Which of the following is a cloud computing model that provides everything
except applications? Services provided by this model include all phases of the
system development life cycle (SDLC) and can use application programming
interfaces (APIs), website portals, or gateway software. These solutions tend
to be proprietary, which can cause problems if the customer moves away from
the provider’s platform.
a. IaaS
b. PaaS
c. SaaS
d. Hybrid clouds
Which of the following is a software and hardware development and project
management methodology that has at least five to seven phases that follow in
strict linear order, where each phase cannot start until the previous phase has
been completed?
a. Agile
b. Waterfall
c. DevOps
d. CI/CD
Which of the following is a software development practice where
programmers merge code changes in a central repository multiple times a
day?
a. Continuous Integration (CI)
b. Agile Scrum
c. Containers
d. None of these answers are correct.
In which of the following cloud models is the end customer responsible for
maintaining and patching applications and making sure that data is protected,
but not the virtual network or operating system?
a. PaaS
b. SaaS
c. IaaS
d. IaaS and PaaS
Which technology is used by Cisco Umbrella to scale and to provide reliability
of recursive DNS services?
a. Umbrella Investigate
b. Multicast
c. BGP Route Reflectors
d. Anycast
Which Cisco Secure Email Threat Defense feature is used to detect spear
phishing attacks by examining one or more parts of the SMTP message for
manipulation, including the “Envelope-From,” “Reply To,” and “From”
headers?
a. Forged Email Detection (FED)
b. Forged Email Protection (FEP)
c. Sender Policy Framework (SPF)
d. Domain-based Message Authentication, Reporting, and Conformance
(DMARC)
Which of the following best describes the purpose of Attack Surface
Management?
a. Protecting physical assets from unauthorized access
b. Monitoring network traffic for suspicious activities
c. Identifying and managing vulnerabilities within an organization’s digital
ecosystem
d. Conducting penetration testing to assess system security
What is the key benefit of Secure Cloud Analytics?
a. Simplified data categorization and configuration process using Ansible
b. Seamless integration with on-premises networks using IPS sensors
c. Comprehensive identification of internal and external threats
d. Real-time analysis of network traffic requiring firewalls
AppDynamics provides cloud monitoring and supports which of the following
platforms?
a. Kubernetes
b. Azure
c. AWS Lambda
d. All of these answers are correct
Which statement is not true about Cisco Secure Workload?
a. Cisco Secure Workload uses software agents or can obtain telemetry
information from Cisco’s network infrastructure devices.
b. You can use the Application Dependency Mapping (ADM) functionality to
provide insight into the kind of complex applications that run in a data
center, but not in the cloud.
c. ADM enables network admins to build tight network security policies
based on various signals such as network flows, processes, and other side
information like load balancer configs and route tags.
d. Cisco Secure Workload Vulnerability Dashboard supports CVSS versions 2
and 3.
What is one key feature of the Investigate tool in Cisco XDR?
a. It restricts data search to a single source.
b. It does not allow the storage of personalized intelligence.
c. It allows users to search across all data available to the system.
d. It displays results in text form only
How does Cisco XDR prioritize incidents?
a. It uses a first-come, first-served approach.
b. It prioritizes incidents based on risk.
c. It prioritizes incidents alphabetically.
d. It does not prioritize incidents.