What are two list types within Cisco AMP for Endpoint Outbreak Control? (Choose two)
A. blocked ports
B. simple custom detections
C. command and control
D. allowed applications
E. URL
BD
Which command enables 802.1x globally on a Cisco switch?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. authentication port-control auto
D. aaa new-model
A
What is the function of Cisco Cloudlock for data security?
A. data loss prevention
B. controls malicious cloud apps
C. detects anomalies
D. user and entity behavior analytics
A
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
A. computer identity
B. Windows service
C. user identity
D. Windows Firewall
E. default browser
BD
What is a characteristic of Dynamic ARP Inspection?
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted.
C. DAI associates a trust state with each switch.
D. DAI intercepts all ARP requests and responses on trusted ports only.
A
Which Cisco product provides endpoint protection and allows administrators to centrally manage the deployment?
A. NGFW
B. AMP
C. WSA
D. ESA
B
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. application settings
B. content categories
C. security settings
D. destination lists
D
Which Statement about IOS zone-based firewalls is true?
A. An unassigned interface can communicate with assigned interfaces.
B. Only one interface can be assigned to a zone
C. An interface can be assigned to multiple zones
D. An interface can be assigned only to one zone
D
Which two activities can be done using Cisco DNA Center?
A. DHCP
B. design
C. accounting
D. DNS
E. Provisioning
BE
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
A. RSA SecureID
B. Internal Database
C. Active Directory
D. LDAP
A
Which VPN technology can support a multivendor environment and secure traffic between sites?
A. SSL VPN
B. GET VPN
C. FlexVPN
D. DMVPN
C
Which SNMPv3 Configuration must be used to support the strongest security possible?
aes 256
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other 3rd party management tools, and prioritize application traffic?
A. Cisco Security Intelligence
B. Cisco Application Visibility and Control
C. Cisco Model Driven Telemetry
D. Cisco DNA Center
B
Which two endpoint measures are sued to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)
A. Patch for Cross-Site Scripting
B. Perform backups to the private cloud
C. Protect against input validation and character escapes in the endpoint.
D. Install a spam and virus email filter
E. Protect systems with an up-to-date antimalware program.
DE
An Engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS 17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.
Which two solutions mitigate the risk of this ransomware infection? (Choose Two)
A. Configure a posture policy in Cisco ISE to install the MS17-010 patch before allowing access to the network.
B. Set up a profiling policy in Cisco ISE to check and endpoint patch level before allowing access to the network.
C. Configure a posture policy in Cisco ISE to check that an endpoint patch level is met before allowing access on the network.
D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network.
E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities patched in a timely fashion.
AC
Why would a user choose an on-premises ESA versus a CSA solution?
A. Sensitive data must remain onsite.
B. Demand is unpredicatable
C. The server team wants to outsource this service
D. ESA is deployed inline.
A
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPSec DVTI
D. GET VPN
D
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
A. PaaS
B. XaaS
C. IaaS
D. SaaS
A
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
A. Enable IP layer enforcement
B. Activate the Advanced Malware Protection License
C. Activate SSL Decryption
D. Enable Intelligent Proxy
D
Which two features are used to configure Cisco Secure Email Gateway with a multilayer approach to fight viruses and malware? (Choose Two)
A. Sophos Engine
B. White list
C. RAT
D. outbreak filters
E. DLP
A
D
How is Cisco Umbrella configured to log only security events?
A. per policy
B. in the Reporting Settings
C. in the security settings section
D. per network in the deployments section
A
What is the primary difference between and Endpoint Protection Platform and an Endpoint Detection and Response?
A. EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
B. EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.
C. EPP focuses on network security, and EDR focuses on device security.
D. EDR focuses on network security, and EPP focuses on device security
A
On which part of the IT environment does DevSecOps focus?
A. Application Development
B. Wireless network
C. Data center
D. Perimeter Network
A
Which functions of an SDN architecture require southbound APIs to enable communication?
A. SDN Controller and the network elements
B. Management Console and the SDN controller
C. Management Console and the Cloud
D. SDN controller and the cloud
A