Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
An organization wants to secure data in a cloud environment. Its security model requires that all users be
authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints The configured detection method must work on files of unknown disposition Which Outbreak Control list must be configured to provide this?
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
An organization wants to provide visibility and to identify active threats in its network using a VM. The
organization wants to extract metadata from network packet flow while ensuring that payloads are not retained
or transferred outside the network. Which solution meets these requirements?
Drag and drop the common security threats from the left onto the definitions on the right.
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)
An organization recently installed a Cisco Secure Web Appliance and would like to take advantage of the AVC engine to allow the organization to create a policy to control application-specific activity. After enabling the AVC engine, what must be done to implement this?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
Why is it important for the organization to have an endpoint patching strategy?
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers
and can be stopped by Cisco Umbrella?
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)
Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection,
enabling the platform to identify and output various applications within the network traffic flows?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which Cisco security solution secures public, private, hybrid, and community clouds?
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine
certificates. Which configuration item must be modified to allow this?
Which function is performed by certificate authorities but is a limitation of registration authorities?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
What is the most common type of data exfiltration that organizations currently experience?
An engineer must deploy a Cisco Secure Web Appliance. Antimalware scanning must use the Outbreak Heuristics antimalware category on files identified as malware before performing any other processes. What must be configured on the Secure Web Appliance to meet the requirements?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
v
Refer to the exhibit When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZjnside zone once the configuration is deployed?
Which compliance status is shown when a configured posture policy requirement is not met?
A web hosting company must upgrade its older, unsupported on-premises servers. The company wants a cloud solution in which the cloud provider is responsible for:
Server patching
Application maintenance
Data center security
Disaster recovery
Which type of cloud meets the requirements?
Refer to the exhibit. An engineer must configure a new Cisco ISE backend server as a RADIUS server to provide AAA for all access requests from the client to the ISE-Frontend server.
Which Cisco ISE configuration must be used?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Refer to the exhibit. When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZ_inside zone once the configuration is deployed?
Which benefit does endpoint security provide the overall security posture of an organization?
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
While using Cisco Secure Firewall's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system?
An organization wants to improve its cybersecurity processes and to add intelligence to its data The organization wants to utilize the most current intelligence data for URL filtering, reputations, and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA What must be done to accomplish these objectives?
A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco Secure Email Gateway. Which action will the system perform to disable any links in messages that match the filter?
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
Drag and drop the cloud security assessment components from the left onto the definitions on the right.
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.
When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN
configuration as opposed to DMVPN?
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the
command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network?
Which technology limits communication between nodes on the same network segment to individual applications?
How does Cisco Workload Optimization Manager help mitigate application performance issues?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
Drag and drop the capabilities from the left onto the correct technologies on the right.
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
Which action configures the IEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The
company needs to be able to protect sensitive data throughout the full environment. Which tool should be used
to accomplish this goal?
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?
A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
Which metric is used by the monitoring agent to collect and output packet loss and jitter information?
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the
configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?
Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Refer to the exhibit.
Which command was used to generate this output and to show which ports are
authenticating with dot1x or mab?
Which feature is used to restrict communication between interfaces on a Cisco ASA?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,
which allows the SOC to proactively automate responses to those threats?
Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and all servers must communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication between DNS servers and the file server?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
Which cloud service model offers an environment for cloud consumers to develop and deploy applications
without needing to manage or maintain the underlying cloud infrastructure?
Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion
events that are flagged as possible active breaches?
A customer has various external HTTP resources available including Intranet Extranet and Internet, with a
proxy configuration running in explicit mode. Which method allows the client desktop browsers to be configured
to select when to connect direct or when to use the proxy?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
A network engineer must configure a Cisco Secure Email Gateway to prompt users to enter two forms of information before gaining access. The Secure Email Gateway must also join a cluster machine using preshared keys. What must be configured to meet these requirements?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Which two products are used to forecast capacity needs accurately in real time? (Choose two.)
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users.
Which service allows a user to export application usage and performance statistics with Cisco Application Visibility and Control?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco Secure Email Gateway?
Drag and drop the solutions from the left onto the solution's benefits on the right.
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key
establishment?
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion
Prevention System?
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
Which two behavioral patterns characterize a ping of death attack? (Choose two)
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN
and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco
security appliance meets these requirements?
Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Which technology provides a combination of endpoint protection endpoint detection, and response?