An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a
connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
What is a benefit of using Cisco FMC over Cisco ASDM?
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
Which Cisco network security device supports contextual awareness?
How does DNS Tunneling exfiltrate data?
Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is
authenticated?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
Which SNMPv3 configuration must be used to support the strongest security possible?
An engineer is deploying a Cisco Secure Email Gateway and must ensure it reaches the Cisco update servers to retrieve new rules. The engineer must now manually configure the Outbreak Filter rules on an AsyncOS for Cisco Secure Email Gateway. Only outdated rules must be replaced. Up-to-date rules must be retained. Which action must the engineer take next to complete the configuration?
An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?
Which Cisco AMP file disposition valid?
What is a commonality between DMVPN and FlexVPN technologies?
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)
A security administrator is designing an email protection solution for an onsite email server and must meet these requirements:
Remove malware from email before it reaches corporate premises
Drop emails with risky links automatically
Block access to newly infected sites with real-time URL analysis
Which solution must be used?
What is a characteristic of an EDR solution and not of an EPP solution?
Which IETF attribute is supported for the RADIUS CoA feature?
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers
and can be stopped by Cisco Umbrella?
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast
packets have been flooding the network. What must be configured, based on a predefined threshold, to
address this issue?
Which ASA deployment mode can provide separation of management on a shared appliance?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
Which technology limits communication between nodes on the same network segment to individual applications?
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?
Refer to the exhibit. What function does the API key perform while working with https://api.amp.cisco.com/v1/computers?
Which Cisco Firewall solution requires zone definition?
What limits communication between applications or containers on the same node?
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain
aware of the ongoing and most prevalent threats?
What is the most commonly used protocol for network telemetry?
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
A network engineer must configure a Cisco Secure Email Gateway to prompt users to enter two forms of information before gaining access. The Secure Email Gateway must also join a cluster machine using preshared keys. What must be configured to meet these requirements?
Which two capabilities does TAXII support? (Choose two)
Which two components do southbound APIs use to communicate with downstream devices? (Choose two.)
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
What is the difference between Cross-site Scripting and SQL Injection, attacks?
What are two functions of secret key cryptography? (Choose two)
Why should organizations migrate to an MFA strategy for authentication?
What must be used to share data between multiple security products?
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?
An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints The configured detection method must work on files of unknown disposition Which Outbreak Control list must be configured to provide this?
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
An engineer must enable Outbreak Filters globally on an AsyncOS for Cisco Secure Email Gateway to protect the network from large-scale malware attacks. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
How is Cisco Umbrella configured to log only security events?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
What is the purpose of the certificate signing request when adding a new certificate for a server?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
Which Cisco cloud security software centrally manages policies on multiple platforms such as Cisco ASA, Cisco Firepower, Cisco Meraki, and AWS?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
What features does Cisco FTDv provide over ASAv?
Which problem Is solved by deploying a multicontext firewall?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
What is the benefit of installing Cisco AMP for Endpoints on a network?
How does a cloud access security broker function?
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?
Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
Which command enables 802.1X globally on a Cisco switch?
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
Which action configures the IEEE 802.1X Flexible Authentication feature lo support Layer 3 authentication mechanisms?
Which two devices support WCCP for traffic redirection? (Choose two.)
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco Secure Email Gateway. Which action will the system perform to disable any links in messages that match the filter?
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256
cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?
Which solution stops unauthorized access to the system if a user's password is compromised?
What is a benefit of using a multifactor authentication strategy?
Which VPN provides scalability for organizations with many remote sites?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current
encryption technology?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
Which baseline form of telemetry is recommended for network infrastructure devices?
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
What is the most common type of data exfiltration that organizations currently experience?
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.
What is a characteristic of a bridge group in ASA Firewall transparent mode?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file What type of Outbreak Control list must the SHA.-256 hash value for the file be added to in order to accomplish this?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch
was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate
the risk of this ransom ware infection? (Choose two)
What is the recommendation in a zero-trust model before granting access to corporate applications and resources?
Refer to the exhibit.
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access.
Most PCs and IP phones can connect and authenticate using their machine certificate credentials. However printer and video cameras cannot base d on the interface configuration provided, what must be to get these devices on to the network using Cisco ISE for authentication and authorization while maintaining security controls?
An organization recently installed a Cisco Secure Web Appliance and would like to take advantage of the AVC engine to allow the organization to create a policy to control application-specific activity. After enabling the AVC engine, what must be done to implement this?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which
probe must be enabled for this type of profiling to work?
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention
System? (Choose two)
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
Which threat involves software being used to gain unauthorized access to a computer system?
An administrator is trying to determine which applications are being used in the network but does not want the
network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?
What are two Trojan malware attacks? (Choose two)
While using Cisco Secure Firewall's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)
Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)
A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256
cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which
command achieves this goal?
Which category includes DoS Attacks?
What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?
A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?
II
An engineer musí set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration Which switch port MAC address security setting must be used?
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
What is the purpose of a denial-of-service attack?
A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.
They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?
Refer to the exhibit. What does this Python script accomplish?
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
Which threat intelligence standard contains malware hashes?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
How does a WCCP-configured router identify if the Cisco WSA is functional?
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?
An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
Which type of protection encrypts RSA keys when they are exported and imported?
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Which MDM configuration provides scalability?
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection,
enabling the platform to identify and output various applications within the network traffic flows?
An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)
What is a key difference between Cisco Firepower and Cisco ASA?
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the
ASA be added on the Cisco UC Manager platform?
Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
A web hosting company must upgrade its older, unsupported on-premises servers. The company wants a cloud solution in which the cloud provider is responsible for:
Server patching
Application maintenance
Data center security
Disaster recovery
Which type of cloud meets the requirements?
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
What is the function of Cisco Cloudlock for data security?
How is ICMP used an exfiltration technique?
Drag and drop the security solutions from the left onto the benefits they provide on the right.
Refer to the exhibit.
An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?
Which solution should be leveraged for secure access of a CI/CD pipeline?
An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?
How does Cisco Secure Endpoint provide next-generation protection?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on
four different switch ports at the same time. What two catalyst switch security features will prevent further
violations? (Choose two)
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
Drag and drop the cloud security assessment components from the left onto the definitions on the right.
Which two cryptographic algorithms are used with IPsec? (Choose two)
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
Refer to the exhibit.
Which command was used to generate this output and to show which ports are
authenticating with dot1x or mab?
Which benefit does endpoint security provide the overall security posture of an organization?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which command is used to log all events to a destination colector 209.165.201.107?
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
An engineer is configuring device-hardening on a router in order to prevent credentials from being seen
if the router configuration was compromised. Which command should be used?
An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway.
The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of
certificate should be presented to the end-user to accomplish this goal?
Which technology is used to improve web traffic performance by proxy caching?
Drag and drop the solutions from the left onto the solution's benefits on the right.
A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?
What is the purpose of the Cisco Endpoint loC feature?
On which part of the IT environment does DevSecOps focus?
Refer to the exhibit. An engineer is implementing a certificate-based VPN. What is the result of the existing configuration?