What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine
certificates. Which configuration item must be modified to allow this?
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two)
Which action configures the IEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms?
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Refer to the exhibit.
What is the result of this Python script of the Cisco DNA Center API?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Which Cisco ISE feature helps to detect missing patches and helps with remediation?
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
What is the term for the concept of limiting communication between applications or containers on the same node?
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is
deleted from an identity group?
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
Which baseline form of telemetry is recommended for network infrastructure devices?
Which two components do southbound APIs use to communicate with downstream devices? (Choose two.)
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is
authenticated?
Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?
What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?
Refer to the exhibit,
which command results in these messages when attempting to troubleshoot an iPsec VPN connection?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
Which solution stops unauthorized access to the system if a user's password is compromised?
Which two behavioral patterns characterize a ping of death attack? (Choose two)
Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
Why should organizations migrate to a multifactor authentication strategy?
Which algorithm provides encryption and authentication for data plane communication?
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Refer to the exhibit.
An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the
ASA be added on the Cisco UC Manager platform?
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management
port conflicts with other communications on the network and must be changed. What must be done to ensure
that all devices can communicate together?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites
but other sites are not accessible due to an error. Why is the error occurring?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so. Which command is required to enable the client to accept the server’s authentication key?
An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
Refer to the exhibit.
A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?
Which benefit does endpoint security provide the overall security posture of an organization?
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a
connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?
Which posture assessment requirement provides options to the client for remediation and requires the
remediation within a certain timeframe?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key
establishment?
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to
use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
Which method must be used to connect Cisco Secure Workload to external orchestrators at a client site when the client does not allow incoming connections?
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)
Which information is required when adding a device to Firepower Management Center?
How does Cisco Stealthwatch Cloud provide security for cloud environments?
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Refer to the exhibit.
What does the number 15 represent in this configuration?
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity
platform. What should be used to meet these requirements?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
For a given policy in Cisco Umbrella, how should a customer block websites based on a custom list?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
Which functions of an SDN architecture require southbound APIs to enable communication?
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch
was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate
the risk of this ransom ware infection? (Choose two)
Which Cisco security solution secures public, private, hybrid, and community clouds?
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)
A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)
An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?
What is the most common type of data exfiltration that organizations currently experience?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
Refer to the exhibit.
What will occur when this device tries to connect to the port?
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which technology is used to improve web traffic performance by proxy caching?
How does the Cisco WSA enforce bandwidth restrictions for web applications?
An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)
Which type of protection encrypts RSA keys when they are exported and imported?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
In an IaaS cloud services model, which security function is the provider responsible for managing?
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Refer to the exhibit.
An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process
activity on an endpoint?
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
Refer to the exhibit. What function does the API key perform while working with https://api.amp.cisco.com/v1/computers?
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
Refer to the exhibit.
Consider that any feature of DNS requests, such as the length off the domain name
and the number of subdomains, can be used to construct models of expected behavior to which
observed values can be compared. Which type of malicious attack are these values associated with?
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
An organization wants to secure data in a cloud environment. Its security model requires that all users be
authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
What is the role of an endpoint in protecting a user from a phishing attack?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and
infrastructure automation?
An engineer is configuring device-hardening on a router in order to prevent credentials from being seen
if the router configuration was compromised. Which command should be used?
What is a difference between a zone-based firewall and a Cisco Adaptive Security Appliance firewall?
With which components does a southbound API within a software-defined network architecture communicate?
What is the recommendation in a zero-trust model before granting access to corporate applications and resources?
Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?
Refer to the exhibit. A network engineer must configure a Cisco router to send traps using SNMPv3. The engineer configures a remote user to receive traps and sets the security level to use authentication without privacy. Which command completes the configuration?
A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?