASA?

Loading... Loading...
407. Which ASA deployment mode can provide separation of management on a shared appliance?

Loading... Loading...
408. What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

Loading... Loading...
409. A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category .

Which reputation score should be selected to accomplish this goal?

Loading... Loading...
410. In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

Page 42 of 66

Loading... Loading...
411. Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.



Loading... Loading...
412. What is the difference between deceptive phishing and spear phishing?

Loading... Loading...
413. What is a characteristic of a bridge group in ASA Firewall transparent mode''

Loading... Loading...
414. An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients .

What must be done on the Cisco ESA to accomplish this goal?

Loading... Loading...
415. When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

Loading... Loading...
416. What is provided by the Secure Hash Algorithm in a VPN?

Loading... Loading...
417. A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance .

Which ASA deployment mode meets these needs?

Loading... Loading...
418. An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network.

Which product should be used to accomplish this goal?

Loading... Loading...
419. How does Cisco Umbrella archive logs to an enterprise-owned storage?

Loading... Loading...
420. Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Page 43 of 66

Loading... Loading...
421. What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?

Loading... Loading...
422. A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication .

How will the Cisco ESA handle any files which need analysis?

Loading... Loading...
423. Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

Loading... Loading...
424. An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth .

Which product meets all of these requirements?

Loading... Loading...
425. Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Loading... Loading...
426. Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Loading... Loading...
427. Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Loading... Loading...
428. Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.



Loading... Loading...
429. Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

Loading... Loading...
430. How is Cisco Umbrella configured to log only security events?

Page 44 of 66

Loading... Loading...
431. Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Loading... Loading...
432. Which threat involves software being used to gain unauthorized access to a computer system?

Loading... Loading...
433. Which type of algorithm provides the highest level of protection against brute-force attacks?

Loading... Loading...
434. Refer to the exhibit.





What is the result of this Python script of the Cisco DNA Center API?

Loading... Loading...
435. Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two).

Loading... Loading...
436. A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface .

What is causing this problem?

Loading... Loading...
437. What are two rootkit types? (Choose two)

Loading... Loading...
438. An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network .

Which action tests the routing?

Loading... Loading...
439. Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

Loading... Loading...
440. Which API is used for Content Security?

Page 45 of 66

Loading... Loading...
441. What is a characteristic of Dynamic ARP Inspection?

Loading... Loading...
442. Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower

block based?

(Choose two.)

Loading... Loading...
443. Which type of attack is social engineering?

Loading... Loading...
444. For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

Loading... Loading...
445. What is a benefit of using Cisco FMC over Cisco ASDM?

Loading... Loading...
446. Which two preventive measures are used to control cross-site scripting? (Choose two.)

Loading... Loading...
447. Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Loading... Loading...
448. Drag and drop the capabilities from the left onto the correct technologies on the right.



Loading... Loading...
449. Which information is required when adding a device to Firepower Management Center?

Loading... Loading...
450. Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?

Page 46 of 66

Loading... Loading...
451. What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)

Loading... Loading...
452. Which compliance status is shown when a configured posture policy requirement is not

met?

Loading... Loading...
453. What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

Loading... Loading...
454. What are two DDoS attack categories? (Choose two.)

Loading... Loading...
455. A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1 .

Which command achieves this goal?

Loading... Loading...
456. Which type of protection encrypts RSA keys when they are exported and imported?

Loading... Loading...
457. Which two key and block sizes are valid for AES? (Choose two.)

Loading... Loading...
458. Refer to the exhibit.





Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

Loading... Loading...
459. Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Loading... Loading...
460. Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Page 47 of 66

Loading... Loading...
461. Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

Loading... Loading...
462. What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

Loading... Loading...
463. An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network .

What must be configured, based on a predefined threshold, to address this issue?

Loading... Loading...
464. What is the purpose of the certificate signing request when adding a new certificate for a server?

Loading... Loading...
465. In which cloud services model is the tenant responsible for virtual machine OS patching?

Loading... Loading...
466. What is the benefit of installing Cisco AMP for Endpoints on a network?

Loading... Loading...
467. Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Loading... Loading...
468. What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

Loading... Loading...
469. Which Dos attack uses fragmented packets to crash a target machine?

Loading... Loading...
470. Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? (Choose Two)

Page 48 of 66

Loading... Loading...
471. Which two cryptographic algorithms are used with IPsec? {Choose two.)

Loading... Loading...
472. Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

Loading... Loading...
473. What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

Loading... Loading...
474. A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment.

Which tool should be used to accomplish this goal?

Loading... Loading...
475. An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE .

Which CoA type achieves this goal?

Loading... Loading...
476. Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

Loading... Loading...
477. What is the difference between deceptive phishing and spear phishing?

Loading... Loading...
478. What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

Loading... Loading...
479. Which attack is commonly associated with C and C++ programming languages?

Loading... Loading...
480. An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications .

Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

Page 49 of 66

Loading... Loading...
481. What must be used to share data between multiple security products?

Loading... Loading...
482. How does Cisco Advanced Phishing Protection protect users?

Loading... Loading...
483. Drag and drop the descriptions from the left onto the correct protocol versions on the right.



Loading... Loading...
484. What is the purpose of the My Devices Portal in a Cisco ISE environment?

Loading... Loading...
485. Which two activities can be done using Cisco DNA Center? (Choose two.)

Loading... Loading...
486. Which SNMPv3 configuration must be used to support the strongest security possible?

Loading... Loading...
487. Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Loading... Loading...
488. What is the function of the Context Directory Agent?

Loading... Loading...
489. Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Loading... Loading...
490. What is the benefit of installing Cisco AMP for Endpoints on a network?

Page 50 of 66

Loading... Loading...
491. Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?

Loading... Loading...
492. An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism.

Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

Loading... Loading...
493. What is the purpose of the certificate signing request when adding a new certificate for a server?

Loading... Loading...
494. What is the purpose of the My Devices Portal in a Cisco ISE environment?

Loading... Loading...
495. An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.

What must be configured to accomplish this?

Loading... Loading...
496. What is an attribute of the DevSecOps process?

Loading... Loading...
497. A user has a device in the network that is receiving too many connection requests from multiple machines.

Which type of attack is the device undergoing?

Loading... Loading...
498. Refer to the exhibit.





An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained.

Which command should be configured on the switch interface in order to provide the user with network connectivity?

Loading... Loading...
499. A company is experiencing exfiltration of credit card numbers that are not being stored on-premise.

The company needs to be able to protect sensitive data throughout the full environment.

Which tool should be used to accomplish this goal?

Loading... Loading...
500. Which algorithm provides asymmetric encryption?

Page 51 of 66

Loading... Loading...
501. For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?

Loading... Loading...
502. When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

Loading... Loading...
503. What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

Loading... Loading...
504. Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?

Loading... Loading...
505. A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network.

Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)

Loading... Loading...
506. Which two fields are defined in the NetFlow flow? (Choose two.)

Loading... Loading...
507. An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error.

Why is the error occurring?

Loading... Loading...
508. An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing.

Which action should be taken to accomplish this goal?

Loading... Loading...
509. How does DNS Tunneling exfiltrate data?

Loading... Loading...
510. What is the function of SDN southbound API protocols?

Page 52 of 66

Loading... Loading...
511. What is a characteristic of a bridge group in ASA Firewall transparent mode?

Loading... Loading...
512. A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category.

Which reputation score should be selected to accomplish this goal?

Loading... Loading...
513. Which public cloud provider supports the Cisco Next Generation Firewall Virtual?

Loading... Loading...
514. What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

Loading... Loading...
515. What is a benefit of using Cisco FMC over Cisco ASDM?

Loading... Loading...
516. What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

Loading... Loading...
517. Which type of algorithm provides the highest level of protection against brute-force attacks?

Loading... Loading...
518. Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)

Loading... Loading...
519. Which two cryptographic algorithms are used with IPsec? {Choose two.)

Loading... Loading...
520. What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?

Page 53 of 66

Loading... Loading...
521. How does Cisco Advanced Phishing Protection protect users?

Loading... Loading...
522. What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)

Loading... Loading...
523. Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

Loading... Loading...
524. In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

Loading... Loading...
525. Refer to the exhibit.





Which type of authentication is in use?

Loading... Loading...
526. What are two benefits of Flexible NetFlow records? (Choose two)

Loading... Loading...
527. After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence.

The information gained from the phishing attack was a result of users visiting known malicious websites.

What must be done in order to prevent this from happening in the future?

Loading... Loading...
528. An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients.

What must be done on the Cisco ESA to accomplish this goal?

Loading... Loading...
529. Drag and Drop Question

Drag and drop the descriptions from the left onto the encryption algorithms on the right.



Loading... Loading...
530. Drag and Drop Question

Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.



Page 54 of 66

Loading... Loading...
531. Drag and Drop Question

Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.



Loading... Loading...
532. Drag and Drop Question

Drag and drop the threats from the left onto examples of that threat on the right



Loading... Loading...
533. Drag and Drop Question

Drag and drop the VPN functions from the left onto the description on the right.



Loading... Loading...
534. What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

Loading... Loading...
535. Which command enables 802.1X globally on a Cisco switch?

Loading... Loading...
536. What is the function of Cisco Cloudlock for data security?

Loading... Loading...
537. For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

Loading... Loading...
538. What is a characteristic of Dynamic ARP Inspection?

Loading... Loading...
539. Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

Loading... Loading...
540. Where are individual sites specified to be blacklisted in Cisco Umbrella?

Page 55 of 66

Loading... Loading...
541. Which statement about IOS zone-based firewalls is true?

Loading... Loading...
542. Which two activities can be done using Cisco DNA Center? (Choose two.)

Loading... Loading...
543. Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Loading... Loading...
544. Which VPN technology can support a multivendor environment and secure traffic between sites?

Loading... Loading...
545. Which SNMPv3 configuration must be used to support the strongest security possible?

Loading... Loading...
546. Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

Loading... Loading...
547. Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

Loading... Loading...
548. An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.

Which two solutions mitigate the risk of this ransomware infection? (Choose two.)

Loading... Loading...
549. Why would a user choose an on-premises ESA versus the CES solution?

Loading... Loading...
550. Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Page 56 of 66

Loading... Loading...
551. Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

Loading... Loading...
552. What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

Loading... Loading...
553. Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two.)

Loading... Loading...
554. How is Cisco Umbrella configured to log only security events?

Loading... Loading...
555. What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

Loading... Loading...
556. On which part of the IT environment does DevSecOps focus?

Loading... Loading...
557. Which functions of an SDN architecture require southbound APIs to enable communication?

Loading... Loading...
558. What is a characteristic of traffic storm control behavior?

Loading... Loading...
559. Which two request of REST API are valid on the Cisco ASA Platform? (Choose two.)

Loading... Loading...
560. In a PaaS model, which layer is the tenant responsible for maintaining and patching?

Page 57 of 66

Loading... Loading...
561. An engineer is configuring AMP for endpoints and wants to block certain files from executing.

Which outbreak control method is used to accomplish this task?

Loading... Loading...
562. Which ASA deployment mode can provide separation of management on a shared appliance?

Loading... Loading...
563. Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)

Loading... Loading...
564. What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

Loading... Loading...
565. What provides visibility and awareness into what is currently occurring on the network?

Loading... Loading...
566. Which attack is commonly associated with C and C++ programming languages?

Loading... Loading...
567. An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE.

Which CoA type achieves this goal?

Loading... Loading...
568. Refer to the exhibit.





Which command was used to display this output?

Loading... Loading...
569. Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)

Loading... Loading...
570. How does Cisco Stealthwatch Cloud provide security for cloud environments?

Page 58 of 66

Loading... Loading...
571. Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

Loading... Loading...
572. Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

Loading... Loading...
573. The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

Loading... Loading...
574. Refer to the exhibit.





What is a result of the configuration?

Loading... Loading...
575. Which information is required when adding a device to Firepower Management Center?

Loading... Loading...
576. Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

Loading... Loading...
577. What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

Loading... Loading...
578. Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Loading... Loading...
579. Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Loading... Loading...
580. Which SNMPv3 configuration must be used to support the strongest security possible?

Page 59 of 66

Loading... Loading...
581. Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Loading... Loading...
582. What is a characteristic of Dynamic ARP Inspection?

Loading... Loading...
583. Which statement about IOS zone-based firewalls is true?

Loading... Loading...
584. Which two key and block sizes are valid for AES? (Choose two.)

Loading... Loading...
585. An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth.

Which product meets all of these requirements?

Loading... Loading...
586. Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Loading... Loading...
587. Which two preventive measures are used to control cross-site scripting? (Choose two.)

Loading... Loading...
588. Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Loading... Loading...
589. Which command enables 802.1X globally on a Cisco switch?

Loading... Loading...
590. Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

Page 60 of 66

Loading... Loading...
591. Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Loading... Loading...
592. Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)

Loading... Loading...
593. Which two activities can be done using Cisco DNA Center? (Choose two.)

Loading... Loading...
594. Which ASA deployment mode can provide separation of management on a shared appliance?

Loading... Loading...
595. Which deployment model is the most secure when considering risks to cloud adoption?

Loading... Loading...
596. How is ICMP used an exfiltration technique?

Loading... Loading...
597. An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.

What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

Loading... Loading...
598. Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Loading... Loading...
599. Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Loading... Loading...
600. Refer to the exhibit.





Which statement about the authentication protocol used in the configuration is true

Page 61 of 66

Loading... Loading...
601. What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?.

Loading... Loading...
602. Which API is used for Content Security?

Loading... Loading...
603. Which two behavioral patterns characterize a ping of death attack? (Choose two.)

Loading... Loading...
604. Which two descriptions of AES encryption are true? (Choose two.)

Loading... Loading...
605. What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

Loading... Loading...
606. An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address.

Which list contains the allowed recipient addresses?

Loading... Loading...
607. An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.

Which two solutions mitigate the risk of this ransomware infection? (Choose two.)

Loading... Loading...
608. Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

Loading... Loading...
609. Which algorithm provides encryption and authentication for data plane communication?

Loading... Loading...
610. When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

Page 62 of 66

Loading... Loading...
611. Which two mechanisms are used to control phishing attacks? (Choose two.)

Loading... Loading...
612. The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?

Loading... Loading...
613. In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

Loading... Loading...
614. Which VPN technology can support a multivendor environment and secure traffic between sites?

Loading... Loading...
615. In a PaaS model, which layer is the tenant responsible for maintaining and patching?

Loading... Loading...
616. For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

Loading... Loading...
617. What is a characteristic of traffic storm control behavior?

Loading... Loading...
618. Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

Loading... Loading...
619. Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

Loading... Loading...
620. Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Page 63 of 66

Loading... Loading...
621. What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

Loading... Loading...
622. An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE.

Which CoA type achieves this goal?

Loading... Loading...
623. Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

Loading... Loading...
624. A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.

Which command achieves this goal?

Loading... Loading...
625. Refer to the exhibit.





A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface.

What is causing this problem?

Loading... Loading...
626. Under which two circumstances is a CoA issued? (Choose two.)

Loading... Loading...
627. An organization is receiving SPAM emails from a known malicious domain.

What must be configured in order to prevent the session during the initial TCP communication?

Loading... Loading...
628. What is a key difference between Cisco Firepower and Cisco ASA?

Loading... Loading...
629. Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

Loading... Loading...
630. What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

Page 64 of 66

Loading... Loading...
631. Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Loading... Loading...
632. Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two.)

Loading... Loading...
633. A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance.

Which ASA deployment mode meets these needs?

Loading... Loading...
634. An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications.

Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

Loading... Loading...
635. Which two capabilities does TAXII support? (Choose two.)

Loading... Loading...
636. A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication.

How will the Cisco ESA handle any files which need analysis?

Loading... Loading...
637. What is the primary role of the Cisco Email Security Appliance?

Loading... Loading...
638. Refer to the exhibit.





Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance.

What is causing this issue?

Loading... Loading...
639. What are two DDoS attack categories? (Choose two.)

Loading... Loading...
640. When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

Page 65 of 66

Loading... Loading...
641. What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

Loading... Loading...
642. Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Loading... Loading...
643. Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

Loading... Loading...
644. DRAG DROP

Drag and drop the descriptions from the left onto the encryption algorithms on the right.



Loading... Loading...
645. DRAG DROP

Drag and drop the capabilities from the left onto the correct technologies on the right.



Loading... Loading...
646. An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.

What action would allow the attacker to gain access to machine 1 but not machine 2?

Loading... Loading...
647. An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network.

Which product should be used to accomplish this goal?

Loading... Loading...
648. An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network.

What must be configured, based on a predefined threshold, to address this issue?

Loading... Loading...
649. Refer to the exhibit.





A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status.

What is the problem according to this command output?

Loading... Loading...
650. Which attack is commonly associated with C and C++ programming languages?

Page 66 of 66

Loading... Loading...
651. DRAG DROP

Drag and drop the descriptions from the left onto the correct protocol versions on the right.



Loading... Loading...
652. In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

Loading... Loading...
653. Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

Loading... Loading...
654. What is provided by the Secure Hash Algorithm in a VPN?

Loading... Loading...
655. Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

Loading... Loading...
656. Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

Loading... Loading...
657. Which functions of an SDN architecture require southbound APIs to enable communication?

Loading... Loading...
658. Refer to the exhibit.





What does the number 15 represent in this configuration?

Loading... Loading...

 

Exit mobile version