Which Cisco platform ensures that machines that connect to organizational networks have the recommended
antivirus definitions and patches to help prevent an organizational malware outbreak?
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging†category. Which reputation score should be selected to accomplish this goal?
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a
mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
Which solution is made from a collection of secure development practices and guidelines that
developers must follow to build secure applications?
A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which
vulnerability allows the attacker to see the passwords being transmitted in clear text?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Which risk is created when using an Internet browser to access cloud-based service?
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect
from phishing attacks? (Choose two.)
What is the term for the concept of limiting communication between applications or containers on the same node?
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly
identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
What is the recommendation in a zero-trust model before granting access to corporate applications and
resources?
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
What are two advantages of using Cisco Any connect over DMVPN? (Choose two)
Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized
solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over
to Cisco FTDs. Which solution meets the needs of the organization?
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
How does the Cisco WSA enforce bandwidth restrictions for web applications?
What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest
access, and the same guest portal is used as the BYOD portal?
What is the most common type of data exfiltration that organizations currently experience?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications
without needing to manage or maintain the underlying cloud infrastructure?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which algorithm provides encryption and authentication for data plane communication?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion
Prevention System?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to
the VPN?
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to
use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Which threat involves software being used to gain unauthorized access to a computer system?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
Which compliance status is shown when a configured posture policy requirement is not met?
When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN
configuration as opposed to DMVPN?
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?