Exam A Flashcards
(104 cards)
An engineer wants to assign a printer to a different VLAN than it is statically configured on the switch port. Which CoA type should the engineer use?
A. CoA-Terminate
B. No-CoA
C. Port-Bounce
D. CoA-Reauth
Port-Bounce
An administrator needs to be able to have a router securely with a network management system. The connections must be authenticated but not encrypted. While meeting these requirements, which command will create a group that allows a user on the network management system access to the router?
A. snmp-server group v2c
B. snmp-server group v3 priv write
C. snmp-server group v3 auth
D. snmp-server group v2c write
snmp-server group v3 auth
What are two core components of a Cisco Umbrella solution? (Choose two)
A. Cloud container platform
B. DNS layer security
C. Cisco ISE
D. Transport Layer Security
E. Cloud access security broker
DNS layer security
Cloud access security broker
Which solution provides a comprehensive views of internet domains, IP address, and autonomous system to help pinpoint attackers and malicious infrastructures?
A. Cisco Advanced Malware Investigate
B. Cisco Umbrella Investigate
C. Cisco Tetration Cloud
D. Cisco Thread Indication Database
Cisco Umbrella Investigate
A network engineer has been tasked with configuring OSPF neighbor authentication on the WAN router for a branch office. The WAN router connects to the OSPF backbone area via an MPLS circuit that terminates on interface GigabitEthernet 0/0/0. The router id for this router is tied to the loopback0 interface. The password used for neighbor authentication should be encrypted when transmitted over the WAN. Which two IOS commands are required to enable OSPF neighbor authentication on this scenario? (Choose two)
A. ip ospf message-digest-key under the GigabitEthernet0/0/0 interface configuration
B. ip ospf authentication-key under Loopback0 interface configuration
C. service password-encryption under global configuration mode
D. area 0 authentication under the OSPF routing process configuration
E. area 0 authentication message-digest under the OSPF routing process configuration
ip ospf message-digest-key under the GigabitEthernet0/0/0 interface configuration
area 0 authentication message-digest under the OSPF routing process configuration
How can Cisco Tetration connect to something within customer/3rd party network if the customer/3rd party network doesn’t allow incoming connections?
A. Reverse tunnel
B. GRE tunnel
C. Source NAT
D. Destination NAT
Reverse tunnel
Which Cisco security platform is integrated into an organization’s cloud environment on AWS, google cloud, or AZUR to provide agentless visibility across the network by using advance machine learning and behavioral analytics?
A. Cisco ISE cloud
B. Cisco Stealthwatch cloud
C. Cisco ASAv
D. Cisco AMP cloud
Cisco Stealthwatch cloud
An engineer is configuring DHCP snooping on a cisco switch and wants to ensure that a DHCP packet will be dropped. Under which condition this will occur?
A. A packet from a DHCP server is received from inside the network or firewall
B. A packet is received on an untrusted interface and the source MAC Address and the DHCP client hardware address do not match
C. A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is 0.0.0.0
D. All packets are dropped until the administrator manually enters the approved servers into the DHCP snooping database
A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is 0.0.0.0
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. Application settings
B. Destination lists
C. Content categories
D. Security settings
Destination lists
While using Cisco Firepower’s Security Intelligence policies, which two criteria is blocking based upon? (Choose two)
A. IP addresses
B. URLs
C. port numbers
D. protocol IDs
E. MAC addresses
IP addresses
URLs
Which actions configure the IEEE 802.11x Flexible Authentication feature to support Layer 3 authentications mechanisms?
A. Modify the Dot1X configuration on the VPN server to send Layer 3 authentications to an external authentication database.
B. Add MAB into the switch to allow redirection to a Layer 3 device for authentication
C. Identify the devices using this feature and create a policy that allows them to pass Layer2 authentication
D. Configure WebAuth so the hosts are redirected to a web page for authentication
Configure WebAuth so the hosts are redirected to a web page for authentication
Which action adds IOCs to customize detections for a new attack?
A. Upload the IOCs into the installed Endpoint IOC feature within Cisco AMP For Endpoints.
B. Use the initiate Endpoint IOC scan feature to gather the IOC information and push it to the clients.
C. Modify the base policy within Cisco AMP for Endpoints to include simple custom detections.
D. Add a custom Advanced detection to include the IOCs needed within Cisco For endpoints.
Upload the IOCs into the installed Endpoint IOC feature within Cisco AMP For Endpoints.
Which platform besides the Cisco ASA should be deployed to provide content redirection using Direct-To-Tower methods without the need for the customer to send traffic using PAC files or third-party proxies?
A. Cisco ASR
B. Cisco ISR
C. Cisco WSA
D. Cisco CWS
Cisco CWS
An organization is using CSR1000v routers in their private cloud infrastructure. They must upgrade their code to address vulnerabilities within their running code version. Who is responsible for these upgrades?
A. The cloud vendor is responsible for updating all code hosted in the cloud
B. The cloud service provider must be asked perform the upgrade
C. The organization must upgrade the code for the devices they manage
D. The CSR1000v is upgraded automatically as new code becomes available
The organization must upgrade the code for the devices they manage
Which action blocks specific IP address whenever a computer with Cisco AMP for Endpoints installed connects to the network?
A. Create a simple custom detection policy and add the IP address
B. Create an application block list and add the IP address
C. Create an advanced custom detection policy and add the IP address
D. Create an IP Block & Allow list and add the IP address
Create an IP Block & Allow list and add the IP address
A company has an infrastructure ACI policy on its perimeter router that denies RFC1918 address, unused address ranges, any packets that use the IP address range that is assigned to the internal IP infrastructure, and 127.0.0.1. All these rules apply to incoming traffic from the internet. Which two attacks are prevented by using this method? (Choose two)
A. Losing the line protocol keep-alives and routing protocol update
B. Spoofing the IP address of another customer to steal service
C. DoS attack that cause high CPU utilization
D. Gaining of access to network devices using a spoofed address
E. Routing processor resource exhaustion
Spoofing the IP address of another customer to steal service
Gaining of access to network devices using a spoofed address
Which two tasks are required when a decryption policy is implemented on a Cisco WSA? (Choose two)
A. Upload a root certificate and private key
B. Enable HTTPS attack protection
C. Enable real-time revocation status checking
D. Configure invalid certificate handing
E. Enable the HTTPS proxy
Upload a root certificate and private key
Enable the HTTPS proxy
What is a difference between GRE over IPsec and IPsec with crypto map?
A. GRE over IPsec supports non-IP protocols
B. Multicast traffic is supported by IPsec with crypto map
C. GRE provides its own encryption mechanism
D. IPsec with crypto map offers better scalability
GRE over IPsec supports non-IP protocols
Which attack gives unauthorized access to files on the web server?
A. Broadcast storm
B. DHCP snooping
C. Distributed DoS
D. Path transversal
Path transversal
Which VPN provides scalability for organizations with many remote sites?
A. SSL VPN
B. Site-to-site IPsec
C. DMVPN
D. GRE over IPsec
DMVPN
When an assessment of cloud services and applications is conducted, which tool is used to show user activity and data usage across the applications?
A. Cisco ISE
B. Cisco ASA
C. Cisco AMP Private Cloud
D. Cisco Cloudlock
Cisco Cloudlock
What are two examples of code injection vulnerabilities? (Choose two)
A. Session hijacking
B. Cross-site-scripting
C. XML external entity injection
D. Arbitrary command injection
E. SQL injection
Cross-site-scripting
SQL injection
A network engineer must secure a Cisco switch from a MAC address flooding attack by allowing only the MAC address of currently connected PC on port Gi1/0/28. Which Cisco IOS command must be run to check if that MAC address is currently known and is the only MAC address allowed on that port?
A. show port-security
B. show port-security interface GigabitEthernet 1/0/28
C. show port-security address
show port-security interface GigabitEthernet 1/0/28
Which problem is solved by deploying a multicontext firewall?
A. Overlapping IP addressing plan
B. Faster inspection
C. More secure policy
D. Resilient high availability design
Overlapping IP addressing plan