When Cisco and other industry organizations publish and inform users of known security findings and
vulnerabilities, which name is used?
What is a characteristic of traffic storm control behavior?
Why is it important to patch endpoints consistently?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to
the VPN?
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
An organization wants to improve its cybersecurity processes and to add intelligence to its data The organization wants to utilize the most current intelligence data for URL filtering, reputations, and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA What must be done to accomplish these objectives?
Based on the NIST 800-145 guide, which cloud architecture is provisioned for exclusive use by a specific group of consumers from different organizations and may be owned, managed, and operated by one or more of those organizations?
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
What must be used to share data between multiple security products?
What is a difference between DMVPN and sVTI?
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Which Cisco Firewall solution requires zone definition?
Email security has become a high priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which action will the system perform to disable any links in messages that match the filter?
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
Which two capabilities does an MDM provide? (Choose two.)
What are two functions of IKEv1 but not IKEv2? (Choose two)
Refer to the exhibit.
An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
What is the purpose of the My Devices Portal in a Cisco ISE environment?
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
How does a Cisco Secure Firewall help to lower the risk of exfiltration techniques that steal customer data?
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
A customer has various external HTTP resources available including Intranet Extranet and Internet, with a
proxy configuration running in explicit mode. Which method allows the client desktop browsers to be configured
to select when to connect direct or when to use the proxy?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA?
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
What is a key difference between Cisco Firepower and Cisco ASA?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Refer to the exhibit. An engineer must configure a new Cisco ISE backend server as a RADIUS server to provide AAA for all access requests from the client to the ISE-Frontend server.
Which Cisco ISE configuration must be used?
Which Cisco AMP file disposition valid?
An engineer is configuring cloud logging on Cisco ASA and needs events to compress. Which component must be configured to accomplish this goal?
A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?
A security administrator is designing an email protection solution for an onsite email server and must meet these requirements:
Remove malware from email before it reaches corporate premises
Drop emails with risky links automatically
Block access to newly infected sites with real-time URL analysis
Which solution must be used?
An engineer must configure Cisco AMP for Endpoints so that it contains a list of files that should not be executed by users. These files must not be quarantined. Which action meets this configuration requirement?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
Which API technology with SDN architecture is used to communicate with a controller and network devices such as routers and switches?
What is the concept of Cl/CD pipelining?
Which benefit does endpoint security provide the overall security posture of an organization?
Which solution detects threats across a private network, public clouds, and encrypted traffic?
A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?
An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints The configured detection method must work on files of unknown disposition Which Outbreak Control list must be configured to provide this?
Which command enables 802.1X globally on a Cisco switch?
Refer to the exhibit. What does this Python script accomplish?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
In which scenario is endpoint-based security the solution?
Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
What is a benefit of using Cisco Tetration?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
What is the purpose of a NetFlow version 9 template record?
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
Which function is performed by certificate authorities but is a limitation of registration authorities?
What is the function of the crypto is a kmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?
Which type of attack is social engineering?
What is a feature of container orchestration?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
Which process is used to obtain a certificate from a CA?
What is a feature of an endpoint detection and response solution?
When a Cisco Secure Web Appliance checks a web request, what occurs if it is unable to match a user-defined policy?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
What is the primary role of the Cisco Email Security Appliance?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)
What is a characteristic of Dynamic ARP Inspection?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Refer to the exhibit.
What is the function of the Python script code snippet for the Cisco ASA REST API?
What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest
access, and the same guest portal is used as the BYOD portal?
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
Which functions of an SDN architecture require southbound APIs to enable communication?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
How does Cisco AMP for Endpoints provide next-generation protection?
Drag and drop the deployment models from the left onto the explanations on the right.
What is a difference between GETVPN and IPsec?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Which system performs compliance checks and remote wiping?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
Which type of protection encrypts RSA keys when they are exported and imported?
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed
devices?
Which two activities are performed using Cisco Catalyst Center? (Choose two.)
What are two rootkit types? (Choose two)
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
Which role is a default guest type in Cisco ISE?
What is an advantage of using a next-generation firewall compared to a traditional firewall?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What is a feature of NetFlow Secure Event Logging?
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
II
An engineer musí set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration Which switch port MAC address security setting must be used?
With which components does a southbound API within a software-defined network architecture communicate?
Which component of Cisco umbrella architecture increases reliability of the service?
Which problem Is solved by deploying a multicontext firewall?
A network administrator is configuring SNMPv3 on a new router. The users have already been created;
however, an additional configuration is needed to facilitate access to the SNMP views. What must the
administrator do to accomplish this?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain
aware of the ongoing and most prevalent threats?
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?
Which security solution protects users leveraging DNS-layer security?
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally
manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Which algorithm provides encryption and authentication for data plane communication?
Which two parameters are used for device compliance checks? (Choose two.)
Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
What are two characteristics of Cisco DNA Center APIs? (Choose two)
Refer to the exhibit.
What does the API key do while working with https://api.amp.cisco.com/v1/computers?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The
company needs to be able to protect sensitive data throughout the full environment. Which tool should be used
to accomplish this goal?
What are two security benefits of an MDM deployment? (Choose two.)
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
An engineer must enable Outbreak Filters globally on an AsyncOS for Cisco Secure Email Gateway to protect the network from large-scale malware attacks. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
Which compliance status is shown when a configured posture policy requirement is not met?
An engineer is deploying a Cisco Secure Email Gateway and must ensure it reaches the Cisco update servers to retrieve new rules. The engineer must now manually configure the Outbreak Filter rules on an AsyncOS for Cisco Secure Email Gateway. Only outdated rules must be replaced. Up-to-date rules must be retained. Which action must the engineer take next to complete the configuration?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
What is an advantage of network telemetry over SNMP pulls?
When MAB is configured for use within the 802.1X environment, an administrator must create a policy that allows the devices onto the network. Which information is used for the username and password?
Which form of attack is launched using botnets?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Which benefit does DMVPN provide over GETVPN?
Which technology is used to improve web traffic performance by proxy caching?
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Which posture assessment requirement provides options to the client for remediation and requires the
remediation within a certain timeframe?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
Refer to the exhibit. What is the result of the Python script?
Drag and drop the VPN functions from the left onto the descriptions on the right.
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
What is a benefit of using a multifactor authentication strategy?
Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)
Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two)
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
Which two activities can be done using Cisco DNA Center? (Choose two)
Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which two methods are available in Cisco Secure Web Appliance to process client requests when configured in Transparent mode? (Choose two.)
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
Which function is the primary function of Cisco AMP threat Grid?
A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
Why would a user choose an on-premises ESA versus the CES solution?
Which threat intelligence standard contains malware hashes?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
What are the components of endpoint protection against social engineering attacks?
Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco Secure Email Gateway. Which action will the system perform to disable any links in messages that match the filter?
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
Which Cisco ISE feature helps to detect missing patches and helps with remediation?
Which encryption algorithm provides highly secure VPN communications?
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Refer to the exhibit.
What does the number 15 represent in this configuration?
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly
identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?
Which IPS engine detects ARP spoofing?
What are two functions of TAXII in threat intelligence sharing? (Choose two.)
Which IETF attribute is supported for the RADIUS CoA feature?
Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.
The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
What is the function of Cisco Cloudlock for data security?
What is a benefit of using Cisco FMC over Cisco ASDM?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion
Prevention System?
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Which Cisco network security device supports contextual awareness?
A network engineer is deciding whether to use stateful or stateless failover when configuring two Cisco ASAs for high availability. What is the connection status in both cases?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the
ASA be added on the Cisco UC Manager platform?
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?
An engineer must implement a file transfer solution between a company's data center and branches. The company has numerous servers hosted in a hybrid cloud implementation. The file transfer protocol must support authentication, protect the data against unauthorized access, and ensure that users cannot list directories or remove files remotely. Which protocol must be used?
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this
requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
What is a benefit of an endpoint patch management strategy?
Which threat intelligence standard contains malware hashes?
Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two.)
Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view
of activity?
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the
endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?