Topic 1: Exam Pool A
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
A.
phishing
B.
brute force
C.
man-in-the-middle
D.
DDOS
E.
teardrop
brute force
man-in-the-middle
Drag and drop the steps from the left into the correct order on the right to enable
AppDynamics to monitor an EC2 instance in Amazon Web Services
Graphical user interface, text, application, email
Description automatically generated
Refer to the exhibit.
What will happen when this Python script is run?
A.
The compromised computers and malware trajectories will be received from Cisco AMP
B.
The list of computers and their current vulnerabilities will be received from Cisco AMP
C.
The compromised computers and what compromised them will be received from Cisco
AMP
D.
The list of computers, policies, and connector statuses will be received from Cisco AMP
The list of computers, policies, and connector statuses will be received from Cisco AMP
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?
A.
Port Bounce
B.
CoA Terminate
C.
CoA Reauth
D.
CoA Session Query
CoA Reauth
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?
A.
Cisco Umbrella
B.
Cisco Cloud Email Security
C.
Cisco NGFW
D.
Cisco Cloudlock
Cisco Cloudlock
Which two features of Cisco DNA Center are used in a Software Defined Network solution?
(Choose two)
A.
accounting
B.
assurance
C.
automation
D.
authentication
E.
encryption
assurance
automation
https://www.cisco.com/c/en/us/products/collateral/cloud-systemsmanagement/
dna-center/nb-06- cisco-dna-center-aag-cte-en.html
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
What does Cisco AMP for Endpoints use to help an organization detect different families of
malware?
A.
Ethos Engine to perform fuzzy fingerprinting
B.
Tetra Engine to detect malware when me endpoint is connected to the cloud
C.
Clam AV Engine to perform email scanning
D.
Spero Engine with machine learning to perform dynamic analysis
Ethos Engine to perform fuzzy fingerprinting
Which function is the primary function of Cisco AMP threat Grid?
A.
automated email encryption
B.
applying a real-time URI blacklist
C.
automated malware analysis
D.
monitoring network traffic
automated malware analysis
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
A.
To protect the endpoint against malicious file transfers
B.
To ensure that assets are secure from malicious links on and off the corporate network
C.
To establish secure VPN connectivity to the corporate network
D.
To enforce posture compliance and mandatory software
To ensure that assets are secure from malicious links on and off the corporate network
Umbrella Roaming is a cloud-delivered security service for
Cisco’s next-generation firewall. It protects your employees even when they are off the
VPN.
Page 10 out of 63 Pages |
Previous |