An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
What is the purpose of the Cisco Endpoint IoC feature?
Which MDM configuration provides scalability?
Refer to the exhibit. The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
Which Cisco security solution stops exfiltration using HTTPS?
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites
but other sites are not accessible due to an error. Why is the error occurring?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which category includes DoS Attacks?
What is a function of 3DES in reference to cryptography?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
What is the difference between EPP and EDR?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which deployment model is the most secure when considering risks to cloud adoption?
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to
use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
What is the purpose of a NetFlow version 9 template record?
A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)
Which algorithm is an NGE hash function?
Refer to the exhibit.
What will happen when this Python script is run?
Which two products are used to forecast capacity needs accurately in real time? (Choose two.)
Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?
A network engineer is configuring a Cisco Catalyst switch. The network engineer must prevent traffic on the network from being interrupted by broadcast packets flooding the network using a predefined threshold. What must be configured on the switch?
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?
Why should organizations migrate to an MFA strategy for authentication?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the
ASA be added on the Cisco UC Manager platform?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
Which type of attack is MFA an effective deterrent for?
When Cisco and other industry organizations publish and inform users of known security findings and
vulnerabilities, which name is used?
What is the purpose of joining Cisco WSAs to an appliance group?
Refer to the exhibit.
A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?
A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?
Refer to the exhibit.
What is the function of the Python script code snippet for the Cisco ASA REST API?
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?
While using Cisco Secure Firewall's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)
Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection,
enabling the platform to identify and output various applications within the network traffic flows?
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
How does Cisco Secure Endpoint provide next-generation protection?
Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?
Which baseline form of telemetry is recommended for network infrastructure devices?
Which two fields are defined in the NetFlow flow? (Choose two)
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and
infrastructure automation?
What is the target in a phishing attack?
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Which two behavioral patterns characterize a ping of death attack? (Choose two)
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
Which function is the primary function of Cisco AMP threat Grid?
What is a benefit of using Cisco Umbrella?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.
Which type of encryption uses a public key and private key?
What is a commonality between DMVPN and FlexVPN technologies?
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
What is a benefit of performing device compliance?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?
A mall provides security services to customers with a shared appliance. The mall wants separation of
management on the shared appliance. Which ASA deployment mode meets these needs?
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?
Which system performs compliance checks and remote wiping?
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?
When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN
configuration as opposed to DMVPN?
Which command enables 802.1X globally on a Cisco switch?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
What is a characteristic of traffic storm control behavior?
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
Which VPN technology supports a multivendor environment and secure traffic between sites?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Which type of algorithm provides the highest level of protection against brute-force attacks?
A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA
command must be used?
Drag and drop the posture assessment flow actions from the left into a sequence on the right.
Which statement describes a serverless application?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process
activity on an endpoint?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Which Cisco WSA feature supports access control using URL categories?
What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
What are two functions of IKEv1 but not IKEv2? (Choose two)
A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?
Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?
Which type of attack is social engineering?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
Which IETF attribute is supported for the RADIUS CoA feature?
Which component of Cisco umbrella architecture increases reliability of the service?
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?
What is a difference between GRE over IPsec and IPsec with crypto map?
Which option is the main function of Cisco Firepower impact flags?
What is the purpose of the My Devices Portal in a Cisco ISE environment?
Which two risks is a company vulnerable to if it does not have a well-established patching solution for
endpoints? (Choose two)
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)
Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
Which two methods are available in Cisco Secure Web Appliance to process client requests when configured in Transparent mode? (Choose two.)
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to
the VPN?
What is a description of microsegmentation?
What is a benefit of using a multifactor authentication strategy?
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Refer to the exhibit.
Which type of authentication is in use?
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
An engineer is configuring device-hardening on a router in order to prevent credentials from being seen
if the router configuration was compromised. Which command should be used?
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which statement about IOS zone-based firewalls is true?
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to
the network?
With which components does a southbound API within a software-defined network architecture communicate?
What limits communication between applications or containers on the same node?
What is the function of SDN southbound API protocols?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
Which feature is used to restrict communication between interfaces on a Cisco ASA?
What is the benefit of integrating Cisco ISE with a MDM solution?
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.
Refer to the exhibit.
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access.
Most PCs and IP phones can connect and authenticate using their machine certificate credentials. However printer and video cameras cannot base d on the interface configuration provided, what must be to get these devices on to the network using Cisco ISE for authentication and authorization while maintaining security controls?
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
Which threat intelligence standard contains malware hashes?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
How does Cisco Workload Optimization Manager help mitigate application performance issues?
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?
An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?
What is the most common type of data exfiltration that organizations currently experience?
What is the function of the crypto is a kmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
What is a difference between GETVPN and IPsec?
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?
For a given policy in Cisco Umbrella, how should a customer block websites based on a custom list?
Which algorithm provides encryption and authentication for data plane communication?
Refer to the exhibit.
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your
environment?
How is data sent out to the attacker during a DNS tunneling attack?
Under which two circumstances is a CoA issued? (Choose two)
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
Why should organizations migrate to a multifactor authentication strategy?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
Which threat involves software being used to gain unauthorized access to a computer system?
What are two features of NetFlow flow monitoring? (Choose two)
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a
connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
Refer to the exhibit. A network engineer must configure a Cisco router to send traps using SNMPv3. The engineer configures a remote user to receive traps and sets the security level to use authentication without privacy. Which command completes the configuration?
What are two benefits of Flexible NetFlow records? (Choose two)
Which VPN provides scalability for organizations with many remote sites?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from
Cisco and other vendors to share data and interoperate with each other?
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Drag and drop the concepts from the left onto the correct descriptions on the right
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file What type of Outbreak Control list must the SHA.-256 hash value for the file be added to in order to accomplish this?
How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?
Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?
What is the purpose of a denial-of-service attack?
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
What is the difference between deceptive phishing and spear phishing?
What are two workloaded security models? (Choose two)
An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Which feature is configured for managed devices in the device platform settings of the Firepower Management
Center?
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
Which Cisco Firewall solution requires zone definition?
An engineer is configuring guest WLAN access using Cisco ISE and the Cisco WLC. Which action temporarily gives guest endpoints access dynamically while maintaining visibility into who or what is connecting?
Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two)
What are two DDoS attack categories? (Choose two)