my cards 5 Flashcards
my cards 5 (100 cards)
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
A. by forcing DNS queries to the corporate name servers
B. by modifying the registry for DNS lookups
C. by using the Cisco Umbrella roaming client
D. by using Active Directory group policies to enforce Cisco Umbrella DNS servers
C. by using the Cisco Umbrella roaming client
DRAG DROP -
Drag and drop the deployment models from the left onto the corresponding explanations on the right.
Select and Place:
routed
passive
passive with ERSPAN
transparent
A GRE tunnel is utilized in this solutionn
This solution allows inspection between hots on the same subnet
attacks are not prevented by this solution
this solution does not provide filtering between hots on the same subnet
passive with ERSPAN - A GRE tunnel is utilized in this solution
transparent - This solution allows inspection between hots on the same subnet
passive - attacks are not prevented by this solution
routed - this solution does not provide filtering between hots on the same subnet
An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source. Which two steps must be taken to accomplish this task? (Choose two.)
A. Choose the interface for syncing to the NTP server.
B. Specify the NTP version
C. Set the NTP DNS hostname
D. Set the authentication key.
E. Configure the NTP stratum
A. Choose the interface for syncing to the NTP server
D. Set the authentication key.
Which two capabilities of Integration APIs are utilized with Cisco DNA Center? (Choose two.)
A. Upgrade software on switches and routers
B. Third party reporting
C. Connect to ITSM platforms
D. Create new SSIDs on a wireless LAN controller
E. Automatically deploy new virtual routers
B. Third party reporting
C. Connect to ITSM platforms
3 x subheadings:
1) IT Service Management (ITSM) Integration
2) IP Address Management (IPAM) Integration
3) Third party Reporting Integration
What is the most common type of data exfiltration that organizations currently experience?
A. encrypted SMTP
B. SQL database injections
C. HTTPS file upload site
D. Microsoft Windows network shares
D. Microsoft Windows network shares
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
A. teardrop
B. smurf
C. LAND
D. SYN flood
A. teardrop
DRAG DROP -
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
Select and Place:
esp-3des
esp-aes-256
esp-md5-hmac
esp-sha-hmac
authenticatoin
encryption
HMAC -> AUTHENTICATION
authentication:
esp-md5-hmac
esp-sha-hmac
encryption:
esp-3des
esp-aes-256
An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
A. Configure Dynamic ARP inspection and add entries in the DHCP snooping database.
B. Configure DHCP snooping and set trusted interfaces for all client connections.
C. Configure Dynamic ARP inspection and antispoofing ACLs in the DHCP snooping database.
D. Configure DHCP snooping and set a trusted interface for the DHCP server.
D. Configure DHCP snooping and set a trusted interface for the DHCP server.
DoS attacks are categorized as what?
A. flood attacks
B. virus attacks
C. trojan attacks
D. phishing attacks
A. flood attacks
What is the process of performing automated static and dynamic analysis of files in an isolated environment against preloaded behavioral indicators for threat analysis?
A. advanced sandboxing
B. adaptive scanning
C. deep visibility scan
D. point-in-time checks
A. advanced sandboxing
What are two benefits of Flexible NetFlow records? (Choose two.)
A. They provide accounting and billing enhancements.
B. They allow the user to configure flow information to perform customized traffic identification.
C. They provide monitoring of a wider range of IP packet information from Layer2 to 4.
D. They provide attack prevention by dropping the traffic.
E. They converge multiple accounting technologies into one accounting mechanism.
B. They allow the user to configure flow information to perform customized traffic identification.
E. They converge multiple accounting technologies into one accounting mechanism.
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG.
The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
A. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI.
B. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI.
C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI
D. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI.
C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
A. requires an additional license
B. performs transparent redirection
C. supports SSL decryption
D. supports VMware vMotion on VMware ESXi
A. requires an additional license
What are two workload security models? (Choose two.)
A. SaaS
B. PaaS
C. off-premises
D. on-premises
E. IaaS
C. off-premises
D. on-premises
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
A. Add Dropbox to the Cloudlock Authentication and API section in the Cloudlock portal.
B. Add Cloudlock to the Dropbox admin portal.
C. Send an API request to Cloudlock from Dropbox admin portal.
D. Authorize Dropbox within the Platform settings in the Cloudlock portal.
D. Authorize Dropbox within the Platform settings in the Cloudlock portal.
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
A. CoA-NAK
B. CoA-NCL
C. CoA-MAB
D. CoA-ACK
D. CoA-ACK
DRAG DROP -
Drag and drop the security solutions from the left onto the benefits they provide on the right.
Select and Place:
Full contextual awareness
NGIPS
Cisco AMP for Endpoints
Collective Security Intelligence
detection, blocking, tracking, analysis, and remediation to protect the enterprise against targeted and persistent malware attacks
policy enforcement based on complete visibility of users, mobile devices, client-side applications, communication between virtual machines, vulnerabilities, threats, and URLs
unmatched security and web reputation intelligence provides real-time threat intelligence and security protection
superior threat prevention and mitigation for known and unknown threats
Cisco AMP for Endpoints - detection, blocking, tracking, analysis, and remediation to protect the enterprise against targeted and persistent malware attacks
Full contextual awareness - policy enforcement based on complete visibility of users, mobile devices, client-side applications, communication between virtual machines, vulnerabilities, threats, and URLs
Collective Security Intelligence - unmatched security and web reputation intelligence provides real-time threat intelligence and security protection
NGIPS - superior threat prevention and mitigation for known and unknown threats
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
A. GET VPN supports Remote Access VPNs
B. GET VPN uses multiple security associations for connections
C. GET VPN natively supports MPLS and private IP networks.
D. GET VPN interoperates with non-Cisco devices.
C. GET VPN natively supports MPLS and private IP networks.
Email security has become a high-priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (10.00 to 6.00) on the Cisco ESA. Which action will the system perform to desirable any links in messages that match the filter?
A. Defang
B. FilterAction
C. Quarantine
D. ScreenAction
A. Defang
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
A. IaC
B. IaaS
C. PaaS
D. SaaS
D. SaaS
What is a characteristic of an EDR solution and not of an EPP solution?
A. performs signature-based detection
B. decrypts SSL traffic for better visibility
C. stops all ransomware attacks
D. retrospective analysis
D. retrospective analysis
What is a benefit of using Cisco Umbrella?
A. Files are scanned for viruses before they are allowed to run.
B. All Internet traffic is encrypted.
C. It prevents malicious inbound traffic.
D. Attacks can be mitigated before the application connection occurs.
D. Attacks can be mitigated before the application connection occurs.
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella?
A. DNS hijacking
B. cache poisoning
C. DNS tunneling
D. DNS flood attack
C. DNS tunneling
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
A. Link Aggregation
B. Reverse ARP
C. private VLANs
D. Dynamic ARP Inspection
D. Dynamic ARP Inspection