Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Under which two circumstances is a CoA issued? (Choose two)
Why would a user choose an on-premises ESA versus the CES solution?
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
How does Cisco Umbrella archive logs to an enterprise owned storage?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
(Choose two)
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The
company needs to be able to protect sensitive data throughout the full environment. Which tool should be used
to accomplish this goal?
Which technology is used to improve web traffic performance by proxy caching?
Which Cisco AMP file disposition valid?
Which deployment model is the most secure when considering risks to cloud adoption?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed
through the Cisco Umbrella network. Which action tests the routing?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
In which cloud services model is the tenant responsible for virtual machine OS patching?
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
Which form of attack is launched using botnets?
What must be used to share data between multiple security products?
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
Which ASA deployment mode can provide separation of management on a shared appliance?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on
four different switch ports at the same time. What two catalyst switch security features will prevent further
violations? (Choose two)
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA
command must be used?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
Which function is the primary function of Cisco AMP threat Grid?
A mall provides security services to customers with a shared appliance. The mall wants separation of
management on the shared appliance. Which ASA deployment mode meets these needs?
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
Which feature is configured for managed devices in the device platform settings of the Firepower Management
Center?
How is ICMP used an exfiltration technique?
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which compliance status is shown when a configured posture policy requirement is not met?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Refer to the exhibit.
Which command was used to display this output?
Which two activities can be done using Cisco DNA Center? (Choose two)
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
On which part of the IT environment does DevSecOps focus?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Which benefit does endpoint security provide the overall security posture of an organization?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
Refer to the exhibit.
What is a result of the configuration?
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
Which two cryptographic algorithms are used with IPsec? (Choose two)
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing
authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
Refer to the exhibit.
What will happen when this Python script is run?
An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews. Which vulnerability
would help an attacker brute force their way into the systems?
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain
aware of the ongoing and most prevalent threats?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Which type of algorithm provides the highest level of protection against brute-force attacks?
What is the benefit of installing Cisco AMP for Endpoints on a network?
What is the function of SDN southbound API protocols?
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
What are two characteristics of Cisco DNA Center APIs? (Choose two)
How does DNS Tunneling exfiltrate data?
What is an attribute of the DevSecOps process?
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
Why is it important to implement MFA inside of an organization?
In an IaaS cloud services model, which security function is the provider responsible for managing?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Drag and drop the solutions from the left onto the solution's benefits on the right.
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
What are two benefits of Flexible NetFlow records? (Choose two)
What is a difference between DMVPN and sVTI?
Refer to the exhibit.
What will happen when the Python script is executed?
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging” category. Which reputation score should be selected to accomplish this goal?
Drag and drop the VPN functions from the left onto the description on the right.
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
What are two Trojan malware attacks? (Choose two)
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites
but other sites are not accessible due to an error. Why is the error occurring?
What is a benefit of using Cisco FMC over Cisco ASDM?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
What is a capability of Cisco ASA Netflow?
What are two functions of secret key cryptography? (Choose two)
What is the purpose of the My Devices Portal in a Cisco ISE environment?
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is
deleted from an identity group?
Refer to the exhibit.
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the switch
interface in order to provide the user with network connectivity?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
Which type of protection encrypts RSA keys when they are exported and imported?
Refer to the exhibit.
Which type of authentication is in use?
Refer to the exhibit.
How does Cisco Umbrella manage traffic that is directed toward risky domains?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
Which two parameters are used for device compliance checks? (Choose two.)
Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
Which statement describes a serverless application?
Which threat intelligence standard contains malware hashes?
Which metric is used by the monitoring agent to collect and output packet loss and jitter information?
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
Which technology provides a combination of endpoint protection endpoint detection, and response?
Which solution detects threats across a private network, public clouds, and encrypted traffic?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.
What is a difference between an XSS attack and an SQL injection attack?
What is the purpose of joining Cisco WSAs to an appliance group?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
What is a benefit of flexible NetFlow records?
Why is it important for the organization to have an endpoint patching strategy?
How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?
Refer to the exhibit. What does this Python script accomplish?
Drag and drop the cloud security assessment components from the left onto the definitions on the right.
What is the purpose of a denial-of-service attack?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
What is a benefit of using Cisco Umbrella?
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
For a given policy in Cisco Umbrella, how should a customer block website based on a custom list?
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and
infrastructure automation?
A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?
Refer to the exhibit.
A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced What is the cause of this issue?
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)
Which feature requires that network telemetry be enabled?
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion
events that are flagged as possible active breaches?
Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?
A customer has various external HTTP resources available including Intranet. Extranet, and Internet, with a proxy configuration running in explicit mode Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?
Which capability is provided by application visibility and control?
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
Which system performs compliance checks and remote wiping?
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
What is the purpose of CA in a PKI?
What are two functions of IKEv1 but not IKEv2? (Choose two)
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
Which security solution protects users leveraging DNS-layer security?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your
environment?
An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?
What is the purpose of the Cisco Endpoint IoC feature?
What are two workload security models? (Choose two.)
Refer to the exhibit.
What will occur when this device tries to connect to the port?
What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?