Deck 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

ملء الشاشة (f)
exit full mode
سؤال
What are two DDoS attack categories? (Choose two.)

A) protocol
B) source-based
C) database
D) sequential
E) volume-based
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which two capabilities does TAXII support? (Choose two.)

A) exchange
B) pull messaging
C) binding
D) correlation
E) mitigating
سؤال
<strong>  Refer to the exhibit. What does the API do when connected to a Cisco security appliance?</strong> A) create an SNMP pull mechanism for managing AMP B) gather network telemetry information from AMP for endpoints C) get the process and PID information from the computers in the network D) gather the network interface information about the computers AMP sees <div style=padding-top: 35px> Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

A) create an SNMP pull mechanism for managing AMP
B) gather network telemetry information from AMP for endpoints
C) get the process and PID information from the computers in the network
D) gather the network interface information about the computers AMP sees
سؤال
How does DNS Tunneling exfiltrate data?

A) An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
B) An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
C) An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
D) An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
سؤال
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

A) smurf
B) distributed denial of service
C) cross-site scripting
D) rootkit exploit
سؤال
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

A) phishing
B) brute force
C) man-in-the-middle
D) DDOS
E) tear drop
سؤال
How does Cisco Advanced Phishing Protection protect users?

A) It utilizes sensors that send messages securely.
B) It uses machine learning and real-time behavior analytics.
C) It validates the sender by using DKIM.
D) It determines which identities are perceived by the sender.
سؤال
What are two rootkit types? (Choose two.)

A) registry
B) buffer mode
C) user mode
D) bootloader
E) virtual
سؤال
Which two behavioral patterns characterize a ping of death attack? (Choose two.)

A) The attack is fragmented into groups of 16 octets before transmission.
B) The attack is fragmented into groups of 8 octets before transmission.
C) Short synchronized bursts of traffic are used to disrupt TCP connections.
D) Malformed packets are used to crash systems.
E) Publicly accessible DNS servers are typically used to execute the attack.
سؤال
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

A) Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
B) The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C) The IPsec configuration that is set up on the active device must be duplicated on the standby device.
D) Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E) The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
سؤال
Which form of attack is launched using botnets?

A) TCP flood
B) DDOS
C) DOS
D) virus
سؤال
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

A) SDN controller and the cloud
B) management console and the SDN controller
C) management console and the cloud
D) SDN controller and the management solution
سؤال
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?

A) SYN flood
B) slowloris
C) phishing
D) pharming
سؤال
Which threat involves software being used to gain unauthorized access to a computer system?

A) ping of death
B) HTTP flood
C) NTP amplification
D) virus
سؤال
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

A) put
B) options
C) get
D) push
E) connect
سؤال
What is a feature of the open platform capabilities of Cisco DNA Center?

A) application adapters
B) domain integration
C) intent-based APIs
D) automation adapters
سؤال
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

A) unencrypted links for traffic
B) weak passwords for authentication
C) improper file security
D) software bugs on applications
سؤال
In which type of attach does the attacker insert their machine between two hosts that are communicating with each other?

A) man-in-the-middle
B) LDAP injection
C) insecure API
D) cross-site scripting
سؤال
Which functions of an SDN architecture require southbound APIs to enable communication?

A) SDN controller and the network elements
B) management console and the SDN controller
C) management console and the cloud
D) SDN controller and the cloud
سؤال
Which type of attack is social engineering?

A) trojan
B) MITM
C) phishing
D) malware
سؤال
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

A) sniffing the packets between the two hosts
B) sending continuous pings
C) overflowing the buffer's memory
D) inserting malicious commands into the database
سؤال
Which algorithm provides encryption and authentication for data plane communication?

A) AES-GCM
B) SHA-96
C) AES-256
D) SHA-384
سؤال
Which command enables 802.1X globally on a Cisco switch?

A) dot1x system-auth-control
B) dot1x pae authenticator
C) authentication port-control auto
D) aaa new-model
سؤال
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

A) security intelligence
B) impact flags
C) health monitoring
D) URL filtering
سؤال
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

A) DTLSv1
B) TLSv1
C) TLSv1.1
D) TLSv1.2
سؤال
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0383320506 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?

A) snmp-server host inside 10.255.254.1 snmpv3 andy
B) snmp-server host inside 10.255.254.1 version 3 myv3
C) snmp-server host inside 10.255.254.1 snmpv3 myv3
D) snmp-server host inside 10.255.254.1 version 3 andy
سؤال
Under which two circumstances is a CoA issued? (Choose two.)

A) A new authentication rule was added to the policy on the Policy Service node.
B) An endpoint is deleted on the Identity Service Engine server.
C) A new Identity Source Sequence is created and referenced in the authentication policy.
D) An endpoint is profiled for the first time.
E) A new Identity Service Engine server is added to the deployment with the Administration persona.
سؤال
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

A) STIX
B) XMPP
C) pxGrid
D) SMTP
سؤال
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

A) DMVPN
B) FlexVPN
C) IPsec DVTI
D) GET VPN
سؤال
What is a characteristic of traffic storm control behavior?

A) Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.
B) Traffic storm control cannot determine if the packet is unicast or broadcast.
C) Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.
D) Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.
سؤال
What is a function of 3DES in reference to cryptography?

A) It encrypts traffic.
B) It creates one-time use passwords.
C) It hashes files.
D) It generates private keys.
سؤال
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)

A) Define a NetFlow collector by using the flow-export command
B) Create a class map to match interesting traffic
C) Create an ACL to allow UDP traffic on port 9996
D) Enable NetFlow Version 9
E) Apply NetFlow Exporter to the outside interface in the inbound direction
سؤال
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

A) authentication server: Cisco Identity Service Engine
B) supplicant: Cisco AnyConnect ISE Posture module
C) authenticator: Cisco Catalyst switch
D) authenticator: Cisco Identity Services Engine
E) authentication server: Cisco Prime Infrastructure
سؤال
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?

A) southbound API
B) westbound API
C) eastbound API
D) northbound API
سؤال
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

A) Talos
B) PSIRT
C) SCIRT
D) DEVNET
سؤال
Which statement about IOS zone-based firewalls is true?

A) An unassigned interface can communicate with assigned interfaces
B) Only one interface can be assigned to a zone.
C) An interface can be assigned to multiple zones.
D) An interface can be assigned only to one zone.
سؤال
<strong>  Refer to the exhibit. Which command was used to display this output?</strong> A) show dot1x all B) show dot1x C) show dot1x all summary D) show dot1x interface gi1/0/12 <div style=padding-top: 35px> Refer to the exhibit. Which command was used to display this output?

A) show dot1x all
B) show dot1x
C) show dot1x all summary
D) show dot1x interface gi1/0/12
سؤال
Which two activities can be done using Cisco DNA Center? (Choose two.)

A) DHCP
B) design
C) accounting
D) DNS
E) provision
سؤال
<strong>  Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?</strong> A) show authentication registrations B) show authentication method C) show dot1x all D) show authentication sessions <div style=padding-top: 35px> Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

A) show authentication registrations
B) show authentication method
C) show dot1x all
D) show authentication sessions
سؤال
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

A) accounting
B) assurance
C) automation
D) authentication
E) encryption
سؤال
Which information is required when adding a device to Firepower Management Center?

A) username and password
B) encryption method
C) device serial number
D) registration key
سؤال
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

A) routed mode
B) multiple zone mode
C) multiple context mode
D) transparent mode
سؤال
<strong>  Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?</strong> A) Site-to-site VPN preshared keys are mismatched. B) Site-to-site VPN peers are using different encryption algorithms. C) No split-tunnel policy is defined on the Firepower Threat Defense appliance. D) The access control policy is not allowing VPN traffic in. <div style=padding-top: 35px> Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

A) Site-to-site VPN preshared keys are mismatched.
B) Site-to-site VPN peers are using different encryption algorithms.
C) No split-tunnel policy is defined on the Firepower Threat Defense appliance.
D) The access control policy is not allowing VPN traffic in.
سؤال
An engineer notices traffic interruptions on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?

A) Storm Control
B) embedded event monitoring
C) access control lists
D) Bridge Protocol Data Unit guard
سؤال
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

A) DNS tunneling
B) DNSCrypt
C) DNS security
D) DNSSEC
سؤال
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?

A) Generate the RSA key using the crypto key generate rsa command. Generate the RSA key using the crypto key generate rsa command.
B) Configure the port using the ip ssh port 22 command. Configure the port using the ip ssh port 22
C) Enable the SSH server using the ip ssh server command. Enable the SSH server using the ip ssh server
D) Disable telnet using the no ip telnet command. Disable telnet using the no ip telnet
سؤال
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

A) quality of service
B) time synchronization
C) network address translations
D) intrusion policy
سؤال
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?

A) sFlow
B) NetFlow
C) mirror port
D) VPC flow logs
سؤال
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

A) Cisco Umbrella
B) External Threat Feeds
C) Cisco Threat Grid
D) Cisco Stealthwatch
سؤال
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0383320506 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN?

A) Change the password on host A to the default password
B) Enter the command with a different password on host B
C) Enter the same command on host B
D) Change isakmp to ikev2 in the command on host A Change isakmp to ikev2 in the command on host A
سؤال
<strong>  Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?</strong> A) interesting traffic was not applied B) encryption algorithm mismatch C) authentication key mismatch D) hashing algorithm mismatch <div style=padding-top: 35px> Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?

A) interesting traffic was not applied
B) encryption algorithm mismatch
C) authentication key mismatch
D) hashing algorithm mismatch
سؤال
What is a key difference between Cisco Firepower and Cisco ASA?

A) Cisco Firepower provides identity based access control while Cisco ASA does not.
B) Cisco AS provides access control while Cisco Firepower does not.
C) Cisco ASA provides SSL inspection while Cisco Firepower does not.
D) Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.
سؤال
A Cisco FirePower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)

A) permit
B) allow
C) reset
D) trust
E) monitor
سؤال
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?

A) Certificate Trust List
B) Endpoint Trust List
C) Enterprise Proxy Service
D) Secured Collaboration Proxy
سؤال
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

A) SIP
B) inline normalization
C) SSL
D) packet decoder
E) modbus
سؤال
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

A) It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
B) It discovers and controls cloud apps that are connected to a company's corporate environment.
C) It deletes any application that does not belong in the network.
D) It sends the application information to an administrator to act on.
سؤال
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

A) Multiple NetFlow collectors are supported.
B) Advanced NetFlow v9 templates and legacy v5 formatting are supported.
C) Secure NetFlow connectors are optimized for Cisco Prime Infrastructure
D) Flow-create events are delayed.
سؤال
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

A) Threat Intelligence Director
B) Encrypted Traffic Analytics.
C) Cognitive Threat Analytics.
D) Cisco Talos Intelligence
سؤال
What is a characteristic of a bridge group in ASA Firewall transparent mode?

A) It has an IP address on its BVI interface and is used for management traffic.
B) It allows ARP traffic with a single access rule.
C) It includes multiple interfaces and access rules between interfaces are customizable.
D) It is a Layer 3 segment and includes one port and customizable access rules.
سؤال
Which technology reduces data loss by identifying sensitive information stored in public computing environments?

A) Cisco SDA
B) Cisco Firepower
C) Cisco HyperFlex
D) Cisco Cloudlock
سؤال
Which feature is supported when deploying Cisco ASAv within AWS public cloud?

A) multiple context mode
B) user deployment of Layer 3 networks
C) IPv6
D) clustering
سؤال
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

A) Service Provider managed
B) User managed
C) Public managed
D) Hybrid managed
E) Enterprise managed
سؤال
Which API is used for Content Security?

A) NX-OS API
B) IOS XR API
C) OpenVuln API
D) AsyncOS API
سؤال
In a PaaS model, which layer is the tenant responsible for maintaining and patching?

A) hypervisor
B) virtual machine
C) network
D) application
سؤال
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?

A) Configure the Cisco ESA to reset the TCP connection.
B) Configure policies to stop and reject communication.
C) Configure the Cisco ESA to drop the malicious emails.
D) Configure policies to quarantine malicious emails.
سؤال
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

A) AMP
B) AnyConnect
C) DynDNS
D) Talos
سؤال
What is the function of Cisco Cloudlock for data security?

A) data loss prevention
B) controls malicious cloud apps
C) detects anomalies
D) user and entity behavior analytics
سؤال
How does Cisco Umbrella archive logs to an enterprise-owned storage?

A) by using the Application Programming Interface to fetch the logs
B) by sending logs via syslog to an on-premises or cloud-based syslog server
C) by the system administrator downloading the logs from the Cisco Umbrella web portal
D) by being configured to send logs to a self-managed AWS S3 bucket
سؤال
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

A) Enable IP Layer enforcement.
B) Activate the Advanced Malware Protection license
C) Activate SSL decryption.
D) Enable Intelligent Proxy.
سؤال
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)

A) middleware
B) applications
C) virtualization
D) operating systems
E) data
سؤال
In which cloud services model is the tenant responsible for virtual machine OS patching?

A) IaaS
B) UCaaS
C) PaaS
D) SaaS
سؤال
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

A) Application Control
B) Security Category Blocking
C) Content Category Blocking
D) File Analysis
سؤال
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

A) File Analysis
B) SafeSearch
C) SSL Decryption
D) Destination Lists
سؤال
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

A) DDoS
B) antispam
C) antivirus
D) encryption
E) DLP
سؤال
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

A) IP Blacklist Center
B) File Reputation Center
C) AMP Reputation Center
D) IP and Domain Reputation Center
سؤال
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?

A) Ensure that the client computers are pointing to the on-premises DNS servers.
B) Enable the Intelligent Proxy to validate that traffic is being routed correctly.
C) Add the public IP address that the client computers are behind to a Core Identity.
D) Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
سؤال
What is an attribute of the DevSecOps process?

A) security scanning and theoretical vulnerabilities
B) development security
C) isolated security team
D) mandated security controls and check lists
سؤال
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?

A) Client computers do not have an SSL certificate deployed from an internal CA server.
B) Client computers do not have the Cisco Umbrella Root CA certificate installed.
C) IP-Layer Enforcement is not configured.
D) Intelligent proxy and SSL decryption is disabled in the policy.
سؤال
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

A) PaaS
B) XaaS
C) IaaS
D) SaaS
سؤال
Where are individual sites specified to be blacklisted in Cisco Umbrella?

A) application settings
B) content categories
C) security settings
D) destination lists
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/213
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 41: Implementing Cisco Collaboration Core Technologies (CLCOR)
1
What are two DDoS attack categories? (Choose two.)

A) protocol
B) source-based
C) database
D) sequential
E) volume-based
protocol
volume-based
2
Which two capabilities does TAXII support? (Choose two.)

A) exchange
B) pull messaging
C) binding
D) correlation
E) mitigating
pull messaging
binding
3
<strong>  Refer to the exhibit. What does the API do when connected to a Cisco security appliance?</strong> A) create an SNMP pull mechanism for managing AMP B) gather network telemetry information from AMP for endpoints C) get the process and PID information from the computers in the network D) gather the network interface information about the computers AMP sees Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

A) create an SNMP pull mechanism for managing AMP
B) gather network telemetry information from AMP for endpoints
C) get the process and PID information from the computers in the network
D) gather the network interface information about the computers AMP sees
gather the network interface information about the computers AMP sees
4
How does DNS Tunneling exfiltrate data?

A) An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
B) An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
C) An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
D) An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
5
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

A) smurf
B) distributed denial of service
C) cross-site scripting
D) rootkit exploit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

A) phishing
B) brute force
C) man-in-the-middle
D) DDOS
E) tear drop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
7
How does Cisco Advanced Phishing Protection protect users?

A) It utilizes sensors that send messages securely.
B) It uses machine learning and real-time behavior analytics.
C) It validates the sender by using DKIM.
D) It determines which identities are perceived by the sender.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
8
What are two rootkit types? (Choose two.)

A) registry
B) buffer mode
C) user mode
D) bootloader
E) virtual
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which two behavioral patterns characterize a ping of death attack? (Choose two.)

A) The attack is fragmented into groups of 16 octets before transmission.
B) The attack is fragmented into groups of 8 octets before transmission.
C) Short synchronized bursts of traffic are used to disrupt TCP connections.
D) Malformed packets are used to crash systems.
E) Publicly accessible DNS servers are typically used to execute the attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

A) Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
B) The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C) The IPsec configuration that is set up on the active device must be duplicated on the standby device.
D) Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E) The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which form of attack is launched using botnets?

A) TCP flood
B) DDOS
C) DOS
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
12
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

A) SDN controller and the cloud
B) management console and the SDN controller
C) management console and the cloud
D) SDN controller and the management solution
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
13
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?

A) SYN flood
B) slowloris
C) phishing
D) pharming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which threat involves software being used to gain unauthorized access to a computer system?

A) ping of death
B) HTTP flood
C) NTP amplification
D) virus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

A) put
B) options
C) get
D) push
E) connect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is a feature of the open platform capabilities of Cisco DNA Center?

A) application adapters
B) domain integration
C) intent-based APIs
D) automation adapters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
17
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

A) unencrypted links for traffic
B) weak passwords for authentication
C) improper file security
D) software bugs on applications
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
18
In which type of attach does the attacker insert their machine between two hosts that are communicating with each other?

A) man-in-the-middle
B) LDAP injection
C) insecure API
D) cross-site scripting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which functions of an SDN architecture require southbound APIs to enable communication?

A) SDN controller and the network elements
B) management console and the SDN controller
C) management console and the cloud
D) SDN controller and the cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which type of attack is social engineering?

A) trojan
B) MITM
C) phishing
D) malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
21
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

A) sniffing the packets between the two hosts
B) sending continuous pings
C) overflowing the buffer's memory
D) inserting malicious commands into the database
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which algorithm provides encryption and authentication for data plane communication?

A) AES-GCM
B) SHA-96
C) AES-256
D) SHA-384
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
23
Which command enables 802.1X globally on a Cisco switch?

A) dot1x system-auth-control
B) dot1x pae authenticator
C) authentication port-control auto
D) aaa new-model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

A) security intelligence
B) impact flags
C) health monitoring
D) URL filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

A) DTLSv1
B) TLSv1
C) TLSv1.1
D) TLSv1.2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
26
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0383320506 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?

A) snmp-server host inside 10.255.254.1 snmpv3 andy
B) snmp-server host inside 10.255.254.1 version 3 myv3
C) snmp-server host inside 10.255.254.1 snmpv3 myv3
D) snmp-server host inside 10.255.254.1 version 3 andy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
27
Under which two circumstances is a CoA issued? (Choose two.)

A) A new authentication rule was added to the policy on the Policy Service node.
B) An endpoint is deleted on the Identity Service Engine server.
C) A new Identity Source Sequence is created and referenced in the authentication policy.
D) An endpoint is profiled for the first time.
E) A new Identity Service Engine server is added to the deployment with the Administration persona.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
28
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

A) STIX
B) XMPP
C) pxGrid
D) SMTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

A) DMVPN
B) FlexVPN
C) IPsec DVTI
D) GET VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is a characteristic of traffic storm control behavior?

A) Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.
B) Traffic storm control cannot determine if the packet is unicast or broadcast.
C) Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.
D) Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
31
What is a function of 3DES in reference to cryptography?

A) It encrypts traffic.
B) It creates one-time use passwords.
C) It hashes files.
D) It generates private keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)

A) Define a NetFlow collector by using the flow-export command
B) Create a class map to match interesting traffic
C) Create an ACL to allow UDP traffic on port 9996
D) Enable NetFlow Version 9
E) Apply NetFlow Exporter to the outside interface in the inbound direction
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
33
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

A) authentication server: Cisco Identity Service Engine
B) supplicant: Cisco AnyConnect ISE Posture module
C) authenticator: Cisco Catalyst switch
D) authenticator: Cisco Identity Services Engine
E) authentication server: Cisco Prime Infrastructure
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?

A) southbound API
B) westbound API
C) eastbound API
D) northbound API
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

A) Talos
B) PSIRT
C) SCIRT
D) DEVNET
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which statement about IOS zone-based firewalls is true?

A) An unassigned interface can communicate with assigned interfaces
B) Only one interface can be assigned to a zone.
C) An interface can be assigned to multiple zones.
D) An interface can be assigned only to one zone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
37
<strong>  Refer to the exhibit. Which command was used to display this output?</strong> A) show dot1x all B) show dot1x C) show dot1x all summary D) show dot1x interface gi1/0/12 Refer to the exhibit. Which command was used to display this output?

A) show dot1x all
B) show dot1x
C) show dot1x all summary
D) show dot1x interface gi1/0/12
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which two activities can be done using Cisco DNA Center? (Choose two.)

A) DHCP
B) design
C) accounting
D) DNS
E) provision
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
39
<strong>  Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?</strong> A) show authentication registrations B) show authentication method C) show dot1x all D) show authentication sessions Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

A) show authentication registrations
B) show authentication method
C) show dot1x all
D) show authentication sessions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)

A) accounting
B) assurance
C) automation
D) authentication
E) encryption
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
41
Which information is required when adding a device to Firepower Management Center?

A) username and password
B) encryption method
C) device serial number
D) registration key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
42
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

A) routed mode
B) multiple zone mode
C) multiple context mode
D) transparent mode
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
43
<strong>  Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?</strong> A) Site-to-site VPN preshared keys are mismatched. B) Site-to-site VPN peers are using different encryption algorithms. C) No split-tunnel policy is defined on the Firepower Threat Defense appliance. D) The access control policy is not allowing VPN traffic in. Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

A) Site-to-site VPN preshared keys are mismatched.
B) Site-to-site VPN peers are using different encryption algorithms.
C) No split-tunnel policy is defined on the Firepower Threat Defense appliance.
D) The access control policy is not allowing VPN traffic in.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
44
An engineer notices traffic interruptions on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?

A) Storm Control
B) embedded event monitoring
C) access control lists
D) Bridge Protocol Data Unit guard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
45
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

A) DNS tunneling
B) DNSCrypt
C) DNS security
D) DNSSEC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
46
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?

A) Generate the RSA key using the crypto key generate rsa command. Generate the RSA key using the crypto key generate rsa command.
B) Configure the port using the ip ssh port 22 command. Configure the port using the ip ssh port 22
C) Enable the SSH server using the ip ssh server command. Enable the SSH server using the ip ssh server
D) Disable telnet using the no ip telnet command. Disable telnet using the no ip telnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
47
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?

A) quality of service
B) time synchronization
C) network address translations
D) intrusion policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
48
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?

A) sFlow
B) NetFlow
C) mirror port
D) VPC flow logs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
49
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

A) Cisco Umbrella
B) External Threat Feeds
C) Cisco Threat Grid
D) Cisco Stealthwatch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
50
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0383320506 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN?

A) Change the password on host A to the default password
B) Enter the command with a different password on host B
C) Enter the same command on host B
D) Change isakmp to ikev2 in the command on host A Change isakmp to ikev2 in the command on host A
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
51
<strong>  Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?</strong> A) interesting traffic was not applied B) encryption algorithm mismatch C) authentication key mismatch D) hashing algorithm mismatch Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?

A) interesting traffic was not applied
B) encryption algorithm mismatch
C) authentication key mismatch
D) hashing algorithm mismatch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
52
What is a key difference between Cisco Firepower and Cisco ASA?

A) Cisco Firepower provides identity based access control while Cisco ASA does not.
B) Cisco AS provides access control while Cisco Firepower does not.
C) Cisco ASA provides SSL inspection while Cisco Firepower does not.
D) Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
53
A Cisco FirePower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)

A) permit
B) allow
C) reset
D) trust
E) monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
54
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?

A) Certificate Trust List
B) Endpoint Trust List
C) Enterprise Proxy Service
D) Secured Collaboration Proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
55
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.)

A) SIP
B) inline normalization
C) SSL
D) packet decoder
E) modbus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
56
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

A) It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
B) It discovers and controls cloud apps that are connected to a company's corporate environment.
C) It deletes any application that does not belong in the network.
D) It sends the application information to an administrator to act on.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
57
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

A) Multiple NetFlow collectors are supported.
B) Advanced NetFlow v9 templates and legacy v5 formatting are supported.
C) Secure NetFlow connectors are optimized for Cisco Prime Infrastructure
D) Flow-create events are delayed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

A) Threat Intelligence Director
B) Encrypted Traffic Analytics.
C) Cognitive Threat Analytics.
D) Cisco Talos Intelligence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
59
What is a characteristic of a bridge group in ASA Firewall transparent mode?

A) It has an IP address on its BVI interface and is used for management traffic.
B) It allows ARP traffic with a single access rule.
C) It includes multiple interfaces and access rules between interfaces are customizable.
D) It is a Layer 3 segment and includes one port and customizable access rules.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
60
Which technology reduces data loss by identifying sensitive information stored in public computing environments?

A) Cisco SDA
B) Cisco Firepower
C) Cisco HyperFlex
D) Cisco Cloudlock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
61
Which feature is supported when deploying Cisco ASAv within AWS public cloud?

A) multiple context mode
B) user deployment of Layer 3 networks
C) IPv6
D) clustering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
62
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

A) Service Provider managed
B) User managed
C) Public managed
D) Hybrid managed
E) Enterprise managed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
63
Which API is used for Content Security?

A) NX-OS API
B) IOS XR API
C) OpenVuln API
D) AsyncOS API
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
64
In a PaaS model, which layer is the tenant responsible for maintaining and patching?

A) hypervisor
B) virtual machine
C) network
D) application
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
65
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?

A) Configure the Cisco ESA to reset the TCP connection.
B) Configure policies to stop and reject communication.
C) Configure the Cisco ESA to drop the malicious emails.
D) Configure policies to quarantine malicious emails.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
66
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

A) AMP
B) AnyConnect
C) DynDNS
D) Talos
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
67
What is the function of Cisco Cloudlock for data security?

A) data loss prevention
B) controls malicious cloud apps
C) detects anomalies
D) user and entity behavior analytics
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
68
How does Cisco Umbrella archive logs to an enterprise-owned storage?

A) by using the Application Programming Interface to fetch the logs
B) by sending logs via syslog to an on-premises or cloud-based syslog server
C) by the system administrator downloading the logs from the Cisco Umbrella web portal
D) by being configured to send logs to a self-managed AWS S3 bucket
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
69
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

A) Enable IP Layer enforcement.
B) Activate the Advanced Malware Protection license
C) Activate SSL decryption.
D) Enable Intelligent Proxy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
70
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)

A) middleware
B) applications
C) virtualization
D) operating systems
E) data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
71
In which cloud services model is the tenant responsible for virtual machine OS patching?

A) IaaS
B) UCaaS
C) PaaS
D) SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
72
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

A) Application Control
B) Security Category Blocking
C) Content Category Blocking
D) File Analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
73
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

A) File Analysis
B) SafeSearch
C) SSL Decryption
D) Destination Lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

A) DDoS
B) antispam
C) antivirus
D) encryption
E) DLP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
75
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

A) IP Blacklist Center
B) File Reputation Center
C) AMP Reputation Center
D) IP and Domain Reputation Center
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
76
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?

A) Ensure that the client computers are pointing to the on-premises DNS servers.
B) Enable the Intelligent Proxy to validate that traffic is being routed correctly.
C) Add the public IP address that the client computers are behind to a Core Identity.
D) Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
77
What is an attribute of the DevSecOps process?

A) security scanning and theoretical vulnerabilities
B) development security
C) isolated security team
D) mandated security controls and check lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
78
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?

A) Client computers do not have an SSL certificate deployed from an internal CA server.
B) Client computers do not have the Cisco Umbrella Root CA certificate installed.
C) IP-Layer Enforcement is not configured.
D) Intelligent proxy and SSL decryption is disabled in the policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

A) PaaS
B) XaaS
C) IaaS
D) SaaS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
80
Where are individual sites specified to be blacklisted in Cisco Umbrella?

A) application settings
B) content categories
C) security settings
D) destination lists
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 213 في هذه المجموعة.