An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
Which type of dashboard does Cisco Catalyst Center provide for complete control of the network?
Which SNMPv3 configuration must be used to support the strongest security possible?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites
but other sites are not accessible due to an error. Why is the error occurring?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?
A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
For which type of attack is multifactor authentication an effective deterrent?
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?
An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?
Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?
Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?
An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and
operate as a cloud-native CASB. Which solution must be used for this implementation?
Drag and drop the capabilities from the left onto the correct technologies on the right.
Refer to the exhibit. An engineer must configure an incoming mail policy so that each email sent from usera1@example.com to a domain of @cisco.com is scanned for antispam and advanced malware protection. All other settings will use the default behavior. What must be configured in the incoming mail policy to meet the requirements?
An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?
What provides visibility and awareness into what is currently occurring on the network?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?
A security engineer is tasked with configuring TACACS on a Cisco ASA firewall. The engineer must be able to access the firewall command line interface remotely. The authentication must fall back to the local user database of the Cisco ASA firewall. AAA server group named TACACS-GROUP is already configured with TACACS server IP address 192.168.10.10 and key C1sc0512222832!. Which configuration must be done next to meet the requirement?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers
and can be stopped by Cisco Umbrella?
Which two actions does the Cisco ISE posture module provide that ensures endpoint security? (Choose two.)
Which two activities are performed using Cisco Catalyst Center? (Choose two.)
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
An engineer must configure AsyncOS for Cisco Secure Web Appliance to push log files to a syslog server using the SCP retrieval method. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments?
Which Cisco security solution secures public, private, hybrid, and community clouds?
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)
In which cloud services model is the tenant responsible for virtual machine OS patching?
A security engineer must create a policy based on the reputation verdict of a file from a Cisco Secure Email Gateway. The file with an undetermined verdict must be dropped. Which action must the security engineer take to meet the requirement?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Refer to the exhibit.
Which command was used to generate this output and to show which ports are
authenticating with dot1x or mab?
Which Cisco solution integrates industry-leading artificial intelligence and machine learning analytics and an assurance database to review the security posture and maintain visibility of an organization’s cloud environment?
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
When Cisco and other industry organizations publish and inform users of known security findings and
vulnerabilities, which name is used?
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention
System? (Choose two)
An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?
When MAB is configured for use within the 802.1X environment, an administrator must create a policy that allows the devices onto the network. Which information is used for the username and password?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
What is a characteristic of a bridge group in ASA Firewall transparent mode?
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,
which allows the SOC to proactively automate responses to those threats?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco Secure Email Gateway?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
Email security has become a high priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which action will the system perform to disable any links in messages that match the filter?
What are two differences between a Cisco Secure Web Appliance that is running in transparent mode and one running in explicit mode? (Choose two.)
Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
Refer to the exhibit. The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the
command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256
cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is
deleted from an identity group?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline
posture node?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which two Cisco Umbrella security categories are used to prevent command-and-control callbacks on port 53 and protect users from being tricked into providing confidential information? (Choose two.)
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?
(Choose two)
What is an advantage of using a next-generation firewall compared to a traditional firewall?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?
A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)
Refer to the exhibit. An engineer must configure a new Cisco ISE backend server as a RADIUS server to provide AAA for all access requests from the client to the ISE-Frontend server.
Which Cisco ISE configuration must be used?
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
An engineer must deploy Cisco Secure Email with Cloud URL Analysis and must meet these requirements:
To protect the network from large-scale virus outbreaks
To protect the network from non-viral attacks such as phishing scams and malware distribution
To provide active analysis of the structure of the URL and information about the domain and page contents
Which two prerequisites must the engineer ensure are configured? (Choose two.)
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which
probe must be enabled for this type of profiling to work?
Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Where are individual sites specified to be block listed in Cisco Umbrella?
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN
configuration as opposed to DMVPN?
When a Cisco Secure Web Appliance checks a web request, what occurs if it is unable to match a user-defined policy?
What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized
solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over
to Cisco FTDs. Which solution meets the needs of the organization?
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
A malicious user gained network access by spoofing printer connections that were authorized using MAB on
four different switch ports at the same time. What two catalyst switch security features will prevent further
violations? (Choose two)
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Which deployment model is the most secure when considering risks to cloud adoption?
Which algorithm provides encryption and authentication for data plane communication?
Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?
Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
What is the role of an endpoint in protecting a user from a phishing attack?
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?
Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed
devices?
Refer to the exhibit. When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZ_inside zone once the configuration is deployed?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view
of activity?
Which information is required when adding a device to Firepower Management Center?
Which ASA deployment mode can provide separation of management on a shared appliance?
Refer to the exhibit,
which command results in these messages when attempting to troubleshoot an iPsec VPN connection?
Which Cisco firewall solution supports configuration via Cisco Policy Language?
Refer to the exhibit. A network engineer must configure a Cisco router to send traps using SNMPv3. The engineer configures a remote user to receive traps and sets the security level to use authentication without privacy. Which command completes the configuration?
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
Which VPN technology can support a multivendor environment and secure traffic between sites?
Which action configures the IEEE 802.1X Flexible Authentication feature lo support Layer 3 authentication mechanisms?
Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
Refer to the exhibit.
What is the result of this Python script of the Cisco DNA Center API?
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast
packets have been flooding the network. What must be configured, based on a predefined threshold, to
address this issue?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)
Refer to the exhibit.
Consider that any feature of DNS requests, such as the length off the domain name
and the number of subdomains, can be used to construct models of expected behavior to which
observed values can be compared. Which type of malicious attack are these values associated with?
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a
recipient address. Which list contains the allowed recipient addresses?