Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Question and Answers

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Last Update Oct 15, 2025
Total Questions : 726

We are offering FREE 350-701 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-701 free exam questions and then go for complete pool of Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) test questions that will help you more.

350-701 pdf

350-701 PDF

$46  $114.99
350-701 Engine

350-701 Testing Engine

$54  $134.99
350-701 PDF + Engine

350-701 PDF + Testing Engine

$70  $174.99
Questions 1

An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

Options:

A.  

Configure Cisco Secure Workload to detect anomalies and vulnerabilities.

B.  

Use Cisco ISE to provide application visibility and restrict access to them.

C.  

Implement Cisco Umbrella lo control the access each application is granted.

D.  

Modify the Cisco Duo configuration to restrict access between applications.

Discussion 0
Questions 2

Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)

Options:

A.  

Create new SSIDs on a wireless LAN controller

B.  

Connect to ITSM platforms

C.  

Automatically deploy new virtual routers

D.  

Upgrade software on switches and routers

E.  

Third party reporting

Discussion 0
Questions 3

In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

Options:

A.  

LDAP injection

B.  

man-in-the-middle

C.  

cross-site scripting

D.  

insecure API

Discussion 0
Questions 4

A customer has various external HTTP resources available including Intranet Extranet and Internet, with a

proxy configuration running in explicit mode. Which method allows the client desktop browsers to be configured

to select when to connect direct or when to use the proxy?

Options:

A.  

Transport mode

B.  

Forward file

C.  

PAC file

D.  

Bridge mode

Discussion 0
Questions 5

A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?

Options:

A.  

SFTP using the FMCCLI

B.  

syslog using the Secure Event Connector

C.  

direct connection using SNMP traps

D.  

HTTP POST using the Security Analytics FMC plugin

Discussion 0
Questions 6

Which Cisco firewall solution supports configuration via Cisco Policy Language?

Options:

A.  

CBAC

B.  

ZFW

C.  

IPS

D.  

NGFW

Discussion 0
Questions 7

What is managed by Cisco Security Manager?

Options:

A.  

access point

B.  

WSA

C.  

ASA

D.  

ESA

Discussion 0
Questions 8

Which encryption algorithm provides highly secure VPN communications?

Options:

A.  

3DES

B.  

AES 256

C.  

AES 128

D.  

DES

Discussion 0
Questions 9

A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?

Options:

A.  

Cisco NGFW

B.  

Cisco AnyConnect

C.  

Cisco AMP for Endpoints

D.  

Cisco Duo

Discussion 0
Questions 10

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which

vulnerability allows the attacker to see the passwords being transmitted in clear text?

Options:

A.  

weak passwords for authentication

B.  

unencrypted links for traffic

C.  

software bugs on applications

D.  

improper file security

Discussion 0
Questions 11

Which Secure Email Gateway implementation method segregates inbound and outbound email?

Options:

A.  

Pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address

B.  

One listener on one logical IPv4 address on a single logical interface

C.  

Pair of logical IPv4 listeners and a pair of IPv6 listeners on two physically separate interfaces

D.  

One listener on a single physical interface

Discussion 0
Questions 12

An administrator is trying to determine which applications are being used in the network but does not want the

network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?

Options:

A.  

NetFlow

B.  

Packet Tracer

C.  

Network Discovery

D.  

Access Control

Discussion 0
Questions 13

Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two)

Options:

A.  

posture assessment

B.  

aaa authorization exec default local

C.  

tacacs-server host 10.1.1.250 key password

D.  

aaa server radius dynamic-author

E.  

CoA

Discussion 0
Questions 14

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Options:

A.  

The attack is fragmented into groups of 16 octets before transmission.

B.  

The attack is fragmented into groups of 8 octets before transmission.

C.  

Short synchronized bursts of traffic are used to disrupt TCP connections.

D.  

Malformed packets are used to crash systems.

E.  

Publicly accessible DNS servers are typically used to execute the attack.

Discussion 0
Questions 15

v

Refer to the exhibit When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZjnside zone once the configuration is deployed?

Options:

A.  

All traffic from any zone to the DMZ_inside zone will be permitted with no further inspection

B.  

No traffic will be allowed through to the DMZ_inside zone regardless of if it's trusted or not

C.  

All traffic from any zone will be allowed to the DMZ_inside zone only after inspection

D.  

No traffic will be allowed through to the DMZ_inside zone unless it's already trusted

Discussion 0
Questions 16

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

Options:

A.  

Multiple NetFlow collectors are supported

B.  

Advanced NetFlow v9 templates and legacy v5 formatting are supported

C.  

Secure NetFlow connections are optimized for Cisco Prime Infrastructure

D.  

Flow-create events are delayed

Discussion 0
Questions 17

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?

Options:

A.  

Change isakmp to ikev2 in the command on host

A.  

B.  

Enter the command with a different password on host

B.  

C.  

Enter the same command on hostB.

D.  

Change the password on hostA to the default password.

Discussion 0
Questions 18

Which security solution protects users leveraging DNS-layer security?

Options:

A.  

Cisco ISE

B.  

Cisco FTD

C.  

Cisco Umbrella

D.  

Cisco ASA

Discussion 0
Questions 19

Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

Options:

A.  

Orchestration

B.  

CI/CD pipeline

C.  

Container

D.  

Security

Discussion 0
Questions 20

For which type of attack is multifactor authentication an effective deterrent?

Options:

A.  

Ping of death

B.  

Teardrop

C.  

SYN flood

D.  

Phishing

Discussion 0
Questions 21

Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?

Options:

A.  

AAA attributes

B.  

CoA request

C.  

AV pair

D.  

carrier-grade NAT

Discussion 0
Questions 22

A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?

Options:

A.  

The file has a reputation score that is below the threshold.

B.  

The file has a reputation score that is above the threshold.

C.  

The policy was created to disable file analysis.

D.  

The policy was created to send a message to quarantine instead of drop.

Discussion 0
Questions 23

What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?

Options:

A.  

management of application sessions

B.  

retrospective application analysis

C.  

zero-trust approach

D.  

dynamic application scanning

Discussion 0
Questions 24

A web hosting company must upgrade its older, unsupported on-premises servers. The company wants a cloud solution in which the cloud provider is responsible for:

    Server patching

    Application maintenance

    Data center security

    Disaster recovery

Which type of cloud meets the requirements?

Options:

A.  

Hybrid

B.  

IaaS

C.  

SaaS

D.  

PaaS

Discussion 0
Questions 25

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.)

Options:

A.  

Create an LDAP authentication realm and disable transparent user identification.

B.  

Create NTLM or Kerberos authentication realm and enable transparent user identification.

C.  

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

D.  

The eDirectory client must be installed on each client workstation.

E.  

Deploy a separate eDirectory server; the dent IP address is recorded in this server.

Discussion 0
Questions 26

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is

deleted from an identity group?

Options:

A.  

posture assessment

B.  

CoA

C.  

external identity source

D.  

SNMP probe

Discussion 0
Questions 27

Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?

Options:

A.  

big data

B.  

storm centers

C.  

sandboxing

D.  

blocklisting

Discussion 0
Questions 28

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which

probe must be enabled for this type of profiling to work?

Options:

A.  

NetFlow

B.  

NMAP

C.  

SNMP

D.  

DHCP

Discussion 0
Questions 29

Which two fields are defined in the NetFlow flow? (Choose two)

Options:

A.  

type of service byte

B.  

class of service bits

C.  

Layer 4 protocol type

D.  

destination port

E.  

output logical interface

Discussion 0
Questions 30

DoS attacks are categorized as what?

Options:

A.  

phishing attacks

B.  

flood attacks

C.  

virus attacks

D.  

trojan attacks

Discussion 0
Questions 31

An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and

operate as a cloud-native CASB. Which solution must be used for this implementation?

Options:

A.  

Cisco Cloudlock

B.  

Cisco Cloud Email Security

C.  

Cisco Firepower Next-Generation Firewall

D.  

Cisco Umbrella

Discussion 0
Questions 32

Which technology provides a combination of endpoint protection endpoint detection, and response?

Options:

A.  

Cisco AMP

B.  

Cisco Talos

C.  

Cisco Threat Grid

D.  

Cisco Umbrella

Discussion 0
Questions 33

Which two parameters are used for device compliance checks? (Choose two.)

Options:

A.  

endpoint protection software version

B.  

Windows registry values

C.  

DHCP snooping checks

D.  

DNS integrity checks

E.  

device operating system version

Discussion 0
Questions 34

What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?

Options:

A.  

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.

B.  

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL

C.  

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1

D.  

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.

Discussion 0
Questions 35

A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN

and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco

security appliance meets these requirements?

Options:

A.  

Cisco Cloud Orchestrator

B.  

Cisco ASAV

C.  

Cisco WSAV

D.  

Cisco Stealthwatch Cloud

Discussion 0
Questions 36

Refer to the exhibit.

The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?

Options:

A.  

P2 and P3 only

B.  

P5, P6, and P7 only

C.  

P1, P2, P3, and P4 only

D.  

P2, P3, and P6 only

Discussion 0
Questions 37

What is the function of the crypto is a kmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?

Options:

A.  

It defines what data is going to be encrypted via the VPN

B.  

lt configures the pre-shared authentication key

C.  

It prevents all IP addresses from connecting to the VPN server.

D.  

It configures the local address for the VPN server.

Discussion 0
Questions 38

An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?

Options:

A.  

Use DNSSEC between the endpoints and Cisco Umbrella DNS servers.

B.  

Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones.

C.  

Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional.

D.  

Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers.

Discussion 0
Questions 39

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,

which allows the SOC to proactively automate responses to those threats?

Options:

A.  

Cisco Umbrella

B.  

External Threat Feeds

C.  

Cisco Threat Grid

D.  

Cisco Stealthwatch

Discussion 0
Questions 40

Which posture assessment requirement provides options to the client for remediation and requires the

remediation within a certain timeframe?

Options:

A.  

Audit

B.  

Mandatory

C.  

Optional

D.  

Visibility

Discussion 0
Questions 41

What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)

Options:

A.  

Use intrusion prevention system.

B.  

Block all TXT DNS records.

C.  

Enforce security over port 53.

D.  

Use next generation firewalls.

E.  

Use Cisco Umbrella.

Discussion 0
Questions 42

Which type of encryption uses a public key and private key?

Options:

A.  

Asymmetric

B.  

Symmetric

C.  

Linear

D.  

Nonlinear

Discussion 0
Questions 43

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

Options:

A.  

Application Control

B.  

Security Category Blocking

C.  

Content Category Blocking

D.  

File Analysis

Discussion 0
Questions 44

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

(Choose two)

Options:

A.  

configure Active Directory Group Policies to push proxy settings

B.  

configure policy-based routing on the network infrastructure

C.  

reference a Proxy Auto Config file

D.  

configure the proxy IP address in the web-browser settings

E.  

use Web Cache Communication Protocol

Discussion 0
Questions 45

Which attack gives unauthorized access to files on the web server?

Options:

A.  

Distributed DoS

B.  

Broadcast storm

C.  

DHCP snooping

D.  

Path traversal

Discussion 0
Questions 46

An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?

Options:

A.  

Only requests that originate from a configured NAS IP are accepted by a RADIUS server

B.  

The RADIUS authentication key is transmitted only from the defined RADIUS source interface

C.  

RADIUS requests are generated only by a router if a RADIUS source interface is defined.

D.  

Encrypted RADIUS authentication requires the RADIUS source interface be defined

Discussion 0
Questions 47

Which category includes DoS Attacks?

Options:

A.  

Virus attacks

B.  

Trojan attacks

C.  

Flood attacks

D.  

Phishing attacks

Discussion 0
Questions 48

Which interface mode does a Cisco Secure IPS device use to block suspicious traffic?

Options:

A.  

Passive

B.  

Inline

C.  

Promiscuous

D.  

Active

Discussion 0
Questions 49

What is a capability of Cisco ASA Netflow?

Options:

A.  

It filters NSEL events based on traffic

B.  

It generates NSEL events even if the MPF is not configured

C.  

It logs all event types only to the same collector

D.  

It sends NetFlow data records from active and standby ASAs in an active standby failover pair

Discussion 0
Questions 50

Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)

Options:

A.  

Labels the key pair to be used for SSH

B.  

Uses the FQDN with the label command

C.  

Generates AES key pairs on the router

D.  

Generates RSA key pair on the router

E.  

Enables SSHv1 on the router

Discussion 0
Questions 51

Which parameter is required when configuring a Netflow exporter on a Cisco Router?

Options:

A.  

DSCP value

B.  

Source interface

C.  

Exporter name

D.  

Exporter description

Discussion 0
Questions 52

What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

Options:

A.  

Telemetry uses a pull mehod, which makes it more reliable than SNMP

B.  

Telemetry uses push and pull, which makes it more scalable than SNMP

C.  

Telemetry uses push and pull which makes it more secure than SNMP

D.  

Telemetry uses a push method which makes it faster than SNMP

Discussion 0
Questions 53

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

Options:

A.  

Group Policy

B.  

Access Control Policy

C.  

Device Management Policy

D.  

Platform Service Policy

Discussion 0
Questions 54

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

Options:

A.  

Modify an access policy

B.  

Modify identification profiles

C.  

Modify outbound malware scanning policies

D.  

Modify web proxy settings

Discussion 0
Questions 55

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.

Which task can you perform to determine where each message was lost?

Options:

A.  

Configure the trackingconfig command to enable message tracking.

B.  

Generate a system report.

C.  

Review the log files.

D.  

Perform a trace.

Discussion 0
Questions 56

A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?

Options:

A.  

DHCP snooping has not been enabled on all VLANs.

B.  

The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users.

C.  

Dynamic ARP Inspection has not been enabled on all VLANs

D.  

The no ip arp inspection trust command is applied on all user host interfaces

Discussion 0
Questions 57

An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints The configured detection method must work on files of unknown disposition Which Outbreak Control list must be configured to provide this?

Options:

A.  

Blocked Application

B.  

Simple Custom Detection

C.  

Advanced Custom Detection

D.  

Android Custom Detection

Discussion 0
Questions 58

An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?

Options:

A.  

single interface

B.  

multi-context

C.  

transparent

D.  

two-interface

Discussion 0
Questions 59

Which capability is provided by application visibility and control?

Options:

A.  

reputation filtering

B.  

data obfuscation

C.  

data encryption

D.  

deep packet inspection

Discussion 0
Questions 60

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

Options:

A.  

It decrypts HTTPS application traffic for unauthenticated users.

B.  

It alerts users when the WSA decrypts their traffic.

C.  

It decrypts HTTPS application traffic for authenticated users.

D.  

It provides enhanced HTTPS application detection for AsyncOS.

Discussion 0
Questions 61

Why should organizations migrate to a multifactor authentication strategy?

Options:

A.  

Multifactor authentication methods of authentication are never compromised

B.  

Biometrics authentication leads to the need for multifactor authentication due to its ability to be hacked easily

C.  

Multifactor authentication does not require any piece of evidence for an authentication mechanism

D.  

Single methods of authentication can be compromised more easily than multifactor authentication

Discussion 0
Questions 62

How does Cisco Workload Optimization Manager help mitigate application performance issues?

Options:

A.  

It deploys an AWS Lambda system

B.  

It automates resource resizing

C.  

It optimizes a flow path

D.  

It sets up a workload forensic score

Discussion 0
Questions 63

Which statement about IOS zone-based firewalls is true?

Options:

A.  

An unassigned interface can communicate with assigned interfaces

B.  

Only one interface can be assigned to a zone.

C.  

An interface can be assigned to multiple zones.

D.  

An interface can be assigned only to one zone.

Discussion 0
Questions 64

What is a difference between an XSS attack and an SQL injection attack?

Options:

A.  

SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist in many different types of applications

B.  

XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications

C.  

SQL injection attacks are used to steal information from databases whereas XSS attacks are used toredirect users to websites where attackers can steal data from them

D.  

XSS attacks are used to steal information from databases whereas SQL injection attacks are used toredirect users to websites where attackers can steal data from them

Discussion 0
Questions 65

Which two preventive measures are used to control cross-site scripting? (Choose two)

Options:

A.  

Enable client-side scripts on a per-domain basis.

B.  

Incorporate contextual output encoding/escaping.

C.  

Disable cookie inspection in the HTML inspection engine.

D.  

Run untrusted HTML input through an HTML sanitization engine.

E.  

Same Site cookie attribute should not be used.

Discussion 0
Questions 66

A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing

authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?

Options:

A.  

Adaptive Network Control Policy List

B.  

Context Visibility

C.  

Accounting Reports

D.  

RADIUS Live Logs

Discussion 0
Questions 67

Which technology reduces data loss by identifying sensitive information stored in public computing

environments?

Options:

A.  

Cisco SDA

B.  

Cisco Firepower

C.  

Cisco HyperFlex

D.  

Cisco Cloudlock

Discussion 0
Questions 68

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Options:

A.  

AMP

B.  

AnyConnect

C.  

DynDNS

D.  

Talos

Discussion 0
Questions 69

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast

packets have been flooding the network. What must be configured, based on a predefined threshold, to

address this issue?

Options:

A.  

Bridge Protocol Data Unit guard

B.  

embedded event monitoring

C.  

storm control

D.  

access control lists

Discussion 0
Questions 70

An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?

Options:

A.  

Add the specified addresses to the identities list and create a block action.

B.  

Create a destination list for addresses to be allowed or blocked.

C.  

Use content categories to block or allow specific addresses.

D.  

Modify the application settings to allow only applications to connect to required addresses.

Discussion 0
Questions 71

What is a difference between GETVPN and IPsec?

Options:

A.  

GETVPN reduces latency and provides encryption over MPLS without the use of a central hub

B.  

GETVPN provides key management and security association management

C.  

GETVPN is based on IKEv2 and does not support IKEv1

D.  

GETVPN is used to build a VPN network with multiple sites without having to statically configure all devices

Discussion 0
Questions 72

When MAB is configured for use within the 802.1X environment, an administrator must create a policy that allows the devices onto the network. Which information is used for the username and password?

Options:

A.  

The MAB uses the IP address as username and password.

B.  

The MAB uses the call-station-ID as username and password.

C.  

Each device must be set manually by the administrator.

D.  

The MAB uses the MAC address as username and password.

Discussion 0
Questions 73

An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?

Options:

A.  

Cisco Stealthwatch Cloud

B.  

Cisco Umbrella

C.  

NetFlow collectors

D.  

Cisco Cloudlock

Discussion 0
Questions 74

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your

environment?

Options:

A.  

Prevalence

B.  

File analysis

C.  

Detections

D.  

Vulnerable software

E.  

Threat root cause

Discussion 0
Questions 75

Which feature requires that network telemetry be enabled?

Options:

A.  

per-interface stats

B.  

SNMP trap notification

C.  

Layer 2 device discovery

D.  

central syslog system

Discussion 0
Questions 76

Which problem Is solved by deploying a multicontext firewall?

Options:

A.  

overlapping IP addressing plan

B.  

more secure policy

C.  

resilient high availability design

D.  

faster inspection

Discussion 0
Questions 77

On which part of the IT environment does DevSecOps focus?

Options:

A.  

application development

B.  

wireless network

C.  

data center

D.  

perimeter network

Discussion 0
Questions 78

Refer to the exhibit. A network engineer must configure a Cisco router to send traps using SNMPv3. The engineer configures a remote user to receive traps and sets the security level to use authentication without privacy. Which command completes the configuration?

Options:

A.  

snmp-server host 10.12.8.4 informs version 3 noauthno remoteuser config

B.  

snmp-server host 10.12.8.4 informs version 3 noauthnoPriv remoteuser config

C.  

snmp-server user TrapUser group2 remote 10.12.8.4 v3 auth md5 password1

D.  

snmp-server user TrapUser group2 remote 10.12.8.4 v3 auth md5 password1 priv access des56

Discussion 0
Questions 79

How is data sent out to the attacker during a DNS tunneling attack?

Options:

A.  

as part of the UDP/53 packet payload

B.  

as part of the domain name

C.  

as part of the TCP/53 packet header

D.  

as part of the DNS response packet

Discussion 0
Questions 80

What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?

Options:

A.  

To protect the endpoint against malicious file transfers

B.  

To ensure that assets are secure from malicious links on and off the corporate network

C.  

To establish secure VPN connectivity to the corporate network

D.  

To enforce posture compliance and mandatory software

Discussion 0
Questions 81

How does Cisco AMP for Endpoints provide next-generation protection?

Options:

A.  

It encrypts data on user endpoints to protect against ransomware.

B.  

It leverages an endpoint protection platform and endpoint detection and response.

C.  

It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers.

D.  

It integrates with Cisco FTD devices.

Discussion 0
Questions 82

Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?

Options:

A.  

Retrospective security

B.  

Endpoint isolation

C.  

Advanced investigation

D.  

Advanced search

Discussion 0
Questions 83

What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?

Options:

A.  

trusted automated exchange

B.  

Indicators of Compromise

C.  

The Exploit Database

D.  

threat intelligence

Discussion 0
Questions 84

Which two activities are performed using Cisco Catalyst Center? (Choose two.)

Options:

A.  

DHCP

B.  

Design

C.  

Provision

D.  

DNS

E.  

Accounting

Discussion 0
Questions 85

Which threat intelligence standard contains malware hashes?

Options:

A.  

structured threat information expression

B.  

advanced persistent threat

C.  

trusted automated exchange or indicator information

D.  

open command and control

Discussion 0
Questions 86

Which attack is preventable by Cisco ESA but not by the Cisco WSA?

Options:

A.  

buffer overflow

B.  

DoS

C.  

SQL injection

D.  

phishing

Discussion 0
Questions 87

A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)

Options:

A.  

using Cisco Umbrella

B.  

using Cisco FTD

C.  

using Cisco ISE

D.  

using Cisco Secure Email Gateway

E.  

using an inline IPS/IDS in the network

Discussion 0
Questions 88

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

Options:

A.  

GET

B.  

CONNECT

C.  

PUSH

D.  

OPTIONS

E.  

PUT

Discussion 0
Questions 89

An engineer must configure AsyncOS for Cisco Secure Web Appliance to push log files to a syslog server using the SCP retrieval method. Drag and drop the steps from the left into the sequence on the right to complete the configuration.

Options:

Discussion 0
Questions 90

Which Cisco cloud security software centrally manages policies on multiple platforms such as Cisco ASA, Cisco Firepower, Cisco Meraki, and AWS?

Options:

A.  

Cisco Defense Orchestrator

B.  

Cisco Configuration Professional

C.  

Cisco Secureworks

D.  

Cisco DNAC

Discussion 0
Questions 91

Refer to the exhibit. What is the result of the Python script?

Options:

A.  

It uses the POST HTTP method to obtain a username and password to be used for authentication.

B.  

It uses the POST HTTP method to obtain a token to be used for authentication.

C.  

It uses the GET HTTP method to obtain a token to be used for authentication.

D.  

It uses the GET HTTP method to obtain a username and password to be used for authentication

Discussion 0
Questions 92

An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?

Options:

A.  

Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address

B.  

Use the tenant control features to identify each subnet being used and track the connections within theCisco Umbrella dashboard

C.  

Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard

D.  

Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains

Discussion 0
Questions 93

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)

Options:

A.  

data exfiltration

B.  

command and control communication

C.  

intelligent proxy

D.  

snort

E.  

URL categorization

Discussion 0
Questions 94

Which type of attack is MFA an effective deterrent for?

Options:

A.  

ping of death

B.  

phishing

C.  

teardrop

D.  

syn flood

Discussion 0
Questions 95

What is the benefit of installing Cisco AMP for Endpoints on a network?

Options:

A.  

It provides operating system patches on the endpoints for security.

B.  

It provides flow-based visibility for the endpoints network connections.

C.  

It enables behavioral analysis to be used for the endpoints.

D.  

It protects endpoint systems through application control and real-time scanning

Discussion 0
Questions 96

An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?

Options:

A.  

ntp peer 1.1.1.1 key 1

B.  

ntp server 1.1.1.1 key 1

C.  

ntp server 1.1.1.2 key 1

D.  

ntp peer 1.1.1.2 key 1

Discussion 0
Questions 97

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the

ASA be added on the Cisco UC Manager platform?

Options:

A.  

Certificate Trust List

B.  

Endpoint Trust List

C.  

Enterprise Proxy Service

D.  

Secured Collaboration Proxy

Discussion 0
Questions 98

A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?

Options:

A.  

Use MAB with profiling

B.  

Use MAB with posture assessment.

C.  

Use 802.1X with posture assessment.

D.  

Use 802.1X with profiling.

Discussion 0
Questions 99

An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?

Options:

A.  

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

B.  

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

C.  

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

D.  

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

Discussion 0
Questions 100

What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?

Options:

A.  

mobile device management

B.  

mobile content management

C.  

mobile application management

D.  

mobile access management

Discussion 0
Questions 101

Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?

Options:

A.  

NTP

B.  

syslog

C.  

SNMP

D.  

NetFlow

Discussion 0
Questions 102

Which two authentication protocols are supported by the Cisco WSA? (Choose two.)

Options:

A.  

WCCP

B.  

NTLM

C.  

TLS

D.  

SSL

E.  

LDAP

Discussion 0
Questions 103

Refer to the exhibit.

What will happen when the Python script is executed?

Options:

A.  

The hostname will be translated to an IP address and printed.

B.  

The hostname will be printed for the client in the client ID field.

C.  

The script will pull all computer hostnames and print them.

D.  

The script will translate the IP address to FODN and print it

Discussion 0
Questions 104

An engineer must configure Cisco AMP for Endpoints so that it contains a list of files that should not be executed by users. These files must not be quarantined. Which action meets this configuration requirement?

Options:

A.  

Identity the network IPs and place them in a blocked list.

B.  

Modify the advanced custom detection list to include these files.

C.  

Create an application control blocked applications list.

D.  

Add a list for simple custom detection.

Discussion 0
Questions 105

Refer to the exhibit. An engineer must configure an incoming mail policy so that each email sent from usera1@example.com to a domain of @cisco.com is scanned for antispam and advanced malware protection. All other settings will use the default behavior. What must be configured in the incoming mail policy to meet the requirements?

Options:

A.  

Policy Name: Default Policy

  Sender: usera1@example.com

  Recipient: @cisco.com

B.  

Policy Name: usera1 policy

  Sender: usera1@example.com

  Recipient: @cisco.com

C.  

Policy Name: Anti-Malware policy

  Sender: usera1@example.com

  Recipient: @cisco.com

D.  

Policy Name: cisco.com policy

  Sender: usera1@example.com

  Recipient: @cisco.com

Discussion 0
Questions 106

Which metric is used by the monitoring agent to collect and output packet loss and jitter information?

Options:

A.  

WSAv performance

B.  

AVC performance

C.  

OTCP performance

D.  

RTP performance

Discussion 0
Questions 107

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)

Options:

A.  

The Cisco WSA responds with its own IP address only if it is running in explicit mode.

B.  

The Cisco WSA is configured in a web browser only if it is running in transparent mode.

C.  

The Cisco WSA responds with its own IP address only if it is running in transparent mode.

D.  

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

E.  

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

Discussion 0
Questions 108

Which Cisco Firewall solution requires zone definition?

Options:

A.  

CBAC

B.  

Cisco AMP

C.  

ZBFW

D.  

Cisco ASA

Discussion 0
Questions 109

Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?

Options:

A.  

SDLC

B.  

Docker

C.  

Lambda

D.  

Contiv

Discussion 0
Questions 110

An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?

Options:

A.  

Summarized server-name information and MD5-hashed path information

B.  

complete URL,without obfuscating the path segments

C.  

URL information collected from clients that connect to the Cisco WSA using Cisco AnyConnect

D.  

none because SensorBase Network Participation is disabled by default

Discussion 0
Questions 111

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a

connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

Options:

A.  

Cisco Firepower

B.  

Cisco Umbrella

C.  

ISE

D.  

AMP

Discussion 0
Questions 112

Which baseline form of telemetry is recommended for network infrastructure devices?

Options:

A.  

SDNS

B.  

NetFlow

C.  

passive taps

D.  

SNMP

Discussion 0
Questions 113

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?

Options:

A.  

Cisco Tetration

B.  

Cisco ISE

C.  

Cisco AMP for Network

D.  

Cisco AnyConnect

Discussion 0
Questions 114

How does a Cisco Secure Firewall help to lower the risk of exfiltration techniques that steal customer data?

Options:

A.  

Blocking UDP port 53

B.  

Blocking TCP port 53

C.  

Encrypting the DNS communication

D.  

Inspecting the DNS traffic

Discussion 0
Questions 115

Refer to the exhibit.

What is the result of this Python script of the Cisco DNA Center API?

Options:

A.  

adds authentication to a switch

B.  

adds a switch to Cisco DNA Center

C.  

receives information about a switch

D.  

deletes a switch from Cisco DNA Center

Discussion 0
Questions 116

Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?

Options:

A.  

buffer overflow

B.  

browser WGET

C.  

SQL injection

D.  

cross-site scripting

Discussion 0
Questions 117

What are two benefits of Flexible NetFlow records? (Choose two)

Options:

A.  

They allow the user to configure flow information to perform customized traffic identification

B.  

They provide attack prevention by dropping the traffic

C.  

They provide accounting and billing enhancements

D.  

They converge multiple accounting technologies into one accounting mechanism

E.  

They provide monitoring of a wider range of IP packet information from Layer 2 to 4

Discussion 0
Questions 118

Refer to the exhibit.

Consider that any feature of DNS requests, such as the length off the domain name

and the number of subdomains, can be used to construct models of expected behavior to which

observed values can be compared. Which type of malicious attack are these values associated with?

Options:

A.  

Spectre Worm

B.  

Eternal Blue Windows

C.  

Heartbleed SSL Bug

D.  

W32/AutoRun worm

Discussion 0
Questions 119

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed

devices?

Options:

A.  

health policy

B.  

system policy

C.  

correlation policy

D.  

access control policy

E.  

health awareness policy

Discussion 0
Questions 120

An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?

Options:

A.  

Configure transparent traffic redirection using WCCP in the Cisco WSA and on the network device

B.  

Configure active traffic redirection using WPAD in the Cisco WSA and on the network device

C.  

Use the Layer 4 setting in the Cisco WSA to receive explicit forward requests from the network device

D.  

Use PAC keys to allow only the required network devices to send the traffic to the Cisco WSA

Discussion 0
Questions 121

Refer to the exhibit. What function does the API key perform while working with https://api.amp.cisco.com/v1/computers?

Options:

A.  

imports requests

B.  

HTTP authorization

C.  

HTTP authentication

D.  

plays dent ID

Discussion 0
Questions 122

Refer to the exhibit.

Which type of authentication is in use?

Options:

A.  

LDAP authentication for Microsoft Outlook

B.  

POP3 authentication

C.  

SMTP relay server authentication

D.  

external user and relay mail authentication

Discussion 0
Questions 123

Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Options:

A.  

With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it

B.  

With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

C.  

With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

D.  

With an on-premise solution, the customer is responsible for the installation and maintenance of theproduct, whereas with a cloud-based solution, the provider is responsible for it.

Discussion 0
Questions 124

Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?

(Choose two)

Options:

A.  

URLs

B.  

protocol IDs

C.  

IP addresses

D.  

MAC addresses

E.  

port numbers

Discussion 0
Questions 125

Which Cisco security solution stops exfiltration using HTTPS?

Options:

A.  

Cisco FTD

B.  

Cisco AnyConnect

C.  

Cisco CTA

D.  

Cisco ASA

Discussion 0
Questions 126

An administrator needs to configure the Cisco ASA via ASDM such that the network management system

can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?

(Choose two.)

Options:

A.  

Specify the SNMP manager and UDP port.

B.  

Specify an SNMP user group

C.  

Specify a community string.

D.  

Add an SNMP USM entry

E.  

Add an SNMP host access entry

Discussion 0
Questions 127

An organization wants to provide visibility and to identify active threats in its network using a VM. The

organization wants to extract metadata from network packet flow while ensuring that payloads are not retained

or transferred outside the network. Which solution meets these requirements?

Options:

A.  

Cisco Umbrella Cloud

B.  

Cisco Stealthwatch Cloud PNM

C.  

Cisco Stealthwatch Cloud PCM

D.  

Cisco Umbrella On-Premises

Discussion 0
Questions 128

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?

Options:

A.  

consumption

B.  

sharing

C.  

editing

D.  

authoring

Discussion 0
Questions 129

A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?

Options:

A.  

dynamic split tunneling

B.  

local LAN access

C.  

dynamic access policies

D.  

reverse route injection

Discussion 0
Questions 130

An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?

Options:

A.  

Set a trusted interface for the DHCP server

B.  

Set the DHCP snooping bit to 1

C.  

Add entries in the DHCP snooping database

D.  

Enable ARP inspection for the required VLAN

Discussion 0
Questions 131

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Options:

A.  

transparent

B.  

redirection

C.  

forward

D.  

proxy gateway

Discussion 0
Questions 132

Which two Cisco Umbrella security categories are used to prevent command-and-control callbacks on port 53 and protect users from being tricked into providing confidential information? (Choose two.)

Options:

A.  

DNS Tunneling VPN

B.  

Dynamic DNS

C.  

Newly Seen Domains

D.  

Potentially Harmful Domains

E.  

Phishing Attacks

Discussion 0
Questions 133

Which SNMPv3 configuration must be used to support the strongest security possible?

Options:

A.  

asa-host(config)#snmp-server group myv3 v3 privasa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXXasa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

B.  

asa-host(config)#snmp-server group myv3 v3 noauthasa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXXasa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

C.  

asa-host(config)#snmpserver group myv3 v3 noauthasa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXXasa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

D.  

asa-host(config)#snmp-server group myv3 v3 privasa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXXasa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

Discussion 0
Questions 134

Email security has become a high priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which action will the system perform to disable any links in messages that match the filter?

Options:

A.  

Defang

B.  

Quarantine

C.  

FilterAction

D.  

ScreenAction

Discussion 0
Questions 135

What are two security benefits of an MDM deployment? (Choose two.)

Options:

A.  

robust security policy enforcement

B.  

privacy control checks

C.  

on-device content management

D.  

distributed software upgrade

E.  

distributed dashboard

Discussion 0
Questions 136

What are two functions of secret key cryptography? (Choose two)

Options:

A.  

key selection without integer factorization

B.  

utilization of different keys for encryption and decryption

C.  

utilization of large prime number iterations

D.  

provides the capability to only know the key on one side

E.  

utilization of less memory

Discussion 0
Questions 137

Drag and drop the cloud security assessment components from the left onto the definitions on the right.

Options:

Discussion 0
Questions 138

Which endpoint solution protects a user from a phishing attack?

Options:

A.  

Cisco Identity Services Engine

B.  

Cisco AnyConnect with ISE Posture module

C.  

Cisco AnyConnect with Network Access Manager module

D.  

Cisco AnyConnect with Umbrella Roaming Security module

Discussion 0
Questions 139

What is the purpose of a NetFlow version 9 template record?

Options:

A.  

It specifies the data format of NetFlow processes.

B.  

It provides a standardized set of information about an IP flow.

C.  

lt defines the format of data records.

D.  

It serves as a unique identification number to distinguish individual data records

Discussion 0
Questions 140

An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?

Options:

A.  

ntp server 192.168.1.110 primary key 1

B.  

ntp peer 192.168.1.110 prefer key 1

C.  

ntp server 192.168.1.110 key 1 prefer

D.  

ntp peer 192.168.1.110 key 1 primary

Discussion 0
Questions 141

What is the recommendation in a zero-trust model before granting access to corporate applications and resources?

Options:

A.  

To use a wired network, not wireless

B.  

To use strong passwords

C.  

To use multifactor authentication

D.  

To disconnect from the network when inactive

Discussion 0
Questions 142

Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?

Options:

A.  

Hybrid

B.  

Community

C.  

Private

D.  

Public

Discussion 0
Questions 143

An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized

solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over

to Cisco FTDs. Which solution meets the needs of the organization?

Options:

A.  

Cisco FMC

B.  

CSM

C.  

Cisco FDM

D.  

CDO

Discussion 0
Questions 144

How does the Cisco WSA enforce bandwidth restrictions for web applications?

Options:

A.  

It implements a policy route to redirect application traffic to a lower-bandwidth link.

B.  

It dynamically creates a scavenger class QoS policy and applies it to each client that connects through the WSA.

C.  

It sends commands to the uplink router to apply traffic policing to the application traffic.

D.  

It simulates a slower link by introducing latency into application traffic.

Discussion 0
Questions 145

What are two benefits of using an MDM solution? (Choose two.)

Options:

A.  

grants administrators a way to remotely wipe a lost or stolen device

B.  

provides simple and streamlined login experience for multiple applications and users

C.  

native integration that helps secure applications across multiple cloud platforms or on-premises environments

D.  

encrypts data that is stored on endpoints

E.  

allows for centralized management of endpoint device applications and configurations

Discussion 0
Questions 146

An administrator has been tasked with configuring the Cisco Secure Email Gateway to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)

Options:

A.  

Deploy the Secure Email Gateway in the DMZ.

B.  

Use outbreak filters from Cisco Talos.

C.  

Configure a recipient access table.

D.  

Enable a message tracking service.

E.  

Scan quarantined emails using AntiVirus signatures.

Discussion 0
Questions 147

An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization

needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of

172.19.20.24. Which command on the hub will allow the administrator to accomplish this?

Options:

A.  

crypto ca identity 172.19.20.24

B.  

crypto isakmp key Cisco0123456789 172.19.20.24

C.  

crypto enrollment peer address 172.19.20.24

D.  

crypto isakmp identity address 172.19.20.24

Discussion 0
Questions 148

What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Options:

A.  

Ethos Engine to perform fuzzy fingerprinting

B.  

Tetra Engine to detect malware when me endpoint is connected to the cloud

C.  

Clam AV Engine to perform email scanning

D.  

Spero Engine with machine learning to perform dynamic analysis

Discussion 0
Questions 149

A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)

Options:

A.  

RADIUS communication must be permitted between the ISE server and the domain controller.

B.  

The ISE account must be a domain administrator in Active Directory to perform JOIN operations.

C.  

Active Directory only supports user authentication by using MSCHAPv2.

D.  

LDAP communication must be permitted between the ISE server and the domain controller.

E.  

Active Directory supports user and machine authentication by using MSCHAPv2.

Discussion 0
Questions 150

An engineer must implement a file transfer solution between a company's data center and branches. The company has numerous servers hosted in a hybrid cloud implementation. The file transfer protocol must support authentication, protect the data against unauthorized access, and ensure that users cannot list directories or remove files remotely. Which protocol must be used?

Options:

A.  

SCP

B.  

SSH

C.  

FTPS

D.  

SFTP

Discussion 0
Questions 151

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Options:

A.  

RSA SecureID

B.  

Internal Database

C.  

Active Directory

D.  

LDAP

Discussion 0
Questions 152

Which two kinds of attacks are prevented by multifactor authentication? (Choose two)

Options:

A.  

phishing

B.  

brute force

C.  

man-in-the-middle

D.  

DDOS

E.  

teardrop

Discussion 0
Questions 153

Which Cisco security solution protects remote users against phishing attacks when they are not connected to

the VPN?

Options:

A.  

Cisco Stealthwatch

B.  

Cisco Umbrella

C.  

Cisco Firepower

D.  

NGIPS

Discussion 0
Questions 154

An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites

but other sites are not accessible due to an error. Why is the error occurring?

Options:

A.  

Client computers do not have the Cisco Umbrella Root CA certificate installed.

B.  

IP-Layer Enforcement is not configured.

C.  

Client computers do not have an SSL certificate deployed from an internal CA server.

D.  

Intelligent proxy and SSL decryption is disabled in the policy

Discussion 0
Questions 155

Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated?

Options:

A.  

Cisco Tajos

B.  

Cisco Steaithwatch Cloud

C.  

Cisco Cloudlock

D.  

Cisco Umbrella Investigate

Discussion 0
Questions 156

Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco Secure Email Gateway. Which action will the system perform to disable any links in messages that match the filter?

Options:

A.  

FilterAction

B.  

ScreenAction

C.  

Quarantine

D.  

Defang

Discussion 0
Questions 157

Why is it important for the organization to have an endpoint patching strategy?

Options:

A.  

so the organization can identify endpoint vulnerabilities

B.  

so the internal PSIRT organization is aware of the latest bugs

C.  

so the network administrator is notified when an existing bug is encountered

D.  

so the latest security fixes are installed on the endpoints

Discussion 0
Questions 158

Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Options:

A.  

GET VPN

B.  

IPsec DVTI

C.  

DMVPN

D.  

FlexVPN

Discussion 0
Questions 159

Which two devices support WCCP for traffic redirection? (Choose two.)

Options:

A.  

Cisco Secure Web Appliance

B.  

Cisco IOS

C.  

proxy server

D.  

Cisco ASA

E.  

Cisco IPS

Discussion 0
Questions 160

What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?

Options:

A.  

The Umbrella Roaming client stops and tracks malicious activity on hosts, and AMP for Endpoints tracks only URL-based threats.

B.  

The Umbrella Roaming Client authenticates users and provides segmentation, and AMP for Endpoints allows only for VPN connectivity

C.  

AMP for Endpoints authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.

D.  

AMP for Endpoints stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.

Discussion 0
Questions 161

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

Options:

A.  

Cisco Cloudlock

B.  

Cisco Umbrella

C.  

Cisco AMP

D.  

Cisco App Dynamics

Discussion 0
Questions 162

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

Options:

A.  

Create an IP block list for the website from which the file was downloaded

B.  

Block the application that the file was using to open

C.  

Upload the hash for the file into the policy

D.  

Send the file to Cisco Threat Grid for dynamic analysis

Discussion 0
Questions 163

What is an advantage of the Cisco Umbrella roaming client?

Options:

A.  

the ability to see all traffic without requiring TLS decryption

B.  

visibility into IP-based threats by tunneling suspicious IP connections

C.  

the ability to dynamically categorize traffic to previously uncategorized sites

D.  

visibility into traffic that is destined to sites within the office environment

Discussion 0
Questions 164

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?

Options:

A.  

The administrator must upload the file instead of the hash for Cisco AMP to use.

B.  

The MD5 hash uploaded to the simple detection policy is in the incorrect format

C.  

The APK must be uploaded for the application that the detection is intended

D.  

Detections for MD5 signatures must be configured in the advanced custom detection policies

Discussion 0
Questions 165

Why is it important to have a patching strategy for endpoints?

Options:

A.  

to take advantage of new features released with patches

B.  

so that functionality is increased on a faster scale when it is used

C.  

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

D.  

so that patching strategies can assist with disabling nonsecure protocols in applications

Discussion 0
Questions 166

How does a cloud access security broker function?

Options:

A.  

It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution

B.  

lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution

C.  

It acts as a security information and event management solution and receives syslog from other cloud solutions.

D.  

It scans other cloud solutions being used within the network and identifies vulnerabilities

Discussion 0
Questions 167

Refer to the exhibit.

An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is

complaining that an IP address is not being obtained. Which command should be configured on the switch

interface in order to provide the user with network connectivity?

Options:

A.  

ip dhcp snooping verify mac-address

B.  

ip dhcp snooping limit 41

C.  

ip dhcp snooping vlan 41

D.  

ip dhcp snooping trust

Discussion 0
Questions 168

How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?

Options:

A.  

It deploys an AWS Lambda system

B.  

It automates resource resizing

C.  

It optimizes a flow path

D.  

It sets up a workload forensic score

Discussion 0
Questions 169

What is the intent of a basic SYN flood attack?

Options:

A.  

to solicit DNS responses

B.  

to exceed the threshold limit of the connection queue

C.  

to flush the register stack to re-initiate the buffers

D.  

to cause the buffer to overflow

Discussion 0
Questions 170

Which two cryptographic algorithms are used with IPsec? (Choose two)

Options:

A.  

AES-BAC

B.  

AES-ABC

C.  

HMAC-SHA1/SHA2

D.  

Triple AMC-CBC

E.  

AES-CBC

Discussion 0
Questions 171

Which risk is created when using an Internet browser to access cloud-based service?

Options:

A.  

misconfiguration of infrastructure, which allows unauthorized access

B.  

intermittent connection to the cloud connectors

C.  

vulnerabilities within protocol

D.  

insecure implementation of API

Discussion 0
Questions 172

Which Cisco AMP file disposition valid?

Options:

A.  

pristine

B.  

malware

C.  

dirty

D.  

non malicious

Discussion 0
Questions 173

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

Options:

A.  

biometric factor

B.  

time factor

C.  

confidentiality factor

D.  

knowledge factor

E.  

encryption factor

Discussion 0
Questions 174

Why would a user choose an on-premises ESA versus the CES solution?

Options:

A.  

Sensitive data must remain onsite.

B.  

Demand is unpredictable.

C.  

The server team wants to outsource this service.

D.  

ESA is deployed inline.

Discussion 0
Questions 175

What is a characteristic of traffic storm control behavior?

Options:

A.  

Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level withinthe interval.

B.  

Traffic storm control cannot determine if the packet is unicast or broadcast.

C.  

Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.

D.  

Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet isunicast or broadcast.

Discussion 0
Questions 176

Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)

Options:

A.  

The latest antivirus updates are applied before access is allowed.

B.  

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

C.  

Patch management remediation is performed.

D.  

A centralized management solution is deployed.

E.  

Endpoint supplicant configuration is deployed.

Discussion 0
Questions 177

A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?

Options:

A.  

Next-generation Intrusion Prevention System

B.  

Next-generation Firewall

C.  

Web Application Firewall

D.  

Intrusion Detection System

Discussion 0
Questions 178

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this

requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

Options:

A.  

Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud

B.  

Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud

C.  

Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud

D.  

Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud

Discussion 0
Questions 179

Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data

within a network perimeter?

Options:

A.  

cloud web services

B.  

network AMP

C.  

private cloud

D.  

public cloud

Discussion 0
Questions 180

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Options:

A.  

consumption

B.  

sharing

C.  

analysis

D.  

authoring

Discussion 0
Questions 181

Refer to the exhibit.

What will occur when this device tries to connect to the port?

Options:

A.  

802.1X will not work, but MAB will start and allow the device on the network.

B.  

802.1X will not work and the device will not be allowed network access

C.  

802 1X will work and the device will be allowed on the network

D.  

802 1X and MAB will both be used and ISE can use policy to determine the access level

Discussion 0
Questions 182

How does Cisco Umbrella protect clients when they operate outside of the corporate network?

Options:

A.  

by modifying the registry for DNS lookups

B.  

by using Active Directory group policies to enforce Cisco Umbrella DNS servers

C.  

by using the Cisco Umbrella roaming client

D.  

by forcing DNS queries to the corporate name servers

Discussion 0
Questions 183

What are two Trojan malware attacks? (Choose two)

Options:

A.  

Frontdoor

B.  

Rootkit

C.  

Smurf

D.  

Backdoor

E.  

Sync

Discussion 0
Questions 184

How many interfaces per bridge group does an ASA bridge group deployment support?

Options:

A.  

up to 2

B.  

up to 4

C.  

up to 8

D.  

up to 16

Discussion 0
Questions 185

Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?

Options:

A.  

inter-EPG isolation

B.  

inter-VLAN security

C.  

intra-EPG isolation

D.  

placement in separate EPGs

Discussion 0
Questions 186

A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?

Options:

A.  

Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy

B.  

Make the priority for the new policy 5 and the primary policy 1

C.  

Change the encryption to AES* to support all AES algorithms in the primary policy

D.  

Make the priority for the primary policy 10 and the new policy 1

Discussion 0
Questions 187

What is the benefit of integrating Cisco ISE with a MDM solution?

Options:

A.  

It provides compliance checks for access to the network

B.  

It provides the ability to update other applications on the mobile device

C.  

It provides the ability to add applications to the mobile device through Cisco ISE

D.  

It provides network device administration access

Discussion 0
Questions 188

Which attack is commonly associated with C and C++ programming languages?

Options:

A.  

cross-site scripting

B.  

water holing

C.  

DDoS

D.  

buffer overflow

Discussion 0
Questions 189

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

Options:

A.  

IP Blacklist Center

B.  

File Reputation Center

C.  

AMP Reputation Center

D.  

IP and Domain Reputation Center

Discussion 0
Questions 190

Refer to the exhibit,

which command results in these messages when attempting to troubleshoot an iPsec VPN connection?

Options:

A.  

debug crypto isakmp

B.  

debug crypto ipsec endpoint

C.  

debug crypto Ipsec

D.  

debug crypto isakmp connection

Discussion 0
Questions 191

An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?

Options:

A.  

Configure the *.com address in the block list.

B.  

Configure the *.domain.com address in the block list

C.  

Configure the *.domain.com address in the block list

D.  

Configure the domain.com address in the block list

Discussion 0
Questions 192

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from

Cisco and other vendors to share data and interoperate with each other?

Options:

A.  

Advanced Malware Protection

B.  

Platform Exchange Grid

C.  

Multifactor Platform Integration

D.  

Firepower Threat Defense

Discussion 0
Questions 193

Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is

authenticated?

Options:

A.  

Authorization

B.  

Accounting

C.  

Authentication

D.  

CoA

Discussion 0
Questions 194

When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the

command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?

Options:

A.  

The key server that is managing the keys for the connection will be at 1.2.3.4

B.  

The remote connection will only be allowed from 1.2.3.4

C.  

The address that will be used as the crypto validation authority

D.  

All IP addresses other than 1.2.3.4 will be allowed

Discussion 0
Questions 195

Which solution stops unauthorized access to the system if a user's password is compromised?

Options:

A.  

VPN

B.  

MFA

C.  

AMP

D.  

SSL

Discussion 0
Questions 196

An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?

Options:

A.  

MDA on the router

B.  

PBR on Cisco WSA

C.  

WCCP on switch

D.  

DNS resolution on Cisco WSA

Discussion 0
Questions 197

A security engineer must create a policy based on the reputation verdict of a file from a Cisco Secure Email Gateway. The file with an undetermined verdict must be dropped. Which action must the security engineer take to meet the requirement?

Options:

A.  

Configure threshold settings for files with no score to be allowed.

B.  

Set up a policy to automatically drop files with no reputation score.

C.  

Implement a policy to disable file analysis.

D.  

Create a policy to send a file to quarantine.

Discussion 0
Questions 198

Which two descriptions of AES encryption are true? (Choose two)

Options:

A.  

AES is less secure than 3DES.

B.  

AES is more secure than 3DES.

C.  

AES can use a 168-bit key for encryption.

D.  

AES can use a 256-bit key for encryption.

E.  

AES encrypts and decrypts a key three times in sequence.

Discussion 0
Questions 199

Which function is the primary function of Cisco AMP threat Grid?

Options:

A.  

automated email encryption

B.  

applying a real-time URI blacklist

C.  

automated malware analysis

D.  

monitoring network traffic

Discussion 0
Questions 200

Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?

Options:

A.  

filters

B.  

group key

C.  

company key

D.  

connector

Discussion 0
Questions 201

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

Options:

A.  

interpacket variation

B.  

software package variation

C.  

flow insight variation

D.  

process details variation

Discussion 0
Questions 202

Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?

Options:

A.  

single-sign on

B.  

RADIUS/LDAP authentication

C.  

Kerberos security solution

D.  

multifactor authentication

Discussion 0
Questions 203

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

Options:

A.  

NetFlow

B.  

desktop client

C.  

ASDM

D.  

API

Discussion 0
Questions 204

Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to

the network?

Options:

A.  

posture

B.  

profiler

C.  

Cisco TrustSec

D.  

Threat Centric NAC

Discussion 0
Questions 205

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Options:

A.  

put

B.  

options

C.  

get

D.  

push

E.  

connect

Discussion 0
Questions 206

Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?

Options:

A.  

Cisco Secure Network Analytics

B.  

Cisco Secure Cloud Analytics

C.  

Cisco Umbrella Investigate

D.  

Cisco pxGrid

Discussion 0
Questions 207

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Options:

A.  

multiple context mode

B.  

user deployment of Layer 3 networks

C.  

IPv6

D.  

clustering

Discussion 0
Questions 208

Drag and drop the threats from the left onto examples of that threat on the right

Options:

Discussion 0
Questions 209

Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?

Options:

A.  

hybrid cloud

B.  

private cloud

C.  

public cloud

D.  

community cloud

Discussion 0
Questions 210

A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?

Options:

A.  

file prevalence

B.  

file discovery

C.  

file conviction

D.  

file manager

Discussion 0
Questions 211

Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and all servers must communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication between DNS servers and the file server?

Options:

A.  

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports.

B.  

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, Gigabit Ethernet0/3 and GigabitEthernet0/4 as isolated ports C. Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port and GigabitEthernet0/3 and GrgabitEthernet0/4 as community ports

C.  

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as community port, and GigabitEthernet0/3 and GrgabitEthernet0/4 as isolated ports.

Discussion 0
Questions 212

An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?

Options:

A.  

Platform as a Service because the customer manages the operating system

B.  

Infrastructure as a Service because the customer manages the operating system

C.  

Platform as a Service because the service provider manages the operating system

D.  

Infrastructure as a Service because the service provider manages the operating system

Discussion 0
Questions 213

An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?

Options:

A.  

NAT exemption

B.  

encryption domain

C.  

routing table

D.  

group policy

Discussion 0
Questions 214

Which API is used for Content Security?

Options:

A.  

NX-OS API

B.  

IOS XR API

C.  

OpenVuln API

D.  

AsyncOS API

Discussion 0
Questions 215

Refer to the exhibit.

What is a result of the configuration?

Options:

A.  

Traffic from the DMZ network is redirected

B.  

Traffic from the inside network is redirected

C.  

All TCP traffic is redirected

D.  

Traffic from the inside and DMZ networks is redirected

Discussion 0
Questions 216

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

Options:

A.  

It can handle explicit HTTP requests.

B.  

It requires a PAC file for the client web browser.

C.  

It requires a proxy for the client web browser.

D.  

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.

E.  

Layer 4 switches can automatically redirect traffic destined to port 80.

Discussion 0
Questions 217

Which deployment model is the most secure when considering risks to cloud adoption?

Options:

A.  

Public Cloud

B.  

Hybrid Cloud

C.  

Community Cloud

D.  

Private Cloud

Discussion 0