my cards 7 Flashcards
my cards 7 (103 cards)
Refer to the exhibit. An administrator is configuring a VPN tunnel on a Cisco router. The information provided by the administrator of the remote end of the VPN tunnel was that IKEv1 is the tunnel protocol with a preshared key of C1$c0463835440!. The encryption for both phases is AES and the hash for both phases is SHA-256. The source subnet is 10.10.10.x/24 and the destination subnet is 10.10.20.x/24. The local device cannot establish a VPN tunnel and the debug message shown here is seen in the log file. What must be verified to correct the configuration?
ISAKMP: ipsec policy invlidated proposal ISAKMP: sa not acceptable QM rejected
A. Ensure that the IKE version is identical on both ends
B. Ensure that the ISAKMP policy configuration is identical on both ends
C. Ensure that the preshared key is identical on both ends
D. Ensure that the ACLs that define interesting traffic are symmetrical on both ends
B. Ensure that the ISAKMP policy configuration is identical on both ends
Which attack gives unauthorized access to files on the web server?
A. DHCP snooping
B. path traversal
C. broadcast storm
D. distributed DoS
B. path traversal
Which feature does the IaaS model provide?
A. software-defined network segmentation
B. granular control of data
C. automatic updates and patching of software
D. dedicated, restricted workstations
A. software-defined network segmentation
A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?
A. nextgeneration firewall
B. web application firewall
C. next generation intrusion prevention system
D. intrusion detection system
A. nextgeneration firewall
What is a benefit of using Cisco CWS compared to an on-premises Cisco Secure Web Appliance?
A. CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Secure Web Appliance does not.
B. Content scanning for SAAS cloud applications is available through CWS and not available through Secure Web Appliance.
C. CWS minimizes the load on the internal network and security infrastructure as compared to Secure Web Appliance.
D. URL categories are updated more frequently on CWS than they are on Secure Web Appliance.
A. CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Secure Web Appliance does not.
Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?
A. SSL inspection
B. security levels
C. stateless inspection
D. security zones
D. security zones
Which Cisco solution secures the cloud users, data and applications with the cloud-native CASB and cloud cybersecurity platform?
A. Cisco Appdynamics
B. Cisco Umbrella
C. Cisco CloudLock
D. Cisco Secure Network Analytics
C. Cisco CloudLock
What are the components of endpoint protection against social engineering attacks?
A. Cisco Secure Email Gateway
B. IPsec
C. firewall
D. IDS
A. Cisco Secure Email Gateway
Which feature is used to restrict communication between interfaces on a Cisco ASA?
A. VLAN subinterfaces
B. traffic zones
C. VxLAN interfaces
D. security levels
D. security levels
A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client’s local internet and send other internet-bound traffic over the VPN. Which feature must the administrator configure?
A. reverse route injection
B. dynamic access policies
C. local LAN access
D. dynamic split tunneling
D. dynamic split tunneling
Refer to the exhibit. Logins from internal users to a Cisco Adaptive Security Appliance firewall must be performed by using a TACACS server. The firewall is already configured. Which additional configuration must be performed to configure the TACACS+ server group with a key of Cisco4512!?
INTERFACE NAME EXERNAL, ANSWER IS
aaa-server SERVERGROUP (external) host 4.4.4.2
key Cisco 4512!
INTERFACE NAME EXERNAL, ANSWER IS
aaa-server SERVERGROUP (external) host 4.4.4.2
key Cisco 4512!
A network engineer must create a workflow to detect when a device joins a network and send the onboarding configuration to the device by using the Cisco DNA Center API. Which two method and endpoint pairs must be used to implement the workflow? (Choose two.)
A. POST /dna/intent/api/v1/onboarding/pnp-device/site- claim
B. POST /dna/intent/api/v1/onboarding/pnp-device/import
C. GET /dna/intent/api/v1/discovery/{discovery_id}/network-device
D. GET /dna/intent/api/v1/topology/site-topology
E. POST /dna/intent/api/v1/discovery
A. POST /dna/intent/api/v1/onboarding/pnp-device/site- claim
B. POST /dna/intent/api/v1/onboarding/pnp-device/import
Which IPsec mode must be used when encrypting data over a public network between two servers with RFC1918 IP addresses?
A. main mode
B. aggressive mode
C. transport mode
D. tunnel mode
D. tunnel mode
Which platform uses Cyber Threat Intelligence as its main source of information?
A. EPP
B. EDR
C. Cisco ASA
D. Cisco Secure Endpoint
D. Cisco Secure Endpoint
Refer to the exhibit. Which task is the Python script performing by using the Umbrella Enforcement API?
import requests from datetime import datetime import json custkey "daw79ad8v9a7" eventurl="https://s-platform.api.opendns.com/1.0/events" time = datetime.now().isoformat() domain= "maliciouswebsite.com" UrlPost eventurl+'?customerKey='+custkey data = { "alertTime": time + "Z", "deviceId": "flq802v6-1d92-1824-ba42-sf7sfk927c81", "deviceVersion": "13.7a", "dstDomain": domain, "dstUrl": "http://" + domain + "/", "eventTime": time + "Z", "protocolVersion": "1.0a", "providerName": "Security Platform" } req = requests.post (Url Post, data=json.dumps (data), headers = {'Content-type': 'application/json', 'Accept': 'application/json'}) if (req.status_code == 202): print("SUCCESS: domain ( (domain) s) was accepted, HTTP response: 202, timestamp: (time) s" % ('domain': domain, 'time': time)) else: print ("An error has occurred with the following code % (error)s, please consult the following link: https://enforcement-api.readme.io/" {'error': req.status_code})
A. importing malicious domains to Cisco Umbrella Enforcement for additional processing
B. importing malicious domains to Cisco Umbrella Enforcement for blocking
C. editing malicious domains in Cisco Umbrella Enforcement that have changed status
D. editing malicious domains in Cisco Umbrella Enforcement that have changed IP address
B. importing malicious domains to Cisco Umbrella Enforcement for blocking
Which security mechanism is designed to protect against “offline brute-force” attacks?
A. Token
B. MFA
C. Salt
D. CAPTCHA
C. Salt
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
A. reset
B. buffer
C. drop
D. pass
D. pass
Which method is used on a Cisco IOS router to redirect traffic to the Cisco Secure Web Appliance for URL inspection?
A. WCCP
B. route map
C. PAC file
D. WPAD
A. WCCP
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
A. service tcp-keepalives-in
B. no service password-recovery
C. no cdp run
D. no ip http server
E. ip ssh version 2
D. no ip http server
E. ip ssh version 2
Refer to the exhibit. An engineer created a policy named usera1 on a Cisco Secure Email Gateway to enable the antispam feature for an email address of usera1@cisco.com. Which configuration step must be performed next to apply the policy only to the usera1@cisco.com email address?
A. Specify the user in Mail Policies > Mail Policies Settings
B. Click the Policy Name usera1 Policy, and then click Add User.
C. Set the user in Mail Policies > Exception Table.
D. Click IronPort Anti-Spam, and then click Add User.
B. Click the Policy Name usera1 Policy, and then click Add User.
Which Cisco firewall solution supports configuration via Cisco Policy Language?
A. NGFW
B. CBAC
C. IPS
D. ZFW
D. ZFW
A network administrator has configured DHCP snooping on a Cisco switch to prevent unauthorized DHCP servers from assigning IP addresses. During configuration, a device with MAC address 04:66:96:79:0:AB received an IP address from an unauthorized DHCP server. Which configuration step must the network administrator take to accomplish the requirement?
A. Apply DHCP option 82 to identify the trusted DHCP server.
B. Configure each device on the network to use authorize DHCP server manually.
C. Configure an access control list to only allow DHCP traffic from trusted DHCP server.
D. Implement DHCP option 82 to relay DHCP requests to the trusted DHCP server.
D. Implement DHCP option 82 to relay DHCP requests to the trusted DHCP server.
What are two examples of code injection vulnerabilities? (Choose two.)
A. XML external entity injection
B. cross-site scripting
C. session hijacking
D. SQL injection
E. arbitrary command injection
B. cross-site scripting
D. SQL injection
What is the purpose of the certificate signing request when adding a new certificate for a server?
A. It provides the certificate client information so the server can authenticate against it when installing.
B. It provides the server information so a certificate can be created and signed.
C. It is the password for the certificate that is needed to install it with.
D. It is the certificate that will be loaded onto the server.
B. It provides the server information so a certificate can be created and signed.