Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
Which risk is created when using an Internet browser to access cloud-based service?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
Which metric is used by the monitoring agent to collect and output packet loss and jitter information?
What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest
access, and the same guest portal is used as the BYOD portal?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
Drag and drop the capabilities from the left onto the correct technologies on the right.
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and
operate as a cloud-native CASB. Which solution must be used for this implementation?
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
What is the purpose of the certificate signing request when adding a new certificate for a server?
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Which type of algorithm provides the highest level of protection against brute-force attacks?
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
Which attack type attempts to shut down a machine or network so that users are not able to access it?
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Refer to the exhibit.
What is the function of the Python script code snippet for the Cisco ASA REST API?
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
Refer to the exhibit,
which command results in these messages when attempting to troubleshoot an iPsec VPN connection?
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Drag and drop the common security threats from the left onto the definitions on the right.
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally
manage cloud policies across these platforms. Which software should be used to accomplish this goal?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Drag and drop the VPN functions from the left onto the description on the right.
A network administrator is configuring SNMPv3 on a new router. The users have already been created;
however, an additional configuration is needed to facilitate access to the SNMP views. What must the
administrator do to accomplish this?
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)
Which component of Cisco umbrella architecture increases reliability of the service?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine
certificates. Which configuration item must be modified to allow this?
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Drag and drop the threats from the left onto examples of that threat on the right
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing
authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which
vulnerability allows the attacker to see the passwords being transmitted in clear text?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly
identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA?
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?
Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
An engineer must configure Cisco AMP for Endpoints so that it contains a list of files that should not be executed by users. These files must not be quarantined. Which action meets this configuration requirement?
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)
Drag and drop the deployment models from the left onto the explanations on the right.
Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management
port conflicts with other communications on the network and must be changed. What must be done to ensure
that all devices can communicate together?
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.
The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
Which service allows a user export application usage and performance statistics with Cisco Application Visibility
and control?
An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?
An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
What limits communication between applications or containers on the same node?
Which function is performed by certificate authorities but is a limitation of registration authorities?
Which method must be used to connect Cisco Secure Workload to external orchestrators at a client site when the client does not allow incoming connections?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from
Cisco and other vendors to share data and interoperate with each other?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
Refer to the exhibit.
A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the
endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to
the VPN?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,
which allows the SOC to proactively automate responses to those threats?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
(Choose two)
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
How many interfaces per bridge group does an ASA bridge group deployment support?
When Cisco and other industry organizations publish and inform users of known security findings and
vulnerabilities, which name is used?
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed
devices?
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to
use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which two risks is a company vulnerable to if it does not have a well-established patching solution for
endpoints? (Choose two)
Which two behavioral patterns characterize a ping of death attack? (Choose two)
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Which information is required when adding a device to Firepower Management Center?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
What provides visibility and awareness into what is currently occurring on the network?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.
Which task can you perform to determine where each message was lost?
A mall provides security services to customers with a shared appliance. The mall wants separation of
management on the shared appliance. Which ASA deployment mode meets these needs?
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
In which cloud services model is the tenant responsible for virtual machine OS patching?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
Refer to the exhibit.
What does the API do when connected to a Cisco security appliance?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)