Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)
Drag and drop the concepts from the left onto the correct descriptions on the right
An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.
The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
What is the term for the concept of limiting communication between applications or containers on the same node?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
(Choose two)
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
Which threat involves software being used to gain unauthorized access to a computer system?
What is a difference between a zone-based firewall and a Cisco Adaptive Security Appliance firewall?
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current
encryption technology?
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Which Cisco ISE feature helps to detect missing patches and helps with remediation?
Refer to the exhibit. The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly
identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)
Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network?
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
Refer to the exhibit.
What is the result of this Python script of the Cisco DNA Center API?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
Which service allows a user to export application usage and performance statistics with Cisco Application Visibility and Control?
Drag and drop the security solutions from the left onto the benefits they provide on the right.
Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other
interoperable security platforms?
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Refer to the exhibit.
An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?
Drag and drop the cloud security assessment components from the left onto the definitions on the right.
Drag and drop the deployment models from the left onto the explanations on the right.
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
Which compliance status is shown when a configured posture policy requirement is not met?
Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to
the network?
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?
Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
Which Cisco security solution secures public, private, hybrid, and community clouds?
Which two components do southbound APIs use to communicate with downstream devices? (Choose two.)
Refer to the exhibit. A network engineer must retrieve the interface configuration on a Cisco router by using the NETCONF API. The engineer uses a python script to automate the activity.
Which code snippet completes the script?
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch
was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate
the risk of this ransom ware infection? (Choose two)
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion
events that are flagged as possible active breaches?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,
which allows the SOC to proactively automate responses to those threats?
Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and all servers must communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication between DNS servers and the file server?
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file What type of Outbreak Control list must the SHA.-256 hash value for the file be added to in order to accomplish this?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
Why is it important for the organization to have an endpoint patching strategy?
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a
connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
What is the most common type of data exfiltration that organizations currently experience?
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?
An organization wants to secure data in a cloud environment. Its security model requires that all users be
authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Which two Cisco Umbrella security categories are used to prevent command-and-control callbacks on port 53 and protect users from being tricked into providing confidential information? (Choose two.)
Which service allows a user export application usage and performance statistics with Cisco Application Visibility
and control?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
When a Cisco Secure Web Appliance checks a web request, what occurs if it is unable to match a user-defined policy?
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?
Based on the NIST 800-145 guide, which cloud architecture is provisioned for exclusive use by a specific group of consumers from different organizations and may be owned, managed, and operated by one or more of those organizations?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Which functions of an SDN architecture require southbound APIs to enable communication?
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?
An engineer must implement a file transfer solution between a company's data center and branches. The company has numerous servers hosted in a hybrid cloud implementation. The file transfer protocol must support authentication, protect the data against unauthorized access, and ensure that users cannot list directories or remove files remotely. Which protocol must be used?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain
aware of the ongoing and most prevalent threats?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?
An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?