Topic 1: Exam Pool A
What must be used to share data between multiple security products?
A.
Cisco Rapid Threat Containment
B.
Cisco Platform Exchange Grid
C.
Cisco Advanced Malware Protection
D.
Cisco Stealthwatch Cloud
Cisco Platform Exchange Grid
How does Cisco Stealthwatch Cloud provide security for cloud environments?
A.
It delivers visibility and threat detection.
B.
It prevents exfiltration of sensitive data.
C.
It assigns Internet-based DNS protection for clients and servers.
D.
It facilitates secure connectivity between public and private networks
It delivers visibility and threat detection.
Explanation Cisco Stealthwatch Cloud: Available as an SaaS product offer to
provide visibility and threat detection within public cloud infrastructures such as Amazon
Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
Which algorithm provides encryption and authentication for data plane communication?
A.
AES-GCM
B.
SHA-96
C.
AES-256
D.
SHA-384
AES-GCM
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/securitybook/security-overview.html
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
A.
It allows the endpoint to authenticate with 802.1x or MAB.
B.
It verifies that the endpoint has the latest Microsoft security patches installed.
C.
It adds endpoints to identity groups dynamically.
D.
It allows CoA to be applied if the endpoint status is compliant.
It allows the endpoint to authenticate with 802.1x or MAB.
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
A.
show authorization status
B.
show authen sess int gi0/1
C.
show connection status gi0/1
D.
show ver gi0/1
show authen sess int gi0/1
What is the function of Cisco Cloudlock for data security?
A.
data loss prevention
B.
controls malicious cloud apps
C.
detects anomalies
D.
user and entity behavior analytics
data loss prevention
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
A.
Common Security Exploits
B.
Common Vulnerabilities and Exposures
C.
Common Exploits and Vulnerabilities
D.
Common Vulnerabilities, Exploits and Threats
Common Vulnerabilities and Exposures
CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
A.
data exfiltration
B.
command and control communication
C.
intelligent proxy
D.
snort
E.
URL categorization
data exfiltration
command and control communication
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatanalytics/
at-aglance-c45-736555.pdf
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
A.
IP Blacklist Center
B.
File Reputation Center
C.
AMP Reputation Center
D.
IP and Domain Reputation Center
IP and Domain Reputation Center
Which form of attack is launched using botnets?
A.
EIDDOS
B.
virus
C.
DDOS
D.
TCP flood
DDOS
ExplanationA botnet is a collection of internet-connected devices infected by
malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet
attacks, which include malicious activities such as credentialsleaks, unauthorized access,
data theft and DDoS attacks.
Page 1 out of 63 Pages |