Share your SCOR Experience
February 23rd, 2020
Go to comments
Please share with us your experience to prepare for the new SCOR 350-701 exam, your materials, the way you learned, your recommendations… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…
Your posts are warmly welcome! Hope you will find useful information here!
Note: Currently there are no lab sims for this exam, only multiple choice and drag drop questions.
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower.What must be configured to accomplish this?
a Network Discovery policy to receive data from the host
a Threat: Intelligence policy to download the data from the host
a File Analysis policy to send file data into Cisco Firepower
a Network Analysis policy to receive NetFlow data from the host
With which components does a southbound API within a software-defined network architecture communicate?
controllers within the network
applications
appliances
devices such as routers and switches
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Set content settings to High
Configure the intelligent proxy.
Use destination block lists.
Configure application block lists.
What is the role of an endpoint in protecting a user from a phishing attack?
Use Cisco Stealthwatch and Cisco ISE Integration.
Utilize 802.1X network security to ensure unauthorized access to resources.
Use machine learning models to help identify anomalies and determine expected sending behavior.
Ensure that antivirus and anti malware software is up to date.
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1md5 Clsc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however is unable to do so.Which command is required to enable the client to accept the server’s authentication key?
ntp peer 1.1.1.1 key 1
ntp server 1.1.1.1 key1
ntp server 1.1.1.2 key 1
ntp peer 1.1.1.2 key 1
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
a. The key server that is managing the keys for the connection will be at 1.2.3.4.
b. The remote connection will only be allowed from 1 2.3.4
c. The address that will be used as the crypto validation authority.
d. All IP addresses other than 1.2.3.4 will be allowed
QUESTION 14
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
a. file access from a different user
b. interesting file access
c. user login suspicious behavior
d. privilege escalation
—
QUESTION 15
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service? (Choose two.)
a. Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the pre configured interval.
b.Use EEM to have the ports return to service automatically in less than 300 seconds.
c. Enter the shutdown and no shutdown commands on the interfaces.
d. Enable the snmp-server enable traps command and wait 300 seconds
e. Ensure that interfaces are configured with the error-disable detection and recovery feature
—
QUESTION 16
What is the difference between Cross-site Scripting and SQL Injection , attacks?
a. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.
b. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.
c. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.
d. Cross-site Scripting is an attack where code is executed from the server side,whereas SQL Injection is an attack where code is executed from the client side.
—
QUESTION 17
A network administrator is configuring a switch to use Cisco ISE for 802.1X.An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
a. Adaptive Network Control Policy List
b. Context Visibility
c. Accounting Reports
d. RADIUS Live Logs
—
QUESTION 18
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
a. Place the Cisco ISE server and the AD server in the same subnet.
b. Configure a common administrator account.
c. Configure a common DNS server.
d. Synchronize the clocks of the Cisco ISE server and the AD server.
—
QUESTION 19
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling She AVC engine, what must be done to implement this?
a. Use security services to configure the traffic monitor, .
b. Use URL categorization to prevent the application traffic.
c. Use an access policy group to configure application control settings.
d. Use web security reporting to validate engine functionality
—
QUESTION 20
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
a. BYOD on boarding
b. Simple Certificate Enrollment Protocol
c. client provisioning
d. MAC authentication bypass
—
QUESTION 21
Import requests
url — https: // api.amp.cisco. com/v1/computers
headers = {
accept : application/json
content-type : application/json
authorization : Basic API Credentials
cache-control : no cache
}
response = requests.request (GET , url , headers = headers)
print response.txt
Refer to the exhibit. What will happen when this Python script is run?
a. The compromised computers and malware trajectories will be received from Cisco AMP
b. The list of computers and their current vulnerabilities will be received from Cisco AMP ,
c. The compromised computers and what compromised them will be received from Cisco AMP.
d. The list of computers, policies, and connector statuses will be received from Cisco AMP.
@123, there maybe a limit. Try 10 question each post
QUESTION 22
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network.The solution must be able to maintain and force compliance. Which product should be used tomeet these requirements?
a. Cisco Umbrella
b. Cisco AMP
c. Cisco Steal!hwatch
d. Cisco Tetcation
—
QUESTION 23
Which factor must be considered whenchoosing the on-premise solutionover thecloud-basedone?
a. With an on-premise solution, the provider is responsible for theinstallation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
b. With a cloud’based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
c. With an on-premise solution,ihe provider is responsible for theinstallation, but the customer is responsible for the maintenance of the product.
d. Withan on-premise solution, the customer is responsible for thei nstallation and maintenance of the product, whereas with a cloud-based solution,the provider is responsible for it.
—
QUESTION 24
Which term describes when the Cisco Firepower downloads threatintelligence updates fromCisco Talos?
a. consumption
b. sharing
c.analysis
d. authoring
—
QUESTION 25
Ans organizationhas a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but togs arenot being received from the on-premise network, What action will resolve this issue?
a. Configure security appliances to send syslogs to CiscoStealthwatch Cloud.
b. Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud.
c. Deploy a Cisco FTD sensor to sendevents to Cisco Stealthwatch Cloud.
d. Deploy a Cisco StealthwatchCloud sensor on the network to send data toCisco Stealthwatch Cloud
—
QUESTION 26
What does Cisco AMP for Endpointsuse to help an organization delect different families of malware?
a. Ethos Engine to perform fuzzy fingerprinting
b. Tetra Engine to detect malware whenme endpoint is connected to the cloud
c. ClamAV Engine to perform email scanning
d. Spero Engine with machine learning to perform dynamic analysis
—
QUESTION 27
What are two characteristics of Cisco DNA Center APIs? {Choose two.)
a. Postman is required to utilize Cisco DNA Center API calls.
b. They do not support Python scripts.
c. They are Cisco proprietary.
d. They quicklyprovision new devices.
e. They view the overall health of the network,
—
QUESTION 28
What is a benefit of conducting device compliance checks?
a. It indicates whettype of operating system is connecting to the network.
b. It validates if anti-virus software is installed.
c. It scans endpoints to determine if malicious activity is taking place.
d. It detects email phishing attacks.
—
QUESTION 29
In which two ways does Easy Connect he]p control network access when used with Cisco TrustSec? (Choose two.)
a. It allows multiple security products to share information and work together to enhance security posturein the network.
b. It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
c. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
d. It integrates with third-party products to provide better visibility throughout thenetwork,
e. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID).
—
QUESTION 30
What is the benefit of installing Cisco AMP for Endpoints on a network?
a. It provides operating system patches on the endpoints for security.
b. It provides flow-based visibility for the endpoints network connections.
c. It enables behavioral analysis to be used for the endpoints.
d. It protects endpoint systems through application control andreal-time scanning
—
QUESTION 31
Art administrator is configuring a DHCP server tobetter secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
a. Set a trusted interface forthe DHCP server
b. Set the DHCP snooping bit to 1.
c. Add entries inthe DHCP snooping database.
d. Enable ARP inspection for the required VLAN.
QUESTION 32
import requests
client_id = client id
api_key = api key
url = https api amp cisco com /v1/computers
response = requests.get (url, auth(client_id, api_key))
response_json = response.json()
for computer in response_json [‘data’]
hostname = computer [‘hostname’]
print (hostname)
Refer to the exhibit What will happen when the Python script is executed?
a. The hostname will be translated to an fP address and printed.
b. The hostname will be printed for the client in the client ID field.
c. The script will pull allcomputer hostnames and print them.
d. The script will translate the IP address to FODN and print it
—
QUESTION 33
Exhibit about ASA ASDM Anyconnect Connection Profile: DefaultRAGroup
Refer to the exhibit. When configuring a remote access VPN solution terminating on the Cisco ASA. an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?
a. Group Policy
b. Method
c. SAML Server
—
QUESTION 34
Anengineer has been tasked with implementing a solution that can be leveraged for securing the doud users, data, and applications.There is a requirement touse theCisco cloud-native CA3B and cloud cybersecurity platform. What should be used to meet these requirements?
a. Cisco Umbrella
b.Cisco Cloud Email Security
c. Cisco NGFW
d. Cisco Cloudlock
—
QUESTION 35
Which feature requires a network discovery policy on theCisco Firepower NGIPS?
a. security intelligence
b. URL filtering
c. impact flags
d. health monitoring
—
QUESTION 36
An engineer needs a cloud solution that wilt monitor traffic, create incidents based cn events, and integrate with other cloud solutions via an API. Which solution should be used to accomplish this goal?
a. SIEM
b. CASB
c. AdaptiveMFA
d. Cisco Cloudlock
—
QUESTION 37
WhichCisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
a. Cisco Talos
b. Cisco Dynamrc DNS
c. Cisco AMP
d. Cisco AnyConnect
—
QUESTION 38
Why is it important to implement MFA inside of an organization?
a. To prevent man-the-middle attacks from being successful.
b. To prevent DoS attacks from being successful.
c. To prevent brute force attacks from being successful.
d. To prevent phishing attacks from being successful.
—
QUESTION 39
A network administrator is configuring SNMPv3 on a new router.The users have already been created,however an additional configuration isneeded to facilitate access to the SNMP views. What must the administrator do to accomplish this?
a. map SNMPv3users to SNMP views
b. set the password to be used for SNMPv3 authentication
c. define the encryption algorithm to be used by SNMPv3
d. specify the UDP port used by SNMP
—
QUESTION 40
An organization is using Cisco Firepower and Cisco Merafci MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?
a. Cisco Defense Orchestrator
b. Cisco Secureworks
c. Cisco DNA Center
d. Cisco Configuration Professional
NEW DRAG AND DROP
QUESTION 41
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Version 1 appropriate only for legacy systems
Version 5 appropriate only for the main cache
Version 8 introduced extensibility
Version 9 introduced support for aggregation caches
—
QUESTION 42
Drag and drop the solutions from the left onto the solution’s benefits on the right.
CISCO Stealthwatch obtains contextual identity and profiles for all the users and devices connected on a network
CISCO ISE software defined segmentation that uses SGTs and allows administrators to quickly scale and enforce policies-across the network
CISCO TrustSec rapidly collects and analyzes Netflow telemetry data to deliver in-depth visibility and understanding of network traffic
Cisco Umbrella secure Internet gateway In the cloud that provides a security solution that protects endpoints on and off the network against threats on the Internet
—
DU30 for PRESIDENT!!!
QUESTION 41
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Version 1 appropriate only for legacy systems
Version 5 appropriate only for the main cache
Version 8 introduced extensibility
Version 9 introduced support for aggregation caches
QUESTION 42
Drag and drop the solutions from the left onto the solution’s benefits on the right.
CISCO Stealthwatch obtains contextual identity andprofiles for all the users and devices connected ona network
CISCO ISE software defined segmentation that uses SGTs and allows administrators toquickly scale and enforce policies-across the network
CISCO TrustSec rapidly collects and analyzes Netflow telemetry data to deliver in-depth visibility and understanding of network traffic
Cisco Umbrella secure Internet gateway In the cloud that provides a security solution that protects endpoints on and off the network against threats on the Internet
—
DONE posted all 42q out of 49q , 7 were old by the way
PLEASE SUPPORT DU30 for PRESIDENT!!!
i cannot post the last 2 ,
1 question about phyton script
Refer to the exhibit What will happen when the Python script is executed?
a. The hostname will be translated to an fP address and printed.
b. The hostname will be printed for the client in the client ID field.
c. The script will pull allcomputer hostnames and print them.
d. The script will translate the IP address to FODN and print it
last question DD
about
CISCO Stealthwatch
CISCO ISE
CISCO TrustSec
CISCO Umbrella
CISCO Stealthwatch obtains contextual identity andprofiles for all the users and devices connected ona network
CISCO ISE software defined segmentation that uses SGTs and allows administrators toquickly scale and enforce policies-across the network
CISCO TrustSec rapidly collects and analyzes Netflow telemetry data to deliver in-depth visibility and understanding of network traffic
Cisco Umbrella secure Internet gateway In the cloud that provides a security solution that protects endpoints on and off the network against threats on the Internet
alright done mates!
Will wait for your answers!
QUESTION 32
import requests
client_id = client id
api_key = api key
url = https api amp cisco com /v1/computers
response = requests.get (url, auth(client_id, api_key))
response_json = response.json()
for computer in response_json [‘data’]
hostname = computer [‘hostname’]
print (hostname)
Refer to the exhibit What will happen when the Python script is executed?
a. The hostname will be translated to an fP address and printed.
b. The hostname will be printed for the client in the client ID field.
c. The script will pull allcomputer hostnames and print them.
d. The script will translate the IP address to FODN and print it
Thanks brother!
I will work on these over the weekend and share my opinions
the second D&D is incorrect. Here it is corrected:
2.Drag and drop the solutions from the left onto the solution’s benefits on the right.
a. Cisco Stealthwatch 3. rapidly collects and analyzes Netflow and telemetry data to deliver in-depth visibility and understanding of network traffic
b. Cisco ISE 1. Obtains contextual identity and profiles for all the users and devices connected on the network
c. Cisco TrustSec 2. software defined segmentation that uses SGTs and allows administrators to quickly scale and enforce policies-across the network
d. Cisco Umbrella 4. secure Internet gateway In the cloud that provides a security solution that protects endpoints on and off the network against threats on the Internet by using DNS
6. In an Iaa3 cloud services model, which security functionis the provider responsible for managing?
a. Internet proxy
b. firewalling virtual machines
c. CASB
d. hypervisor OS hardening
The answer is C (CASB).
The question refers to IaaS offering. This means that the cloud provider gives you “infrastructure” aka baremetals. It’s your job to provision firewalls, internet proxy or harden the hypervisor. What the Cloud provider offers is a secure dashboard (CASB) from where you can securely acces and manage your services.
A cloud access security broker (CASB) is software or hardware that sits between users and their cloud service to enforce security policies as they access cloud-based resources.
Yes gogu, thats not the answer yet, thanks!
Can you also answer the rest questions?
Q: A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
a Network Discovery policy to receive data from the host
b Threat: Intelligence policy to download the data from the host
c File Analysis policy to send file data into Cisco Firepower
d Network Analysis policy to receive NetFlow data from the host
Answer: a (network discovery policies are used for identifying assets. The FTD is not a NetFlow collector, so d is excluded)
Q:With which components does a southbound API within a software-defined network architecture communicate?
a controllers within the network
b applications
c appliances
d devices such as routers and switches
Answer: d (for Cisco ACI southbound API are used to talk to Nexus9K switches, which are the policy enforcers)
Q:An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
a. Set content settings to High
b. Configure the intelligent proxy.
c. Use destination block lists.
d. Configure application block lists.
Answer: b (https://docs.umbrella.com/deployment-umbrella/docs/what-is-the-intelligent-proxy)
a is not correct because it would block too much, c might do the trick but you need to manually define “suspicious domains”, d would block web surfing entirely
Q:What is the role of an endpoint in protecting a user from a phishing attack?
a Use Cisco Stealthwatch and Cisco ISE Integration.
b Utilize 802.1X network security to ensure unauthorized access to resources.
c Use machine learning models to help identify anomalies and determine expected sending behavior.
d Ensure that antivirus and anti malware software is up to date.
Answer: d (the rest are not endpoint roles)
Q:An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1md5 Clsc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however is unable to do so.Which command is required to enable the client to accept the server’s authentication key?
a ntp peer 1.1.1.1 key 1
b ntp server 1.1.1.1 key 1
c ntp server 1.1.1.2 key 1
d ntp peer 1.1.1.2 key 1
Answer: b (the question needs rephrasing though)
Q: When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
a. The key server that is managing the keys for the connection will be at 1.2.3.4.
b. The remote connection will only be allowed from 1 2.3.4
c. The address that will be used as the crypto validation authority.
d. All IP addresses other than 1.2.3.4 will be allowed
Answer: b (0.0.0.0 means that the key is used for all pears)
QUESTION 15
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service? (Choose two.)
a. Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the pre configured interval.
b. Use EEM to have the ports return to service automatically in less than 300 seconds.
c. Enter the shutdown and no shutdown commands on the interfaces.
d. Enable the snmp-server enable traps command and wait 300 seconds
e. Ensure that interfaces are configured with the error-disable detection and recovery feature
Answer: c, e
QUESTION 16
What is the difference between Cross-site Scripting and SQL Injection , attacks?
a. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.
b. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.
c. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.
d. Cross-site Scripting is an attack where code is executed from the server side,whereas SQL Injection is an attack where code is executed from the client side.
Answer: d
QUESTION 17
A network administrator is configuring a switch to use Cisco ISE for 802.1X.An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
a. Adaptive Network Control Policy List
b. Context Visibility
c. Accounting Reports
d. RADIUS Live Logs
Answer: d – since logs should also reveal the cause of auth failure
Adaptive Network Control (ANC) is used to monitor and control network access of AUTHENTICATED endpoints
Accounting Reports is not an answer since accounting is performed after Authentication, which is the one that fails
Context Visibility offers a more general context
QUESTION 18
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
a. Place the Cisco ISE server and the AD server in the same subnet.
b. Configure a common administrator account.
c. Configure a common DNS server.
d. Synchronize the clocks of the Cisco ISE server and the AD server.
Answer: d
“Ensure that your ISE server and Active Directory are time synchronized. Time in the ISE is set according to the Network Time Protocol (NTP) server. It is recommended that you use the NTP to synchronize time between the ISE and Active Directory. For more information on NTP server settings, see the “System Time and NTP Server Settings” section.”
Thanks gogu, more please thanks!!
Hello
here is my answers about 49 new question
correct me if i m wrong
Thank you
1. A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issued
a. The policy was created to send a message to quarantine instead of drop.
b. The file has a reputation score that is above the threshold.
c. The file has a reputation score that is below the threshold,
d. The policy was created to disable file analysis.
ANSW : B
—
2. Art administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?
a. NetFlow
b. Packel Tracer
c. Network Discovery
d. Access Control
ANSW : C
—
3. Which attack is preventable by Cisco ESA but not by the Cisco WSA?
a. buffer overflow
b. DoS
c. SOL injection
d. phishing
ANSW : D
—
4. A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented Which two actions must be taken in order to meet these requirements? (Choose two.)
a. Use outbreak filters from SenderBase
b. Enable a message tracking service.
c. Configure a recipient access table
d. Deploy the Cisco ESA in the DMZ.
e. Scan quarantined emails using AntiVirus signatures.
ANSW: A and C
5. Which type of dashboard does Cisco DNA Center provide for complete control of the network?
a. service management
b. centralized management
c. application management
d. distributed management
ANSW: B
QUESTION 20
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
a. BYOD on boarding
b. Simple Certificate Enrollment Protocol
c. client provisioning
d. MAC authentication bypass
Answer: a
Employees are redirected to the Bring Your Own Device (BYOD) portal when registering personal devices using native supplicants. The first time employees attempt to access the network using a personal device, they may be prompted to manually download and launch the Network Setup Assistant (NSA) wizard and be guided through registering and installing the native supplicant.
d – We can exclude MAB since it is a 802.1x access method
b – SCEP is a protocol for certificate enrollment, it is not used to configure the supplicant
c – The Client Provisioning system provides posture assessments and remediations for devices that are attempting to gain access to your corporate network.
6. In an IaaS cloud services model, which security function is the provider responsible for managing?
a. Internet proxy
b. firewalling virtual machines
c. CASB
d. hypervisor OS hardening
ANSW : D
7. A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
a. Network Discovery policy to receive data from the host
b. Threat: Intelligence policy to download the data from the host
c. File Analysis policy to send file data into Cisco Firepower
d. Network Analysis policy to receive NetFlow data from the host
ANSW : D
8. With which components does a southbound API within a software-defined network architecture communicate?
a. controllers within the network
b. applications
c. appliances
d. devices such as routers and switches
ANSW : D
9.An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
a. Set content settings to High
b. Configure the intelligent proxy.
c. Use destination block lists.
d. Configure application block lists.
ANSW : D
10. What is the role of an endpoint in protecting a user from a phishing attack?
a. Use Cisco Stealthwatch and Cisco ISE Integration.
b. Utilize 802.1X network security to ensure unauthorized access to resources.
c. Use machine learning models to help identify anomalies and determine expected sending behavior.
d. Ensure that antivirus and anti malware software is up to date.
ANSW : C
11. An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Clsc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however is unable to do so.Which command is required to enable the client to accept the server’s authentication key?
A. ntp peer 1.1.1.1 key 1
B. ntp server 1.1.1.1 key1
C. ntp server 1.1.1.2 key 1
D. ntp peer 1.1.1.2 key 1
ANSW : B
12. When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
a. The key server that is managing the keys for the connection will be at 1.2.3.4.
b. The remote connection will only be allowed from 1 2.3.4
c. The address that will be used as the crypto validation authority.
d. All IP addresses other than 1.2.3.4 will be allowed
ANSW : B
QUESTION 14
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
a. file access from a different user
b. interesting file access
c. user login suspicious behavior
d. privilege escalation
ANSW : C
—
QUESTION 15
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service? (Choose two.)
a. Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the pre configured interval.
b.Use EEM to have the ports return to service automatically in less than 300 seconds.
c. Enter the shutdown and no shutdown commands on the interfaces.
d. Enable the snmp-server enable traps command and wait 300 seconds
e. Ensure that interfaces are configured with the error-disable detection and recovery feature
ANSW : C and E
—
QUESTION 16
What is the difference between Cross-site Scripting and SQL Injection, attacks?
a. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.
b. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.
c. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.
d. Cross-site Scripting is an attack where code is executed from the server side,whereas SQL Injection is an attack where code is executed from the client side.
ANSW : D
—
QUESTION 17
A network administrator is configuring a switch to use Cisco ISE for 802.1X.An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
a. Adaptive Network Control Policy List
b. Context Visibility
c. Accounting Reports
d. RADIUS Live Logs
ANSW : D
—
QUESTION 18
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
a. Place the Cisco ISE server and the AD server in the same subnet.
b. Configure a common administrator account.
c. Configure a common DNS server.
d. Synchronize the clocks of the Cisco ISE server and the AD server.
ANSW : D
—
QUESTION 19
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling She AVC engine, what must be done to implement this?
a. Use security services to configure the traffic monitor, .
b. Use URL categorization to prevent the application traffic.
c. Use an access policy group to configure application control settings.
d. Use web security reporting to validate engine functionality
ANSW : C
QUESTION 21
Import requests
url — https: // api.amp.cisco. com/v1/computers
headers = {
accept : application/json
content-type : application/json
authorization : Basic API Credentials
cache-control : no cache
}
response = requests.request (GET , url , headers = headers)
print response.txt
Refer to the exhibit. What will happen when this Python script is run?
a. The compromised computers and malware trajectories will be received from Cisco AMP
b. The list of computers and their current vulnerabilities will be received from Cisco AMP ,
c. The compromised computers and what compromised them will be received from Cisco AMP.
d. The list of computers, policies, and connector statuses will be received from Cisco AMP.
Answer d
Output example: api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fcomputers&api_host=api.amp.cisco.com&api_resource=Computer&api_version=v1
QUESTION 20
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
a. BYOD on boarding
b. Simple Certificate Enrollment Protocol
c. client provisioning
d. MAC authentication bypass
ANSW : A
—
QUESTION 21
Import requests
url — https: // api.amp.cisco. com/v1/computers
headers = {
accept : application/json
content-type : application/json
authorization : Basic API Credentials
cache-control : no cache
}
response = requests.request (GET , url , headers = headers)
print response.txt
Refer to the exhibit. What will happen when this Python script is run?
a. The compromised computers and malware trajectories will be received from Cisco AMP
b. The list of computers and their current vulnerabilities will be received from Cisco AMP ,
c. The compromised computers and what compromised them will be received from Cisco AMP.
d. The list of computers, policies, and connector statuses will be received from Cisco AMP.
ANSW : D
QUESTION 22
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
a. Cisco Umbrella
b. Cisco AMP
c. Cisco Stealthwatch
d. Cisco Tetration
ANSW : B
—
QUESTION 23
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
a. With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
b. With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
c. With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
d. With an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it.
ANSW : D
—
QUESTION 24
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
a. consumption
b. sharing
c.analysis
d. authoring
ANSW : B
—
QUESTION 25
Ans organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
a. Configure security appliances to send syslogs to Cisco Stealthwatch Cloud.
b. Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud.
c. Deploy a Cisco FTD sensor to sendevents to Cisco Stealthwatch Cloud.
d. Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud
ANSW : B
—
QUESTION 26
What does Cisco AMP for Endpoints use to help an organization delect different families of malware?
a. Ethos Engine to perform fuzzy fingerprinting
b. Tetra Engine to detect malware when me endpoint is connected to the cloud
c. Clam AV Engine to perform email scanning
d. Spero Engine with machine learning to perform dynamic analysis
ANSW : D
—
QUESTION 27
What are two characteristics of Cisco DNA Center APIs? {Choose two.)
a. Postman is required to utilize Cisco DNA Center API calls.
b. They do not support Python scripts.
c. They are Cisco proprietary.
d. They quickly provision new devices.
e. They view the overall health of the network,
ANSW : D
—
QUESTION 28
What is a benefit of conducting device compliance checks?
a. It indicates what type of operating system is connecting to the network.
b. It validates if anti-virus software is installed.
c. It scans endpoints to determine if malicious activity is taking place.
d. It detects email phishing attacks.
ANSW : B
—
QUESTION 29
In which two ways does Easy Connect he]p control network access when used with Cisco TrustSec? (Choose two.)
a. It allows multiple security products to share information and work together to enhance security posture in the network.
b. It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
c. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
d. It integrates with third-party products to provide better visibility throughout the network,
e. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID).
ANSW : A
QUESTION 30
What is the benefit of installing Cisco AMP for Endpoints on a network?
a. It provides operating system patches on the endpoints for security.
b. It provides flow-based visibility for the endpoints network connections.
c. It enables behavioral analysis to be used for the endpoints.
d. It protects endpoint systems through application control and real-time scanning
ANSW : D
—
QUESTION 31
Art administrator is configuring a DHCP server to better secure their environment. They need to be able to rate-limit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
a. Set a trusted interface for the DHCP server
b. Set the DHCP snooping bit to 1.
c. Add entries in the DHCP snooping database.
d. Enable ARP inspection for the required VLAN.
ANSW : D
QUESTION 32
import requests
client_id = client id
api_key = api key
url = https api amp cisco com /v1/computers
response = requests.get (url, auth(client_id, api_key))
response_json = response.json()
for computer in response_json [‘data’]
hostname = computer [‘hostname’]
print (hostname)
Refer to the exhibit What will happen when the Python script is executed?
a. The hostname will be translated to an IP address and printed.
b. The hostname will be printed for the client in the client ID field.
c. The script will pull all computer hostnames and print them.
d. The script will translate the IP address to FODN and print it
ANSW : C
—
QUESTION 33
Exhibit about ASA ASDM Anyconnect Connection Profile: DefaultRAGroup
Refer to the exhibit. When configuring a remote access VPN solution terminating on the Cisco ASA. an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?
a. Group Policy
b. Method
c. SAML Server
ANSW : B
—
QUESTION 34
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?
a. Cisco Umbrella
b.Cisco Cloud Email Security
c. Cisco NGFW
d. Cisco Cloudlock
ANSW : D
—
QUESTION 35
Which feature requires a network discovery policy on the Cisco Firepower NGIPS?
a. security intelligence
b. URL filtering
c. impact flags
d. health monitoring
ANSW : C
—
QUESTION 36
An engineer needs a cloud solution that wilt monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API. Which solution should be used to accomplish this goal?
a. SIEM
b. CASB
c. Adaptive MFA
d. Cisco Cloudlock
ANSW : A
—
QUESTION 37
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
a. Cisco Talos
b. Cisco Dynamrc DNS
c. Cisco AMP
d. Cisco AnyConnect
ANSW : A
—
QUESTION 38
Why is it important to implement MFA inside of an organization?
a. To prevent man-the-middle attacks from being successful.
b. To prevent DoS attacks from being successful.
c. To prevent brute force attacks from being successful.
d. To prevent phishing attacks from being successful.
ANSW : C
—
QUESTION 39
A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?
a. map SNMPv3users to SNMP views
b. set the password to be used for SNMPv3 authentication
c. define the encryption algorithm to be used by SNMPv3
d. specify the UDP port used by SNMP
ANSW : B
—
QUESTION 40
An organization is using Cisco Firepower and Cisco Merafci MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?
a. Cisco Defense Orchestrator
b. Cisco Secureworks
c. Cisco DNA Center
d. Cisco Configuration Professional
ANSW : C
NEW DD
QUESTION 41
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Version 1 appropriate only for legacy systems
Version 5 appropriate only for the main cache
Version 8 introduced extensibility
Version 9 introduced support for aggregation caches
QUESTION 42
2.Drag and drop the solutions from the left onto the solution’s benefits on the right.
a. Cisco Stealthwatch 3. rapidly collects and analyzes Netflow and telemetry data to deliver in-depth visibility and understanding of network traffic
b. Cisco ISE 1. Obtains contextual identity and profiles for all the users and devices connected on the network
c. Cisco TrustSec 2. software defined segmentation that uses SGTs and allows administrators to quickly scale and enforce policies-across the network
d. Cisco Umbrella 4. secure Internet gateway In the cloud that provides a security solution that protects endpoints on and off the network against threats on the Internet by using DNS
QUESTION 22
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network.The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
a. Cisco Umbrella
b. Cisco AMP
c. Cisco Steal!hwatch
d. Cisco Tetration
Answer: d
Cisco Steal!hwatch only provides visibility
Cisco umbrella does not provide segmentation
cisco AMP is all about malware, not visibility and segmentation
QUESTION 23
Which factor must be considered whenchoosing the on-premise solution over the cloud-based one?
a. With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
b. With a cloud’based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
c. With an on-premise solution,ihe provider is responsible for theinstallation, but the customer is responsible for the maintenance of the product.
d. Withan on-premise solution, the customer is responsible for thei nstallation and maintenance of the product, whereas with a cloud-based solution,the provider is responsible for it.
Answer D
QUESTION 24
Which term describes when the Cisco Firepower downloads threatintelligence updates fromCisco Talos?
a. consumption
b. sharing
c.analysis
d. authoring
Answer :A
QUESTION 26
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
a. Ethos Engine to perform fuzzy fingerprinting
b. Tetra Engine to detect malware whenme endpoint is connected to the cloud
c. ClamAV Engine to perform email scanning
d. Spero Engine with machine learning to perform dynamic analysis
Answer: A
EThos = fuzzy fingerprinting (also uses ClamAV tool and ssdeep)
ClamAV and Tetra can be used for offline protection but are very limited compared to online detection
Spero = machine learning engine (built to identify new malware)
the dynamic analysis help enhance ETHOS and SPERO but is not performed by Ethos or Spera, but it is a different prevention framework.
http://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKSEC-2139.pdf
Q25: B
QUESTION 27
What are two characteristics of Cisco DNA Center APIs? {Choose two.)
a. Postman is required to utilize Cisco DNA Center API calls.
b. They do not support Python scripts.
c. They are Cisco proprietary.
d. They quicklyprovision new devices.
e. They view the overall health of the network,
Answer: CD
e – the APIs can be used to retrieve the overall health of the network but they do not “see it” (they’re just a tool)
@gogu, is this new set of questions from securitytut premium or any other vendor ? I dont see any updates to qs from passleader
Anyone passed since yesterday? share exp?
Is the new dumbs valid?
can someone who passed exam in last few days confirm if securitytut premium questions are still valid ? I sent them email to confirm and per them they are valid and there is no change to exam as contrary to many members here talking about 40-50 new qs. Which vendor dumps are valid and up to date ?
Thanks
Kumar they said 40-60 questions on the old dumb
And other 40-50 on the new dumbs
Anyone confirm dumbs is now valid?
IS DA DUMB VALID ????
I have valid ccna dump in $30 if any z o e i s a a c 8 9 AT g m a i l dot c o m
@dell kindly did ur exam included new questions from these 50 questions at this site ?
I will have my exam tomorrow, i will send exam review and will update the same. Wish me luck guys!
Let´s go Ninja.
All the best for you. You will pass!!
Did you meet any of the 42 questions? Or was the 225q dump enough to pass?
@dell_spaces is just a scammer. Do not click the link. He posted the same exact message in multiple forums, for different exams :))
Dump is valid with all new QA, only 3-4 QA were new and can answer easily. Dump is valid Got 889 score
@khan, which dump is valid pass4leader with 225qs or securitytut premium ?
Thanks
Just passed, premium has all valid questions only seen 2 or 3 new that were easy like @Khan said.
Best of luck
Passed the exam yesterday March22, 2 new questions
One DD about phising worm botnet and virus only definition very easy
One new q was ESA Dlp.. someone has a dlp violation
Answer quarantine the email and send dlp violation
My score was 94X
I will update what i chose from the 40q some are wrong in premium around 5-6q
kindly what is the passing score
Can someone share plz the new dump,
I am planning to take the exam on Friday.
hammoud1997 @ live . com
Please send the update
Thanks :)
what is the correct answer for below qs ?
What are two rootkit types? (Choose two)
A. registry
B. virtual
C. bootloader
D. user mode
E. buffer mode
Passleader says DE
Premium securitytut says CD
What is the correct answer for qs below? Passleader and securitytut premium varies:
Which form of attack is launched using botnets?
A. EIDDOS
B. virus
C. DDOS
D. TCP flood
PAssleader=== A
Premiumsecuritytut==C
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
Passleader=C
Premium==A
@Kumar, Premium provided correct answers
Which one is correct ?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Passleader==BC
Premium==CE
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
A. TLSv1.2
B. TLSv1.1
C. BJTLSv1
D. DTLSv1
Passleader==A
Premium==D
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
A. Security Intelligence
B. Impact Flags
C. Health Monitoring
D. URL Filtering
Passleader==A
Premium==B
Which one is correct ? Passleader and Securitytut premium answers doesnt match
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
A. Time-based one-time passwords
B. Data loss prevention
C. Heuristic-based filtering
D. Geolocation-based filtering
E. NetFlow
Passleader==BC
Premium==BD
In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)
A. configure Active Directory Group Policies to push proxy settings
B. configure policy-based routing on the network infrastructure
C. reference a Proxy Auto Config file
D. configure the proxy IP address in the web-browser settings
E. use Web Cache Communication Protocol
Passleader==CE
Premium==BE
Which one is correct ? Passleader and Securitytut premium answers doesnt match
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
A. Windows service
B. computer identity
C. user identity
D. Windows firewall
E. default browser
passleader==AC
Premium==AD
Refer to the exhibit.
HQ_Router(config)#username admin5 privilege 5
HQ_Router(config)#privilege interface level 5 shutdown
HQ_Router(config)#privilege interface level 5 ip
HQ_Router(config)#privilege interface level 5 description
A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?
A. set the IP address of an interface
B. complete no configurations
C. complete all configurations
D. add subinterfaces
passleader==A
Premium==B
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?
A. snmp-server host inside 10.255.254.1 version 3 andy
B. snmp-server host inside 10.255.254.1 version 3 myv3
C. snmp-server host inside 10.255.254.1 snmpv3 andy
D. snmp-server host inside 10.255.254.1 snmpv3 myv3
passleader==B
Premium==A
@zomby== Thanks
Trust premium over passleader, their answers makes sense
Hey guys, please may someone post a link to the dump?
@kumar – premium answers are correct for those questions
@ MALAKI TITE KO
Dear can you share the complete pack of correct and latest dumps?
that make ease for preparation and relax or wrong answer doubt.
Hi, those who want dumps. please see to your top right of this page “Click Sign up for premium membership” you can see dumps all there:)
Thanks @Malaki Tite Ko and @Gogu for your feedback
May you please share the entire dump
good evening guys, please help me with latest dump smithkatrine213 @ g mail . com
am writing exam on friday
Guys- how many questions is the valid dumps? is it still 225q?
Folks, 225 qs pdf on this comment thread + 40 qs posted on page 16-18 of comments section constitutes the latest and valid dump.
Mind you, the answers for upto 10-20 qs are wrong in that 225 qs pdf from passleader.
Hope this helps. For easy access at one place and to practice recommend securitytut premium. It has all 225+40 new qs added recently
@Kumar, u meant the composite questions should cover all of those with correct answers ?
premium is 100% valid pass today
Please share/upload Premium dumbs on cloud link as most delight people did in past
when will cisco have major update or every when cisco updates exam?
@Kumar just a question the new 40 questions here have been answered all correct ?
@Student try to pay 19$ like everyone did.
Maybe it will help the website and future dumps. my 2 cent..
BTW. I am not the admin
hi guys, can share recent dumps :) danke in advance
@ss, yes composite should cover all qs, however be mindful that composite has max 102 qs picked from total 265 qs, so you need to do composite 4-5 times as it randomly pick qs. Composite shoudl be used for practicing timing before appearing for exam.
For preparation cover all qs per topic on rigth hand side of this page, then new 71 qs added during dec 2020 time frame and then new set of qs added 4-5 days back. This will cover all qs and then practice composite few times before appearing for exam.
@Mr.Robot, no all the answers are not correct and some of the qs are answered by different people which makes it impossible for me to confirm in “yes” or “No”. If you repost qs i would be happy to assist you with correct answers. However most of the answers are correct if not all.
@student, in my region no PayPal facility I have.
Sino may dumps dito? pashare naman mga pinoy!
Hey, anyone who used this recently and passed the exam?
Hi, took the exam awhile ago & passed – Premium is valid but saw 3-4 new questions
Dear all,
The new dump is 1000% valid, download it from below link and goodluck.
https :// www . sendspace . com/file/24r7p6
Thanks for the guys here who posted some new questions.
Regards,
Hi @Mr.Robot, Thx. Does your dump is enough to pass the exam?
share dumps pls
Hi @Black,
The dump is valid and its enough.
if you study it with 225q dumps then pass is guaranteed for you !
Regards,
@Mr. Robot there is a lot of wrong answers.
passed !
I can tell you 225 qs not enough. 225 Qs + new 40 qs are required. I got 3 new qs besides this 225+40. 2 multiple choice qs and one drag and drop.
I didnt score cent percent though i can bet i used all answers from premium. It was unfortunate i ended up gettign all 10-20 qs which i mentioned earlier have contardicting answers in passleader and premium. I answered per Premium.
@radom 5 questions have wrong answers only.
Even with the qrong answers its enough to pass
hi @Mr, Robot, Can you please correct those 5 QA for us?
@Black
Q65
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. web page images
B. Linux and Windows operating systems
C. user input validation in a web page or web application.
D. database
Answer is C
Q66
An organization received a large amount of SPAM messages over a short time period. In order
to take action on the messages, it must be determined how harmful the messages are and this
needs to happen dynamically. What must be configured to accomplish this?
A. Configure the Cisco ESA to modify policies based on the traffic seen.
B. Configure the Cisco WSA to receive real-time updates from Talos.
C. Configure the Cisco ESA to receive real-time updates from Talos.
D. Configure the Cisco WSA to nxldify polic ies based on the traffic seen.
Answer is A
Q68
Which Cisco command enables authentication, authorization, and accounting globally so that
CoA is supported on the device?
A. aaa server radius dynamic-author
B. aaa new-model
C. ip device-tracking
D. auth-type all
Answer is B
Q73
What is a benefit of using Cisco FMC over Cisco ASDM?
A. Cisco FMC provides centralized management while Cisco ASDM does not
B. Cisco FMC supports pushing configurations to devices while Cisco ASDM does not
C. Cisco FMC uses Java while Cisco ASDM uses HTML5.
D. Cisco FMC supports all firewall products whereas Cisco ASDM only supports Cisco ASA
devices.
Answer is A
Q77
An MDM provides which two advantages to an organization with regards to device
management? (Choose two.)
A. AD group policy management
B. asset inventory management
C. network device management
D. critical device management
E. allowed application management
Answer is BE