Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention
System? (Choose two)
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch
was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate
the risk of this ransom ware infection? (Choose two)
In which cloud services model is the tenant responsible for virtual machine OS patching?
Which VPN technology can support a multivendor environment and secure traffic between sites?
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to
use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Refer to the exhibit.
What does the API do when connected to a Cisco security appliance?
What is a characteristic of a bridge group in ASA Firewall transparent mode?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline
posture node?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.
Which task can you perform to determine where each message was lost?
Refer to the exhibit.
An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion
events that are flagged as possible active breaches?
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
A network administrator is configuring a role in an access control policy to block certain URLs and selects the "Chat and instant Messaging" category. which reputation score should be selected to accomplish
this goal?
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
Refer to the exhibit.
What is the function of the Python script code snippet for the Cisco ASA REST API?
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.
Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other
interoperable security platforms?
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users.
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?
An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?
A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256
cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which
command achieves this goal?
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this
requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.
They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?
An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
Which technology is used to improve web traffic performance by proxy caching?
Which benefit does endpoint security provide the overall security posture of an organization?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current
encryption technology?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion
Prevention System?
Which functions of an SDN architecture require southbound APIs to enable communication?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
(Choose two)
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Which algorithm provides encryption and authentication for data plane communication?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
What provides visibility and awareness into what is currently occurring on the network?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Refer to the exhibit.
Which command was used to generate this output and to show which ports are
authenticating with dot1x or mab?
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
Which deployment model is the most secure when considering risks to cloud adoption?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and
operate as a cloud-native CASB. Which solution must be used for this implementation?
With which components does a southbound API within a software-defined network architecture communicate?
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews. Which vulnerability
would help an attacker brute force their way into the systems?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.
Drag and drop the common security threats from the left onto the definitions on the right.
Which type of protection encrypts RSA keys when they are exported and imported?
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Drag and drop the capabilities from the left onto the correct technologies on the right.
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
Refer to the exhibit.
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the switch
interface in order to provide the user with network connectivity?
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain
aware of the ongoing and most prevalent threats?
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Which type of algorithm provides the highest level of protection against brute-force attacks?
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
Which attack type attempts to shut down a machine or network so that users are not able to access it?
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
An organization has a Cisco ESA set up with policies and would like to customize the action assigned for
violations. The organization wants a copy of the message to be delivered with a message added to flag it as a
DLP violation. Which actions must be performed in order to provide this capability?
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
Which risk is created when using an Internet browser to access cloud-based service?
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally
manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Refer to the exhibit.
What will happen when the Python script is executed?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?
What is the role of an endpoint in protecting a user from a phishing attack?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the
command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?