passyourccie@gmail.com Part-1 Question 1 Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two) A. NTLMSSP B. Kerberos C. CHAP D. TACACS+ E. RADIUS Answer: A B Question 2 An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console? A. Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal. B. Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal. C. Send an API request to Cisco Cloudlock from Dropbox admin portal. D. Add Cisco Cloudlock to the Dropbox admin portal. Answer: A Question 3 What is a benefit of using Cisco Umbrella? A. DNS queries are resolved faster. B. Attacks can be mitigated before the application connection occurs. C. Files are scanned for viruses before they are allowed to run. D. It prevents malicious inbound traffic. Answer: B Question 3b Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right. passyourccie@gmail.com Answer: Authentication + esp-md5-hmac + esp-sha-hmac Encryption + esp-3des + esp-aes-256 Explanation esp-md5-hmac: ESP with MD5 authentication esp-sha-hmac: ESP with SHA authentication esp-3des: ESP with 168-bit DES encryption esp-aes-256: ESP with the 256-bit AES encryption Question 4 Which security solution is used for posture assessment of the endpoints in a BYOD solution? A. B. C. D. Cisco FTD Cisco ASA Cisco Umbrella Cisco ISE Answer: D Question 5 Which characteristic is unique to a Cisco WSAv as compared to a physical appliance? A. B. C. D. supports VMware vMotion on VMware ESXi requires an additional license performs transparent redirection supports SSL decryption Answer: B Explanation Cisco Secure virtual appliances function the same as physical Cisco Secure Email Gateway, Cisco Secure Web Appliance, or Cisco Secure Email and Web Manager hardware appliances, with only a few minor differences. … The Cisco Secure virtual appliance requires an additional license to run the virtual appliance on a host. You can use this license for multiple, cloned virtual appliances. Licenses are hypervisorindependent. Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/content_security/virtual_applian ces/Cisco_Content_Security_Virtual_Appliance_Install_Guide.pdf Question 6 What are two benefits of using an MDM solution? (Choose two) A. grants administrators a way to remotely wipe a lost or stolen device B. provides simple and streamlined login experience for multiple applications and users C. native integration that helps secure applications across multiple cloud platforms or on-premises environments D. encrypts data that is stored on endpoints E. allows for centralized management of endpoint device applications and configurations passyourccie@gmail.com Answer: A E Question 7 What are two benefits of using Cisco Duo as an MFA solution? (Choose two) A. grants administrators a way to remotely wipe a lost or stolen device B. provides simple and streamlined login experience for multiple applications and users C. native integration that helps secure applications across multiple cloud platforms or on-premises environments D. encrypts data that is stored on endpoints E. allows for centralized management of endpoint device applications and configurations Answer: B C Question 8 What is a benefit of using GET VPN over FlexVPN within a VPN deployment? A. B. C. D. GET VPN supports Remote Access VPNs GET VPN natively supports MPLS and private IP networks GET VPN uses multiple security associations for connections GET VPN interoperates with non-Cisco devices Answer: B Question 9 Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard? A. B. C. D. Cisco Umbrella Cisco AMP for Endpoints Cisco ISE Cisco Stealthwatch Answer: C Question 10 Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls? A. B. C. D. NTP syslog SNMP NetFlow Answer: D Question 11 What is the term for the concept of limiting communication between applications or containers on the same node? A. B. C. D. container orchestration software-defined access microservicing microsegmentation Answer: D passyourccie@gmail.com Explanation Microservices are about dissecting applications to smaller units and run those units independently instead of running them in a monolithic application. But this question asks about communication between applications so “microservicing” is not correct. Micro-segmentation is a network security technique that isolates different workloads from one another within a data center. A workload can be broadly defined as the resources and processes needed to run an application. Hosts, virtual machines and containers are a few examples of workloads. Question 12 What is a characteristic of an EDR solution and not of an EPP solution? A. stops all ransomware attacks B. retrospective analysis C. decrypts SSL traffic for better visibility D. performs signature-based detection Answer: B Question 13 Drag and drop the security solutions from the left onto the benefits they provide on the right. Answer: + detection, blocking, tracking, analysis, and remediation to protect the enterprise against targeted and persistent malware attacks: Cisco AMP for Endpoints + policy enforcement based on complete visibility of users, mobile devices, client-side applications, communication between virtual machines, vulnerabilities, threats, and URLs: Full contextual awareness + unmatched security and web reputation intelligence provides real-time threat intelligence and security protection: Collective Security Intelligence + superior threat prevention and mitigation for known and unknown threats: NGIPS Question 14 Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises? A. hybrid cloud B. private cloud C. public cloud D. community cloud passyourccie@gmail.com Answer: D Question 15 How does Cisco AMP for Endpoints provide next-generation protection? A. It encrypts data on user endpoints to protect against ransomware. B. It leverages an endpoint protection platform and endpoint detection and response. C. It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers. D. It integrates with Cisco FTD devices. Answer: B Question 16 A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two) A. Segment different departments to different IP blocks and enable Dynamic ARP inspection on all VLANs B. Ensure that noncompliant endpoints are segmented off to contain any potential damage. C. Ensure that a user cannot enter the network of another department. D. Perform a posture check to allow only network access to those Windows devices that are already patched. E. Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW. Answer: B D Question 17 What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two) A. REST uses methods such as GET, PUT, POST, and DELETE. B. REST codes can be compiled with any programming language. C. REST is a Linux platform-based architecture. D. The POST action replaces existing data at the URL path. E. REST uses HTTP to send a request to a web service. Answer: A E Question 18 What is the process In DevSecOps where all changes in the central code repository are merged and synchronized? A. B. C. D. CD EP CI QA Answer: C Question 19 Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access? passyourccie@gmail.com A. B. C. D. Cisco ISE Cisco NAC Cisco TACACS+ Cisco WSA Answer: A Question 20 Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider? A. B. C. D. IaC SaaS IaaS PaaS Answer: B Question 21 How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues? A. B. C. D. It deploys an AWS Lambda system It automates resource resizing It optimizes a flow path It sets up a workload forensic score Answer: B Question 22 Email security has become a high priority task for a security engineer at a large multi- national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10.00 to -6.00) on the Cisco ESA. Which action will the system perform to disable any links in messages that match the filter? A. B. C. D. Defang Quarantine FilterAction ScreenAction Answer: A Question 23 What are two workload security models? (Choose two) A. SaaS B. PaaS C. off-premises D. on-premises E. IaaS Answer: A D Explanation Cisco Secure Workload offers flexible options for deployments including on-premises appliance, virtual appliance, and Software as a Service (SaaS). passyourccie@gmail.com Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetrationanalytics/solution-overview-c22-741289.pdf Question 24 Which API method and required attribute are used to add a device into DNAC with the native API? A. B. C. D. lastSyncTime and pid POST and name userSudiSerialNos and deviceInfo GET and serialNumber Answer: B Question 25 What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support? A. B. C. D. mobile device management mobile content management mobile application management mobile access management Answer: A Question 26 What is the most common type of data exfiltration that organizations currently experience? A. B. C. D. HTTPS file upload site Microsoft Windows network shares SQL database injections encrypted SMTP Answer: B Explanation A study by N. J. Percoco, Data exfiltration: How Data Gets Out, reviewed 400 data exfiltrations and identified the following as the top methods for data exfiltration: Native Remote Access Applications 27% Microsoft Windows Network Shares 28% Malware Capability: FTP 17% Malware Capability: IRC 2% Malware Capability: SMTP 4% HTTP File Upload Site 1.5% Native FTP Client 10% SQL Injection 6% Encrypted Backdoor <1% Reference: https://blogs.cisco.com/security/sensitive-data-exfiltration-and-the-insider Question 27 An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source. Which two steps must be taken to accomplish this task? (Choose two) A. Specify the NTP version B. Configure the NTP stratum C. Set the authentication key D. Choose the interface for syncing to the NTP server E. Set the NTP DNS hostname passyourccie@gmail.com Answer: C D Explanation Step 3 Enter the NTP server IPv4 IP Address. You cannot enter a hostname for the server; the ASA does not support DNS lookup for the NTP server -> Answer E is not correct. … Step 5 (Optional) Choose the Interface from the drop-down list. This setting specifies the outgoing interface for NTP packets. If the interface is blank, then the ASA uses the default admin context interface according to the management routing table. Step 6 (Optional) Configure NTP authentication. Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/general/asdm-78general-config/basic-hostname-pw.html Question 28 Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two) A. It must include the current date. B. It must reside in the trusted store of the WSA. C. It must reside in the trusted store of the endpoint. D. It must have been signed by an internal CA. E. It must contain a SAN. Answer: A B Question 29 DoS attacks are categorized as what? A. B. C. D. phishing attacks flood attacks virus attacks trojan attacks Answer: B Question 30 Which Cisco solution integrates Encrypted Traffic Analytics to perform enhanced visibility, promote compliance, shorten response times, and provide administrators with the information needed to provide educated and automated decisions to secure the environment? A. B. C. D. Cisco SDN Cisco ISE Cisco Security Compliance Solution Cisco DNA Center Answer: D Explanation Recently announced at the June 2017 Cisco Live Event, Encrypted Traffic Analytics will be built into the Cisco DNA Center (the single window UI for Cisco Apic-Em) and will provide the ability to detect Encrypted Malware throughout your enterprise network. passyourccie@gmail.com Reference: https://www.linkedin.com/pulse/understanding-ciscos-new-anti-malware-tech-etaaustin-emuang-stubbs Question 31 Which Cisco security solution stops exfiltration using HTTPS? A. B. C. D. Cisco CTA Cisco AnyConnect Cisco FTD Cisco ASA Answer: A Explanation Attackers often try to exfiltrate sensitive data, including credentials, using HTTP and HTTPS requests themselves. Cognitive Threat Analytics uses multiple indications of compromise (IOCs), including global statistics and local anomaly scores, to reliably distinguish malicious tunneling from benign use of the technique. Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatanalytics/at-a-glance-c45-736555.pdf Question 32 What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client? A. The Umbrella Roaming client stops and tracks malicious activity on hosts, and AMP for Endpoints tracks only URL-based threats. B. The Umbrella Roaming Client authenticates users and provides segmentation, and AMP for Endpoints allows only for VPN connectivity C. AMP for Endpoints authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity. D. AMP for Endpoints stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats. Answer: D Explanation Cisco Advanced Malware Protection (AMP) for Endpoints is a malware and virus protection platform that you can use to protect your environment from intrusion, infected files, and malicious behavior. Question 33 What is a benefit of flexible NetFlow records? A. B. C. D. They have customized traffic identification They are used for accounting They monitor a packet from Layer 2 to Layer 5 They are used for security Answer: A Explanation Key Advantages to using Flexible NetFlow: + Flexibility, scalability of flow data beyond traditional NetFlow + The ability to monitor a wider range of packet information producing new information about network behavior not available today + Enhanced network anomaly and security detection passyourccie@gmail.com + User configurable flow information to perform customized traffic identification and the ability to focus and monitor specific network behavior (-> Therefore answer A is correct) Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/flexiblenetflow/product_data_sheet0900aecd804b590b.html Question 34 An engineer recently completed the system setup on a Cisco WSA. Which URL information does the system send to SensorBase Network servers? A. B. C. D. Summarized server-name information and MD5-hashed path information none because SensorBase Network Participation is disabled by default URL information collected from clients that connect to the Cisco WSA using Cisco AnyConnect complete URL, without obfuscating the path segments Answer: D Explanation Note: Standard SensorBase Network Participation is enabled by default during system setup -> Answer D is not correct. Enabling Participation in The Cisco SensorBase Network Step 1. Choose Security Services > SensorBase. Step 2. Verify that Sensor Base Network Participation is enabled. When it is disabled, none of the data that the appliance collects is sent back to the SensorBase Network servers. Step 3. In the Participation Level section, choose one of the following levels: + Limited. Basic participation summarizes server name information and sends MD5-hashed path segments to the Sensor Base Network servers. + Standard. Enhanced participation sends the entire URL with unobfuscated path segments to the SensorBase Network servers. This option assists in providing a more robust database, and continually improves the integrity of Web Reputation Scores. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa115/user_guide/b_WSA_UserGuide_11_5_1/b_WSA_UserGuide_11_5_1_chapter_00.pdf The “Standard” SensorBase Network Participation is enabled by default during system setup so this question implies we are using standard level, not Limited level -> Answer D is correct while answer A is not correct. Question 35 What is the purpose of the Cisco Endpoint IoC feature? A. B. C. D. It is an incident response tool It provides precompromise detection It is a signature-based engine It provides stealth threat prevention Answer: A Explanation The Endpoint Indication of Compromise (IOC) feature is a powerful incident response tool for scanning of post-compromise indicators across multiple computers. Reference: https://docs.amp.cisco.com/Cisco%20Endpoint%20IOC%20Attributes.pdf Question 36 Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow? A. api/v1/fie/config B. api/v1/onboarding/workflow passyourccie@gmail.com C. api/v1/onboarding/pnp-device D. api/v1/onboarding/pnp-device/import Answer: D Explanation The Device Onboarding API supports the PnP process, giving the developer the option to create a workflow that detects when a device joins the network and communicates with Cisco DNA Center, and then sending the onboarding configuration to the device. This API is composed of 28 endpoints, that can be used to manage workflows, include devices in the PnP Process, claim devices, amongst other things. PYTHON script: ONBOARDING_PNP_IMPORT_URL = ‘/dna/intent/api/v1/onboarding/pnp-device/import’ Reference: https://developer.cisco.com/docs/dna-center/#!device-onboarding/onboarding-pnp-api Question 37 What does endpoint isolation in Cisco AMP for Endpoints security protect from? A. B. C. D. a malware spreading across the user device an infection spreading across the network an infection spreading across the LDAP or Active Directory domain from a user account a malware spreading across the LDAP or Active Directory domain from a user account Answer: A Explanation Endpoint Isolation is a feature that lets you block incoming and outgoing network activity on a Windows computer to prevent threats such as data exfiltration and malware propagation. Reference: https://cloudmanaged.ca/wp-content/uploads/2020/05/AMP-for-Endpoints-UserGuide.pdf Question 38 An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to create a policy that prevents users from executing file named abc424952615.exe without quarantining that file. What type of Outbreak Control list must the SHA-256 hash value for the file be added to in order to accomplish this? A. B. C. D. Advanced Custom Detection Blocked Application Simple Custom Detection Isolation Answer: B Explanation A Simple Custom Detection list is similar to a blacklist. These are files that you want to detect and quarantine. Not only will an entry in a Simple Custom Detection list quarantine future files, but through Retrospective it will quarantine instances of the file on any endpoints in your organization that the service has already seen it on -> Answer C is not correct. Application Control – Blocked Applications A blocked applications list is composed of files that you do not want to allow users to execute but do not want to quarantine. You may want to use this for files you are not sure are malware, unauthorized applications, or you may want to use this to stop applications with vulnerabilities from executing until a patch has been released. passyourccie@gmail.com Reference: https://docs.amp.cisco.com/en/SecureEndpoint/Secure%20Endpoint%20User%20Guid e.pdf Question 39 Which feature does the IaaS model provide? A. B. C. D. granular control of data software-defined network segmentation dedicated, restricted workstations automatic updates and patching of software Answer: C Explanation In the infrastructure-as-a-service (IaaS) model, the subscriber leases just the hardware infrastructure (networking, data center space, storage, servers, and virtualization services), but establishes and maintains all other components of the technology stack (applications, data, runtime, middleware, operating systems, etc.). ====Question 40 Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists? A. B. C. D. VMware APIC VMware vRealize VMware fusion VMware horizons Answer: B Question 41 Which two capabilities does an MDM provide? (Choose two) A. delivery of network malware reports to an inbox in a schedule B. unified management of mobile devices, Macs, and PCs from a centralized dashboard C. enforcement of device security policies from a centralized dashboard D. manual identification and classification of client devices E. unified management of Android and Apple devices from a centralized dashboard Answer: B C Question 42 What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two) A. Use intrusion prevention system. B. Block all TXT DNS records. C. Enforce security over port 53. D. Use next generation firewalls. E. Use Cisco Umbrella. Answer: C E Question 43 In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two) passyourccie@gmail.com A. It prevents use of compromised accounts and social engineering. B. It prevents all zero-day attacks coming from the Internet. C. It automatically removes malicious emails from users’ inbox. D. It prevents trojan horse malware using sensors. E. It secures all passwords that are shared in video conferences. Answer: B C Question 44 Which capability is provided by application visibility and control? A. reputation filtering B. data obfuscation C. data encryption D. deep packet inspection Answer: D Question 45 An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability? A. EAPOL B. SSH C. RADIUS D. TACACS+ Answer: D Question 46 Drag and drop the deployment models from the left onto the explanations on the right. Answer: + + + + A GRE tunnel is utilized in this solution: passive with ERSPAN Attacks are not prevented with this solution: passive This solution allows inspection between hosts on the same subnet: transparent This solution does not provide filtering between hosts on the same subnet: routed Explanation Monitoring (passive) mode is the mode where the Cisco NGFW or NGIPS device does not usually prevent attacks. The device uses one interface to silently inspect traffic and identify malicious activity without interrupting traffic flow. passyourccie@gmail.com Passive with ERSPAN Mode: You can configure one physical interface operating as a sniffer – very similar to a traditional remote intrusion detection system (IDS). A Generic Routing Encapsulation (GRE) tunnel between the capture point and the Cisco FTD carries the packets to be inspected. Reference: CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide Question 47 When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources? A. B. C. D. CDP NTP syslog DNS Answer: B Question 48 What is the difference between EPP and EDR? A. EPP focuses primarily on threats that have evaded front-line defenses that entered the environment. B. Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats. C. EDR focuses solely on prevention at the perimeter. D. Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior. Answer: D Explanation EPP (Endpoint Protection Platform) covers traditional anti-malware scanning, whereas EDR (Endpoint Detection and Response) covers some more advanced capabilities like detecting and investigating security incidents, and ability to remediate endpoints to pre-infection state. Refefence: https://www.sans.org/webcasts/epp-edr-both-choose-generation-endpoint-security109470/ EDR focuses primarily on threats that have evaded front-line defenses and entered into your environment. An endpoint protection platform, however, focuses solely on prevention -> Answer A and answer C are not correct. An EPP can often be described as a traditional anti-virus solution. While deploying an anti-virus solution will improve your front-line security, it does not protect your endpoints from more sophisticated threats that may find a way into your network. Endpoint security solutions should have endpoint protection platform capabilities, but they must also have the capabilities of an endpoint detection and response solution -> Answer B is not correct. Reference: https://www.cisco.com/c/en/us/products/security/what-is-endpoint-protectionplatform.html Question 49 An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices? A. ntp server 192.168.1.110 key 1 prefer B. ntp peer 192.168.1.110 prefer key 1 passyourccie@gmail.com C. ntp server 192.168.1.110 primary key 1 D. ntp peer 192.168.1.110 key 1 primary Answer: A Explanation A router can be configured to prefer an NTP source over another. A preferred server’s responses are discarded only if they vary dramatically from the other time sources. Otherwise, the preferred server is used for synchronization without consideration of the other time sources. Preferred servers are usually specified when they are known to be extremely accurate. To specify a preferred server, use the prefer keyword appended to the ntp server command. Question 50 Which algorithm is an NGE hash function? A. B. C. D. HMAC SHA-1 MD5 SHA-2 Answer: D Question 51 A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations? A. B. C. D. file prevalence file discovery file conviction file manager Answer: A Explanation Prevalence: AMP displays all files that are running across your organization, ordered by prevalence (from lowest to highest number of instances), to help you surface previously undetected threats seen by a small number of users. Files opened by only a few users may be malicious. Reference: https://cstor.com/wp-content/uploads/2016/10/Cisco_Advanced-Malware-Protectionfor-Endpoints_Data-Sheet.pdf passyourccie@gmail.com Question 52 During a recent security audit, a Cisco IOS router with a working IPSEC configuration using IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command. The VPN peer is a SOHO router with a dynamically assigned IP address. Dynamic DNS has been configured on the SOHO router to map the dynamic IP address to the host name of vpn.sohoroutercompany.com. In addition to the command crypto isakmp key Cisc123456789 hostname vpn.sohoroutercompany.com, what other two commands are now required on the Cisco IOS router for the VPN to continue to function after the wildcard command is removed? (Choose two) A. ip host vpn.sohoroutercompany.com <VPN Peer IP Address> B. crypto isakmp identity hostname C. Add the dynamic keyword to the existing crypto map command D. fqdn vpn.sohoroutercompany.com <VPN Peer IP Address> E. ip name-server <DNS Server IP Address> Answer: A B Explanation passyourccie@gmail.com The command “crypto isakmp identity hostname” configures the identity of the ISAKMP peer to the host name concatenated with the domain name (fully qualified domain name for example, myhost.domain.com). If you use the host name identity method, you may need to specify the host name for the remote peer if a DNS server is not available for name resolution. An example of this follows: RouterA(config)# ip host RouterB.domain.com 172.30.2.2 Reference: https://www.ccexpert.us/bcran/step-3configure-isakmp-identity.html Question 53 Which command is used to log all events to a destination collector 209.165.201.10? A. B. C. D. CiscoASA(config-pmap-c)# flow-export event-type all destination 209.165.201.10 CiscoASA(config-cmap)# flow-export event-type flow-update destination 209.165.201.10 CiscoASA(config-pmap-c)# flow-export event-type flow-update destination 209.165.201.10 CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.10 Answer: A Explanation This example shows how to configure NetFlow for ASA: ASA(config)# access-list netflow-export extended permit ip any any ASA(config)# flow-export destination inside 172.16.1.100 9996 ASA(config)# flow-export template timeout-rate 1 ASA(config)# flow-export delay flow-create 60 ASA(config)# class-map netflow-export-class ASA(config-cmap)#match access-list netflow-export ASA(config)#policy-map global_policy ASA(config-pmap)# class netflow-export-class ASA(config-pmap-c)# flow-export event-type all destination 172.16.1.100 //export all event log types to 172.16.1.100 Question 54 A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two) A. using Cisco ISE B. using Cisco FTD C. using an inline IPS/IDS in the network D. using Cisco ESA E. using Cisco Umbrella Answer: D E Explanation The following are the benefits of deploying Cisco Advanced Phishing Protection on the Cisco Email Security Gateway (ESA): Prevents the following: + Attacks that use compromised accounts and social engineering. + Phishing, ransomware, zero-day attacks and spoofing. + BEC with no malicious payload or URL. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa135/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations – before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent. passyourccie@gmail.com Question 55 Which feature is used in a push model to allow for session identification, host reauthentication, and session termination? A. B. C. D. CoA request AAA attributes carrier-grade NAT AV pair Answer: A Explanation The Cisco software supports the RADIUS CoA request defined in RFC 5176 that is used in a pushed model, in which the request originates from the external server to the device attached to the network, and enables the dynamic reconfiguring of sessions from external authentication, authorization, and accounting (AAA) or policy servers. Use the following per-session CoA requests: – – – – – Session reauthentication Session termination Session termination with port shutdown Session termination with port bounce Security and Password Accounting Question 56 What are the components of endpoint protection against social engineering attacks? A. B. C. D. firewall IDS IPsec ESA Answer: D Question 57 A company recently discovered an attack propagating throughout their Windows network via a file named abc4350G8l99xyz.exe. The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list. Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise. What must be performed to ensure detection of the malicious file? A. Upload the malicious file to the Blocked Application Control List B. Use an Advanced Custom Detection list instead of a Simple Custom Detection List C. Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis D. Upload the SHA-256 hash for the file to the Simple Custom Detection List Answer: D Explanation We can upload the SHA-256 hash of this file to the Simple Customer Detection List so that AMP for Endpoints can block it. Reference: https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/215176configure-a-simple-custom-detection-list.pdf Question 58 passyourccie@gmail.com Which feature requires that network telemetry be enabled? A. B. C. D. SNMP trap notification Layer 2 device discovery central syslog system per-interface stats Answer: C Question 59 Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two) A. posture assessment B. aaa server radius dynamic-author C. tacacs-server host 10.1.1250 key password D. CoA E. aaa authorization exec default local Answer: A C Explanation You can click the Push button to initiate an environment CoA notification after updating multiple SGTs. This environment CoA notification goes to all TrustSec network devices forcing them to start a policy/data refresh request. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/22/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_011000.html Question 60 An engineer must set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simply administration. Which switch port MAC address security setting must be used? A. B. C. D. static sticky maximum aging Answer: B Explanation The full syntax of the second command is: switchport port-security mac-address sticky [MAC] If we don’t specify the MAC address (like in this question) then the switch will dynamically learn the attached MAC Address and place it into your running-configuration. There are too many laptops so we have to let the switch learn the MAC addresses dynamically. Question 61 Refer to the exhibit. passyourccie@gmail.com When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZ_inside zone once the configuration is deployed? A. No traffic will be allowed through to the DMZ_inside zone unless it’s already trusted B. No traffic will be allowed though to the DMZ_inside zone regardless of if it’s trusted or not C. All traffic from any zone will be allowed to the DMZ_inside zone only after inspection D. All traffic from any zone to the DMZ_inside zone will be permitted with no further inspection Answer: D Explanation There are seven different actions which a rule can use: + Allow: Allows traffic. There may yet be more inspections, such as Intrusion and File policies + Trust: Sends traffic straight to the egress interface, without any extra inspections. Identity policies and rate limiting still apply + Monitor: Logs traffic, and continues to the rest of the rules + Block: Drops traffic silently, causing the connection to timeout + Block with reset: Drops traffic, and sends a TCP FIN, so the connection closes rather than times out + Interactive Block: Displays a web page with conditions that users may accept. This is where the Interactive Block Response Page comes into play + Interactive Block with Reset: Combination of interactive block, with a TCP FIN Question 62 What is the concept of CI/CD pipelining? A. Each project phase is independent from other phases to maintain adaptiveness and continual improvement B. The project is split into several phases where one phase cannot start before the previous phase finishes successfully C. The protect code a centrally maintained and each code change should trigger an automated build and test sequence D. The project is split into time-limited cycles and focuses on pair programming for continuous code review Answer: C Explanation Continuous integration (CI) is a software development practice in which developers merge their changes to the main branch many times per day. Each merge triggers an automated code build and test sequence. passyourccie@gmail.com Once we automatically build and test our software, it gets easier to release it. Thus Continuous Integration is often extended with Continuous Delivery (CD), a process in which code changes are also automatically prepared for a release (CI/CD). CI and CD are often represented as a pipeline, where new code enters on one end, flows through a series of stages (build, test, staging, production), and published as a new production release to end users on the other end. Each stage of the CI/CD pipeline is a logical unit in the delivery process. Developers usually divide each unit into a series of subunits that run sequentially or in parallel. Reference: https://semaphoreci.com/continuous-integration Question 63 Which feature only implements on the Cisco ASA in the transparent mode? A. inspect anycast traffic B. stateful inspection C. inspect application layer of the traffic sent between hosts D. inspect traffic between hosts in the same subnet Answer: D Explanation The Cisco ASA software supports two firewall modes, routed and transparent. A transparent firewall is a layer 2 firewall that acts like a stealth firewall and is not seen as a router hop between connected devices. Unlike a traditional deployment of a firewall in routed mode, where the firewall is a routed hop between networks. Question 64 What are two functionalities of SDN southbound APIs? (Choose two) A. Southbound APIs provide a programmable interface for applications to configure the network B. Southbound APIs form the interface between the SDN controller and the network switches and routers C. OpenFlow is a standardized southbound API protocol used between the SDN controller and the switch. D. Application layer programs communicate with the SDN controller through the southbound APIs E. Southbound APIs form the interface between the SDN controller and business applications Answer: B C Explanation OpenFlow and OpFlex are Southbound APIs Southbound APIs ultilize NETCONF, RESTCONF, SNMP, Telnet, SSH… passyourccie@gmail.com ================================== New Questions (added on 7th-Dec2022) ================================== Question 65 An engineer is implementing DHCP security mechanisms and needs the ability to add additional attributes to profiles that are created within Cisco ISE. Which action accomplishes this task ? A. Define MAC-to-lP address mappings in the switch to ensure that rogue devices cannot get an IP address B. Use DHCP option 82 to ensure that the request is from a legitimate endpoint and send the information to Cisco ISE C. Modify the DHCP relay and point the IP address to Cisco ISE. D. Configure DHCP snooping on the switch VLANs and trust the necessary interfaces Answer: C Explanation Under the same interfaces, another ip helper-address command is configured to point to the ISE PSN interface enabled with the DHCP probe. The ISE Policy Service node will not reply to these packets, but the goal is simply to send a copy of the requests to ISE for parsing of DHCP attributes. It is possible to configure multiple IP Helper targets on Cisco devices to allow multiple ISE Policy Service nodes to receive copies of the DHCP requests. Reference: https://community.cisco.com/t5/security-knowledge-base/ise-profiling-designguide/ta-p/3739456#toc-hId-826550277 Question 66 Which Cisco Firewall solution requires zone definition? A. B. C. D. CBAC Cisco AMP ZBFW Cisco ASA Answer: C Explanation Zone Based Firewall (ZBFW) is the most advanced method of a stateful firewall that is available on Cisco IOS routers. The idea behind ZBFW is that we don’t assign access-lists to interfaces but we will create different zones. Interfaces will be assigned to the different zones and security policies will be assigned to traffic between zones. Question 67 For a given policy in Cisco Umbrella, how should a customer block website based on a custom list? A. B. C. D. by specifying blocked domains in the policy settings by specifying the websites in a custom blocked category by adding the websites to a blocked type destination list by adding the website IP addresses to the Cisco Umbrella blocklist Answer: C Explanation A destination list is a list of internet destinations that can be blocked or allowed based on the administrative preferences for the policies applied to the identities within your organization. A destination is a URL or fully qualified domain name. You can add a destination list to Umbrella at any time; however, a destination list does not come into use until it is added to a policy. Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists passyourccie@gmail.com Question 68 What is the concept of CI/CD pipelining? A. The project is split into several phases where one phase cannot start before the previous phase finishes successfully. B. The project code is centrally maintained and each code change should trigger an automated build and test sequence C. The project is split into time-limited cycles and focuses on pair programming for continuous code review D. Each project phase is independent from other phases to maintain adaptiveness and continual improvement Answer: B Explanation CI, short for Continuous Integration, is a software development practice in which all developers merge code changes in a central repository multiple times a day. With CI, each change in code triggers an automated build-and-test sequence for the given project, providing feedback to the developer(s) who made the change. Reference: https://semaphoreci.com/blog/cicd-pipeline Question 69 Which threat intelligence standard contains malware hashes? A. B. C. D. structured threat information expression advanced persistent threat trusted automated exchange or indicator information open command and control Answer: A Explanation Structured Threat Information Expression (STIX) is a standard language for describing cyber threat intelligence in a way that both humans and machines can understand and act upon. STIX describes cyber threats using an extensive set of properties, which include signs of malicious activity (e.g., suspect file hashes, domains, etc.) Reference: https://oasis-open.github.io/ctidocumentation/docs/Introduction_to_Structured_Threat_Information_Expression.pdf Question 70 Which ESA implementation method segregates inbound and outbound email? A. one listener on a single physical interface B. pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address C. pair of logical IPv4 listeners and a pair of IPv6 listeners on two physically separate interfaces D. one listener on one logical IPv4 address on a single logical interface Answer: C Explanation You can segregate incoming and outgoing email traffic over separate listeners and on separate IP addresses. You can use Internet Protocol version 4 (IPv4) and version 6 (IPv6) addresses. However, the System Setup Wizard on the appliance supports initial configuration of the following configurations: passyourccie@gmail.com + 2 separate listeners on 2 logical IPv4 and 2 IPv6 addresses configured on separate physical interfaces … Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa111/user_guide/b_ESA_Admin_Guide_11_1/b_ESA_Admin_Guide_chapter_010.html Question 71 An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal? A. B. C. D. MDA on the router PBR on Cisco WSA WCCP on switch DNS resolution on Cisco WSA Answer: C Question 72 What is a function of Cisco AMP for Endpoints? A. B. C. D. It detects DNS attacks It protects against web-based attacks It blocks email-based attacks It automates threat responses of an infected host Answer: D Question 73 Refer to the exhibit. aaa new-model radius-server host 10.0.0.12 key secret12 What is the result of using this authentication protocol in the configuration? A. B. C. D. The authentication request contains only a username. The authentication request contains only a password. There are separate authentication and authorization request packets. The authentication and authorization requests are grouped in a single packet. Answer: D Question 74 An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints. The configured detection method must work on files of unknown disposition. Which Outbreak Control list must be configured to provide this? A. B. C. D. Blocked Application Simple Custom Detection Advanced Custom Detection Android Custom Detection Answer: C Explanation passyourccie@gmail.com Advanced Custom Detections are like traditional antivirus signatures, but they are written by the user. These signatures can inspect various aspects of a file and have different signature formats. Some of the available signature formats are: – MD5 signatures … Reference: https://cloudmanaged.ca/wp-content/uploads/2020/05/AMP-for-Endpoints-UserGuide.pdf Question 75 With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature? A. B. C. D. 3 5 10 12 Answer: B Explanation The following table shows the IETF attributes that are supported for the RADIUS Change of Authorization (CoA) feature. Attribute Number Attribute Name 24 State 31 Calling-Station-ID 44 Acct-Session-ID 80 MessageAuthenticator 101 Error-Cause Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-1610/sec-usr-aaa-xe-16-10-book/sec-rad-coa.pdf Question 76 Which Cisco ISE feature helps to detect missing patches and helps with remediation? A. B. C. D. posture assessment profiling policy authentication policy enabling probes Answer: A Explanation Posture assessment includes a set of rules in a security policy that define a series of checks before an endpoint is granted access to the network. Posture assessment checks include the installation of operating system patches, host-based firewalls, antivirus and antimalware software, disk encryption, and more. Question 77 passyourccie@gmail.com An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data? A. It can grant third-party SIEM integrations write access to the S3 bucket B. Data can be stored offline for 30 days. C. It is included in the license cost for the multi-org console of Cisco Umbrella D. No other applications except Cisco Umbrella can write to the S3 bucket Answer: A Explanation By having your logs uploaded to an S3 bucket, you can then automatically download logs so that you can keep them in perpetuity in backup storage outside of Umbrella’s data warehouse storage system. Saving to an S3 bucket also gives you the ability to ingest logs through your SIEM or another security tool. This can help you determine if any security events in your Umbrella logs coincide with events in other security tools. Reference: https://docs.umbrella.com/umbrella-user-guide/docs/manage-your-logs#sectionlogging-to-amazon-s3 Question 78 A network engineer is configuring NetFlow top talkers on a Cisco router. Drag and drop the steps in the process from the left into the sequence on the right. Answer: + + + + + Configure ip routing and enable Cisco Express Forwarding: Step 1 Configure the ip flow command on an interface: Step 2 Configure the ip flow-top-talkers command: Step 3 Specify the maximum number of top talkers: Step 4 Set the top-talkers sorting criterion: Step 5 Explanation Before you enable NetFlow and NetFlow Top Talkers, you must: – Configure the router for IP routing – Ensure that one of the following is enabled on your router, and on the interfaces that you want to configure NetFlow on: Cisco Express Forwarding (CEF), distributed CEF, or fast switching This task describes the procedure for configuring the NetFlow Top Talkers feature. Perform the steps in this required task using either the router CLI commands or the SNMP commands to configure the NetFlow Top Talkers feature on the router. SUMMARY STEPS 1. enable 2. configure terminal 3. ip flow-top-talkers passyourccie@gmail.com 4. 5. 6. 7. top number sort-by [bytes | packets] cache-timeout milliseconds end Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf15-mt-book/cfg-nflow-top-talk.html Question 79 What are two functions of IKEv1 but not IKEv2? (Choose two) A. NAT-T is supported in IKEv1 but not in IKEv2. B. With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext C. With IKEv1, mode negotiates faster than main mode D. IKEv1 uses EAP authentication E. IKEv1 conversations are initiated by the IKE_SA_INIT message Answer: B C Explanation Aggressive Mode squeezes the IKE SA negotiation into three packets, with all data required for the SA passed by the initiator. The responder sends the proposal, key material, and ID, and authenticates the session in the next packet. The initiator replies and authenticates the session. Negotiation is quicker, and the initiator and responder ID pass in the clear. Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ikeprotocols/217432-understand-ipsec-ikev1-protocol.html Note: IKEv2 supports EAP authentication whereas IKEv1 does not. The IKE_SA_INIT exchange is the first exchange of an IKEv2 (not IKEv1) activation attempt. Question 80 Which feature must be configured before implementing NetFlow on a router? A. SNMPv3 B. syslog C. VRF D. IP routing Answer: D Question 81 What is the most commonly used protocol for network telemetry? A. B. C. D. SMTP SNMP TFTP NetFlow Answer: D Question 82 An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration. Which solution best meets these requirements? A. B. C. D. Cisco CloudLock Cisco AppDynamics Cloud Monitoring Cisco Umbrella Cisco Stealthwatch passyourccie@gmail.com Answer: D Explanation Stealthwatch provides a consistent experience for detecting threats across private networks and multiple-public clouds such as Microsoft Azure, Amazon Web Services, and Google Public Cloud. Stealthwatch closely monitors the activity of every device on the network and is able to create a baseline of normal behavior. Stealthwatch automatically normalizes traffic events gathered natively from your network telemetry and natively from flow logs generated by your cloud infrastructure, presents with you a single view of the threats across your entire environment. Question 83 In which two customer environments is the Cisco WSAv connector traffic direction method selected? (Choose two) A. Customer owns ASA Appliance and SSL Tunneling is required. B. Customer does not own Cisco hardware and needs Transparent Redirection (WCCP). C. Customer needs to support roaming users. D. Customer owns ASA Appliance and Virtual Form Factor is required. E. Customer does not own Cisco hardware and needs Explicit Proxy. Answer: B D Explanation Reference: https://www.denaliai.com/media/1182/cisco-cloud-web-security_data-sheet.pdf Question 84 What is offered by an EPP solution but not an EDR solution? A. containment B. detection passyourccie@gmail.com C. investigation D. sandboxing Answer: D Explanation An EPP detects malicious activity using several methods: + Signature matching – detecting threats using known malware signatures + Sandboxing – testing for malicious behavior of files by executing them in a virtual environment before allowing them to run + Behavioral analysis – determining the baseline of endpoint behavior and identify behavioral anomalies, although there is no known threat signature + Static analysis – analyzing binaries and searching for malicious characteristics before execution using machine learning algorithms + Allowlisting and denylisting – blocking access or only permitting access to specific IP addresses, URLs, and applications Reference: https://www.exabeam.com/information-security/edr-vs-epp/ In the options above only Sandboxing is a method of EPP. Question 85 Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication? A. B. C. D. Kerberos security solution single-sign on multifactor authentication RADIUS/LDAP authentication Answer: C Question 86 An engineer is configuring Cisco WSA and needs to ensure end clients are protected against DNS spoofing attacks. Which deployment method accomplishes this goal? A. B. C. D. transparent mode Web Cache Communication Protocol explicit forward single context mode Answer: C Explanation In transparent mode, DNS resolution is done by the client but in explicit (forward) proxy mode, DNS resolution is done by WSA. Reference: https://www.youtube.com/watch?v=s8OnuxnUydg (1:20) Question 87 Which Cisco network security device supports contextual awareness? A. B. C. D. ISE Cisco IOS Cisco ASA Firepower Answer: A passyourccie@gmail.com Explanation ISE is designed to provide policy-based, context-aware security for Cisco networks. Reference: https://www.networkworld.com/article/2224784/cisco-looks-to-standardize-contextaware-security.html Question 88 Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two) A. flow-export event-type B. policy-map C. access-list D. flow-export template timeout-rate 15 E. access-group Answer: A B Explanation This example shows how to configure NetFlow for ASA. It logs all events between hosts 209.165.200.224 and hosts 209.165.201.224 to 209.165.200.230, and log all other events to 209.165.201.29: hostname (config)# access-list flow_export_acl permit ip host 209.165.200.224 host 209.165.201.224 hostname (config)# class-map flow_export_class hostname (config-cmap)# match access-list flow_export_acl hostname (config)# policy-map flow_export_policy hostname (config-pmap)# class flow_export_class hostname (config-pmap-c)# flow-export event-type all destination 209.165.200.230 hostname (config-pmap)# class class-default hostname (config-pmap-c)# flow-export event-type all destination 209.165.201.29 hostname (config)# service-policy flow_export_policy global Note: The “flow-export template timeout-rate” (which specifies the time elapsed before the templates are re-sent) is just an optional command The command “flow-export event-type eventtype destination flow_export_host1 [flow_export_host2]” configures a flow-export action. The event_type keyword is the name of the supported event being filtered. The flow_export_host argument is the IP address of a host. The destination keyword is the IP address of the configured collector. The command “policy-map flow_export_policy” defines the policy map to apply flow-export actions to the defined classes. Question 89 What does Cisco ISE use to collect endpoint attributes that are used in profiling? A. B. C. D. probes posture assessment Cisco AnyConnect Secure Mobility Client Cisco pxGrid Answer: A Explanation The profiling service in Cisco Identity Services Engine (ISE) identifies the devices that connect to your network and their location. The endpoints are profiled based on the endpoint profiling policies configured in Cisco ISE. Cisco ISE then grants permission to the endpoints to access the resources in your network based on the result of the policy evaluation. passyourccie@gmail.com Network probe is a method used to collect an attribute or a set of attributes from an endpoint on your network. The probe allows you to create or update endpoints with their matched profile in the Cisco ISE database. Cisco ISE can profile devices using a number of network probes that analyze the behavior of devices on the network and determine the type of the device. Network probes help you to gain more network visibility. Reference: https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/ security/ise/26/admin_guide/b_ise_admin_guide_26/b_ise_admin_guide_26_chapter_010100.html.xml Question 90 Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack? A. Link Aggregation B. Reverse ARP C. private VLANs D. Dynamic ARP Inspection Answer: D Explanation Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. Dynamic ARP inspection determines the validity of packets by performing an IP-to-MAC address binding inspection stored in a trusted database, (the DHCP snooping binding database) before forwarding the packet to the appropriate destination. DAI allows a network administrator to intercept, log, and discard ARP packets with invalid MAC address to IP address bindings. This capability protects the network from certain “man-in-themiddle” attacks. Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/25ew/configuration/guide/conf/dynarp.html Question 91 Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right. Answer: + location-independent, bandwidth-efficient option: ISR with CWS connector + extends identity information and on-premises features to the cloud: WSAv with CWS connector + provides user-group granularity and supports cloud-based scanning: NGFW with CWS connector passyourccie@gmail.com + supports cached credentials and makes directory information available off-premises: Cisco AnyConnect client Question 92 An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this? A. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI. B. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI. C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI D. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI. Answer: C Explanation Cisco Email Security appliance now supports two-factor authentication that ensures secure access when you log into your appliance. You can configure two-factor authentication for your appliance through any standard RADIUS server that complies with a standard RFC. If you have enabled two-factor authentication on your appliance, you can join it to a cluster machine using pre-shared keys. Use the clusterconfig > prepjoin command in the CLI to configure this setting. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa110/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.pdf Question 93 Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files? A. B. C. D. Configure an advanced custom detection list Configure an IP Block & Allow custom detection list Configure an application custom detection list Configure a simple custom detection list Answer: A Explanation Advanced Custom Detections are like traditional antivirus signatures, but they are written by the user. These signatures can inspect various aspects of a file and have different signature formats. Some of the available signature formats are: – MD5 signatures … Reference: https://cloudmanaged.ca/wp-content/uploads/2020/05/AMP-for-Endpoints-UserGuide.pdf -> Therefore we can upload specific MD5 signatures to quarantine the files. Question 94 An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task? passyourccie@gmail.com A. B. C. D. Use DNSSEC between the endpoints and Cisco Umbrella DNS servers. Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones. Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional. Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers. Answer: D Question 95 Which Cisco security solution secures public, private, hybrid, and community clouds? A. B. C. D. Cisco ISE Cisco ASAv Cisco Cloudlock Cisco pxGrid Answer: C Question 96 What is the target in a phishing attack? A. B. C. D. perimeter firewall IPS web server endpoint Answer: D Question 97 Which Cisco security solution provides patch management in the cloud? A. B. C. D. Cisco Umbrella Cisco ISE Cisco CloudLock Cisco Tetration Answer: C passyourccie@gmail.com PART-2 Question 1 Which function is performed by certificate authorities but is a limitation of registration authorities? A. B. C. D. CRL publishing verifying user identity certificate re-enrollment accepts enrollment requests Answer: A Explanation A Registration Authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the Certificate Authority (CA) to issue it. RAs are part of a public key infrastructure (PKI), a networked system that enables companies and users to exchange information and money safely and securely. Certificate revocation list (CRL): This is a list of certificates, based on their serial numbers, that had initially been issued by a CA but have since been revoked and as a result should not be trusted. Question 2 Which encryption algorithm provides highly secure VPN communications? A. B. C. D. DES 3DES AES 256 AES 128 Answer: C Question 3 A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem? A. B. C. D. Cisco NGFW Cisco AMP for Endpoints Cisco Duo Cisco AnyConnect Answer: C Question 4 How does a WCCP-configured router identify if the Cisco WSA is functional? A. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router. B. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the WSA. C. The router sends a Here-I-Am message every 10 seconds, and the WSA acknowledges with an I-See-You message. D. The WSA sends a Here-I-Am message every 10 seconds, and the router acknowledges with an I-See-You message. Answer: D Explanation passyourccie@gmail.com If WCCP proxy health checking is enabled, the WSA’s WCCP daemon sends a proxy health check message (xmlrpc client request) to the xmlrpc server running on the Web proxy every 10 seconds. If the proxy is up and running, the WCCP service receives a response from the proxy and the WSA sends a WCCP “here I am” (HIA) message to the specified WCCP-enabled routers every 10 seconds. If the WCCP service doesn’t receive a reply from the proxy, then HIA messages are not sent to the WCCP routers. After a WCCP router misses three consecutive HIA messages, the router removes the WSA from its service group and traffic is no longer forwarded to the WSA. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa110/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_0111.html Question 5 What is a feature of NetFlow Secure Event Logging? A. B. C. D. It exports only records that indicate significant events in a flow. It supports v5 and v8 templates. It filters NSEL events based on the traffic and event type through RSVP. It delivers data records to NSEL collectors through NetFlow over TCP only. Answer: A Explanation The ASA and ASASM implementations of NSEL provide a stateful, IP flow tracking method that exports only those records that indicate significant events in a flow -> Answer A is correct. The ASA and ASASM implementations of NSEL provide the following major functions: … + Tracks configured NSEL collectors and delivers templates and data records to these configured NSEL collectors through NetFlow over UDP only -> Answer D is not correct. + Filters NSEL events based on the traffic and event type through Modular Policy Framework, then sends records to different collectors -> Answer C is not correct. Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/asdm71/general/asdm_71 _general_config/monitor_nsel.pdf Only NSEL version 9 supports templates -> Answer B is not correct. Question 6 An administrator needs to configure the Cisco ASA via ASDM such that the network management system can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration? (Choose two) A. Specify the SNMP manager and UDP port. B. Specify a community string. C. Add an SNMP USM entry. D. Add an SNMP host access entry. E. Specify an SNMP user group. Answer: A D Explanation passyourccie@gmail.com This is how to configure SNMP on your Cisco ASA using ASDM: The first order of business is to navigate to the screen shown below: Next, click on the Add button above and the window below appears: Question 7 Which technology enables integration between Cisco ISE and other platforms to gather and share network and vulnerability data and SIEM and location information? A. pxGrid B. SNMP C. NetFlow D. Cisco Talos passyourccie@gmail.com Answer: A Explanation Cisco ISE uses Cisco Platform Exchange Grid (pxGrid) technology to share contextual data with leading SIEM and TD partner solutions. Reference: https://www.cisco.com/c/en/us/products/collateral/security/identity-servicesengine/at-a-glance-c45-732858.html Question 8 A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco security appliance meets these requirements? A. B. C. D. Cisco Cloud Orchestrator Cisco Stealthwatch Cloud Cisco ASAv Cisco WSAv Answer: C Question 9 What is a benefit of using Cisco Tetration? A. It collects policy compliance data and process details. B. It collects telemetry data from servers and then uses software sensors to analyze flow information. C. It collects near-real time data from servers and inventories the software packages that exist on servers D. It collects enforcement data from servers and collects interpacket variation. Answer: C Explanation Cisco Secure Workload (formerly Tetration) collects packet header metadata, process details and installed software package information. This is collected via the software sensors deployed on the workloads and made available as part of the solution. More detailed information is available in the Cisco Secure Workload product documentation. Below are the high-level details regarding the telemetry data that is collected by Cisco Secure Workload: + Flow information: Contains details about flow endpoints, protocols, and ports, when the flow started, how long the flow was active, etc. + Inter-packet variation: Captures any inter-packet variations seen within the flow, including variations in the packetʼs Time to Live (TTL), IP/TCP flags, packet length, etc. + Process details: Captures processes executed on the server, including information about process parameters, start and stop time, process binary hash, etc. + Software packages: Inventory of all software packages installed on the server along with the version and publisher information + Cisco Secure Workload forensics capability: If a customer turns on the Cisco Secure Workload forensics capability, additional Personally Identifiable Information may be collected. Reference: https://trustportal.cisco.com/c/dam/r/ctp/docs/privacydatasheet/security/ciscotetration-privacy-data-sheet.pdf Question 10 Which standard is used to automate exchanging cyber threat information? A. IoC B. TAXII passyourccie@gmail.com C. MITRE D. STIX Answer: B Explanation Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Intelligence Information (TAXII) are standards developed in an effort to improve the prevention and mitigation of cyber-attacks. STIX states the “what” of threat intelligence, while TAXII defines “how” that information is relayed. Unlike previous methods of sharing, STIX and TAXII are machine-readable and therefore easily automated. TAXII should be the best answer here because it is Trusted Automated Exchange of Intelligence Information. Question 11 Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud? A. Cisco Encrypted Traffic Analytics B. Cisco CTA C. Cisco Umbrella D. Cisco Stealthwatch Answer: D Question 12 An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first? A. IP Reputation Filtering B. Anti-Virus Filtering C. File Analysis D. Intelligent Multi-Scan Answer: D Explanation For graymail detection, anti-spam scanning must be enabled globally. This can be either the IronPort Anti-Spam, the Intelligent Multi-Scan feature, or Outbreak Filters. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa120/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_chapter_01101.html Question 13 Drag and drop the exploits from the left onto the type of security vulnerability on the right. passyourccie@gmail.com Answer: path transversal: gives unauthorized access to web server files cross-site request forgery: makes the client the target of attack SQL injection: accesses or modifies application data buffer overflow: causes memory access errors Explanation The directory traversal/path traversal attack (also known as dot dot slash attack) is an HTTP exploit that allows an attacker to access restricted files, directories and commands that reside outside the web server’s root directory. Question 14 Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection, enabling the platform to identify and output various applications within the network traffic flows? A. B. C. D. Cisco ASAv Cisco Prime Infrastructure Cisco NBAR2 Account on Resolution Answer: C Explanation Operating on Cisco IOS and Cisco IOS XE, NBAR2 utilizes innovative deep packet inspection (DPI) technology to identify a wide variety of applications within the network traffic flow, using L3 to L7 data. Reference: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/avc/guide/avc-userguide/avc_tech_overview.pdf Question 15 An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD. The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose? A. Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not. B. Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not. C. Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not. D. Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not. Answer: B Explanation Firepower Management Center Configuration Guide … Interactive Block Response Page: Warns users, but also allows them to click a button (or refresh the page) to load the originally requested site. Users may have to refresh after bypassing the response page to load page elements that did not load. Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fp mc-config-guide-v62/http_response_pages_and_interactive_blocking.html Question 16 passyourccie@gmail.com An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway. The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of certificate should be presented to the end-user to accomplish this goal? A. B. C. D. third-party SubCA self-signed organization owned root Answer: D Explanation The SSL Decryption feature does require the root certificate be installed. Reference: https://community.cisco.com/t5/security-blogs/cisco-umbrella-intelligent-proxy-andssl-decryption/ba-p/4453056 Question 17 Which two parameters are used to prevent a data breach in the cloud? (Choose two) A. encryption B. complex cloud-based web proxies C. strong user authentication D. antispoofing programs E. DLP solutions Answer: A C Explanation A data breach is a security violation or incident that leads to the theft of sensitive or critical data or its exposure to an unauthorized party. These incidents can be intentional, such as a database hack, or accidental, such as an employee emailing confidential files to the wrong recipient. Two-factor authentication and secure access solutions for cloud apps make it more difficult for malicious hackers or insiders to compromise users, including those who work remotely or on a contract basis -> Answer C is correct. Reference: https://www.cisco.com/c/en/us/products/security/what-is-data-breach.html#~how-toprevent-a-breach In the Data Breaches in Cloud Computing article, encryption is one of the top five methods to prevent data breach in the cloud -> Answer A is correct. Question 18 What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest access, and the same guest portal is used as the BYOD portal? A. B. C. D. streamlined access multichannel GUI single-SSID BYOD dual-SSID BYOD Answer: D Explanation If guest access is utilizing one of the named guest account, then same guest portal can be used for employee BYOD portal. This flow is called Dual-SSID BYOD, where the endpoint is associated to a provisioning WLAN which is typically shared with guest access. passyourccie@gmail.com Reference: https://community.cisco.com/t5/security-documents/ise-byod-dual-vs-single-ssidonboarding/ta-p/3641422 Question 19 What is the function of the crypto isakmp key cisc414685095 address 192.168.50.1 255.255.255.255 command when establishing an IPsec VPN tunnel? A. B. C. D. It prevents 192.168.50.1 from connecting to the VPN server. It defines that data destined to 192.168.50.1 is going to be encrypted. It configures the pre-shared authentication key for host 192.168.50.1. It configures the local address for the VPN server 192.168.50.1. Answer: C Explanation Note: + “address 192.168.60.1 255.255.255.255” means remote peer is host 192.168.50.1 + The Phase 1 password is “cisc414685095”. Question 20 Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA? A. B. C. D. outbreakconfig websecurityadvancedconfig webadvancedconfig websecurityconfig Answer: B Explanation Enabling URL filtering support for shortened URLs is able to be done by CLI only, using websecurityadvancedconfig Reference: https://www.cisco.com/c/en/us/support/docs/security/email-securityappliance/118775-technote-esa-00.html Question 21 Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network? A. B. C. D. single context mode routed mode transparent mode multiple context mode Answer: C Explanation An ASA Firewall is capable of operating at Layer 2 when running in transparent mode. Ability to filter traffic between hosts using higher-level protocols (e.g. IP addressing and ports) without readdressing the network. Reference: https://grumpy-networkersjournal.readthedocs.io/en/latest/VENDOR/CISCO/FIREWALL/ASA/TRANSPARENTFW.html Question 22 passyourccie@gmail.com Which open source tool does Cisco use to create graphical visualizations of network telemetry on Cisco IOS XE devices? A. B. C. D. SNMP Splunk Grafana InfluxDB Answer: C Explanation Visualization with Grafana Grafana is the visualization engine that is used to display the telemetry data. Reference: https://blogs.cisco.com/developer/getting-started-with-model-driven-telemetry Note: InfluxDB is used to store the telemetry data. Question 23 Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center? A. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count B. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice/startIndex/recordsToReturn C. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device D. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value&parameter2=value&… Answer: A Explanation Once the developer has the token, it is possible to get the network devices count. DEVICES_COUNT_URL = '/dna/intent/api/v1/network-device/count' response = requests.get(BASE_URL + DEVICES_COUNT_URL, headers = headers, verify=False) print(response.json()) Reference: https://developer.cisco.com/docs/dna-center/#!devices/devices-api Question 24 When NetFlow is applied to an interface, which component creates the flow monitor cache that is used to collect traffic based on the key and nonkey fields in the configured record? A. B. C. D. flow sampler flow exporter records flow monitor Answer: D Explanation The Netflow flow monitor component is used to provide the actual traffic monitoring on a configured interface. When a flow monitor is applied to an interface, a flow monitor cache is created that is used to collect the traffic based on the key and nonkey fields in the configured record. Reference: https://www.ciscopress.com/articles/article.asp?p=1730890 passyourccie@gmail.com Question 25 Refer to the exhibit. ASA# show service-policy sfr Global policy: Service-policy: global_policy Class-map: SFR SFR: card status Up, mode fail-open monitor-only packet input 0, packet output 44715478687, drop 0, reset-drop 0 What are two indications of the Cisco Firepower Services Module configuration? (Choose two) A. The module is operating in IPS mode. B. The module fails to receive redirected traffic. C. Traffic is blocked if the module fails. D. Traffic continues to flow if the module fails. E. The module is operating in IDS mode. Answer: D E Explanation In a passive deployment, a copy of the traffic is sent to the SFR service module, but it is not returned to the ASA. Passive mode allows you to view the actions that the SFR module would have completed in regards to the traffic. It also allows you to evaluate the content of the traffic, without an impact to the network. If you want to configure the SFR module in passive mode, use the monitor-only keyword. If you do not include the keyword, the traffic is sent in inline mode. ciscoasa(config-pmap-c)# sfr fail-open monitor-only Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644configure-firepower-00.html -> This SFR module is configured in passive mode (monitor-only)-> Answer E is correct. In monitor-only mode, the input counters remain at zero. -> Answer B is not correct. The Cisco ASA 5500 security appliance is not just a plain firewall. With an add-on security module (AIP-SSM), you can transform the ASA 5500 into an IDS/IPS sensor as well. The Sensor operates in either “Promiscuous Mode” (IDS functionality) or “Inline Mode” (IPS functionality). In Promiscuous Mode, the sensor does not intervene in traffic flow, but just “sniffs” the traffic that passes through the firewall and takes appropriate actions in the event of an attack -> This module is operating in IDS mode. Reference: https://www.networkstraining.com/cisco-ids-ips-module-for-cisco-asa-firewalls-aipssm/ Question 26 Why is it important for the organization to have an endpoint patching strategy? A. B. C. D. so the organization can identify endpoint vulnerabilities so the network administrator is notified when an existing bug is encountered so the internal PSIRT organization is aware of the latest bugs so the latest security fixes are installed on the endpoints Answer: A passyourccie@gmail.com Question 27 Which system is InfluxDB and Grafana be used on to pull the data and display the visualization information? A. B. C. D. Docker containers Windows Server 2019 specialized Cisco Linux system Windows Server 2016 Answer: C Question 28 Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics? A. B. C. D. routed multiple context cluster transparent Answer: B Explanation Cisco ASA Threat Detection does not support multiple context mode. Reference: https://grumpy-networkersjournal.readthedocs.io/en/latest/VENDOR/CISCO/FIREWALL/ASA/THREATDETECT.html Question 29 Which two parameters are used for device compliance checks? (Choose two) A. device operating system version B. DHCP snooping checks C. Windows registry values D. endpoint protection software version E. DNS integrity checks Answer: A D Question 30 A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0414685095 command and needs to send SNMP information to a host at 10.255.255.1. Which command achieves this goal? A. B. C. D. snmp-server host inside 10.255.255.1 version 3 asmith snmp-server host inside 10.255.255.1 snmpv3 myv7 snmp-server host inside 10.255.255.1 snmpv3 asmith snmp-server host inside 10.255.255.1 version 3 myv7 Answer: A Explanation The command snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0414685095 creates a user name “asmith” and he belongs to group “myv7”. The password for this user is “cisco” and “cisc0414685095” is the shared secret. passyourccie@gmail.com In order to send SNMP information to a remote host, we have to configure the username (not password) in the “snmp-server host …” command. So the command must include “asmith” as the username. And we configure SNMPv3 by using keyword “version 3”, not “snmpv3”. Question 31 An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal? A. B. C. D. two-interface single interface multi-context transparent Answer: A Explanation The Cisco ESA can be deployed in different ways. Similar to the Cisco WSA, the Cisco ESA can be deployed with a single physical interface to filter email to and from your mail servers or in a twointerface configuration. When you configure the Cisco ESA with two interfaces, one interface is used for email transfers to and from the Internet and the other interface is used for email transfers to and from the internal servers. Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide Question 32 A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to ensure that bandwidth is available for VPN users needing access to corporate resources on the 10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the network? A. B. C. D. Configure VPN load balancing to send non-corporate traffic straight to the internet. Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only. Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network. Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network. Answer: B Question 33 Which benefit does DMVPN provide over GETVPN? A. B. C. D. DMVPN can be used over the public Internet, and GETVPN requires a private network DMVPN is a tunnel-less VPN, and GETVPN is tunnel-based. DMVPN supports QoS, multicast, and routing, and GETVPN supports only QoS. DMVPN supports non-IP protocols, and GETVPN supports only IP protocols. Answer: A Explanation DMVPN, FlexVPN and GETVPN comparison: passyourccie@gmail.com Note: GETVPN is tunnel-less VPN while DMVPN is tunnel-based. Question 34 Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container? A. Docker B. SDLC C. Lambda D. Contiv Answer: D Explanation Contiv is an Open Source Project to deliver Policy-Based container for Networking. The idea behind Contiv is to make it easier for end users to deploy micro-services in their environments. Contiv provides a higher level of networking abstraction for microservices. Contiv secures your application using a rich policy framework. It provides built-in service discovery and service routing for scale out services. Reference: http://contiv.ciscolive.com/pod5/Intro/contiv_intro Question 35 An engineer needs to configure an access control policy rule to always send traffic for inspection without using the default action. Which action should be configured for this rule? A. monitor B. allow C. trust D. block Answer: B Explanation Monitor evaluates traffic first. Monitor rules track and log network traffic. The system continues to match traffic against additional rules to determine whether to permit or deny it. -> Therefore monitor rule still uses other rules below, including the default action. For Allow rule, matching traffic is allowed; however, prohibited files, malware, intrusions, and exploits within that traffic are detected and blocked. Remaining non-prohibited, non-malicious passyourccie@gmail.com traffic is allowed to its destination, though it is still subject to identity requirements and rate limiting. You can configure Allow rules that perform only file inspection, or only intrusion inspection, or neither. Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fp mc-config-guide-v61/access_control_rules.html Question 36 Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two) A. uses a static algorithm to determine malicious B. determines if the email messages are malicious C. does a real-time user web browsing behavior analysis D. blocks malicious websites and adds them to a block list E. provides a defense for on-premises email deployments Answer: B E Explanation Benefits of Cisco Advanced Phishing Protection … + Provides another layer of defense to more effectively secure your email environment. -> Answer E is correct + Automatically remove malicious emails from the recipient’s inbox and calls out identity deception techniques to prevent wire fraud or other advanced attacks. -> Answer B is correct. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa135/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html Question 37 What are two things to consider when using PAC files with the Cisco WSA? (Choose two) A. If the WSA host port is changed, the default port redirects web traffic to the correct port automatically B. The WSA hosts PAC files on port 6001 by default. C. PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host. D. By default, they direct traffic through a proxy when the PC and the host are on the same subnet E. The WSA hosts PAC files on port 9001 by default. passyourccie@gmail.com Answer: C E Explanation By default, the proxy PAC file would be hosted on port 9001. When using WSA to host PAC files, by default, we need to point the browser to the following location http://WSA_IP:9001/pacfile.pac -> Answer B is not correct while answer E is correct. The PAC file checks the local IP subnet address of the PC and then makes a decision based on IF / ELSE statement/s -> Answer C is correct. If the default port is changed in the PAC file hosting settings, then we would need to change the port accordingly in the above URL -> Answer A is not correct. Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118082qanda-wsa-00.html Question 38 When implementing transparent user identification for single sign-on with Internet Explorer, how is the redirect hostname configured? A. B. C. D. as an IP address as a FQDN as a distinguished name as a short host name Answer: D Explanation Configuring Single-Sign-on Obtaining credentials transparently facilitates a single-sign-on environment. Transparent user identification is an authentication realm setting. For Internet Explorer, be sure the Redirect Hostname is the short host name (containing no dots) or the NetBIOS name rather than a fully qualified domain. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa110/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html Question 39 What kind of service that user can access to web application that managed, updated, maintained by service provider? A. B. C. D. IaC IaaS PaaS SaaS Answer: D Question 40 What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two) A. Create NTLM or Kerberos authentication realm and enable transparent user identification B. The eDirectory client must be installed on each client workstation C. Deploy a separate eDirectory server; the client IP address is recorded in this server D. Create an LDAP authentication realm and disable transparent user identification E. Deploy a separate Active Directory agent such as Cisco Context Directory Agent passyourccie@gmail.com Answer: A E Explanation Transparently identify users with authentication realms – This option is available when one or more authentication realms are configured to support transparent identification using one of the following authentication servers: Active Directory – Create an NTLM or Kerberos authentication realm and enable transparent user identification. In addition, you must deploy a separate Active Directory agent such as Cisco’s Context Directory Agent. LDAP – Create an LDAP authentication realm configured as an eDirectory, and enable transparent user identification. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa110/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html Question 41 Which technology limits communication between nodes on the same network segment to individual applications? A. B. C. D. serverless infrastructure machine-to-machine firewalling SaaS deployment microsegmentation Answer: D Explanation Micro-segmentation creates secure zones across cloud and data center environments to isolate application workloads from one another and secure them individually. Question 42 Which MDM configuration provides scalability? A. B. C. D. BYOD support without extra appliance or licenses enabling use of device features such as camera use pushing WPA2-Enterprise settings automatically to devices automatic device classification with level 7 fingerprinting Answer: C Explanation Scalable endpoint configuration Systems Manager also makes it easy to define and deploy network settings like wireless connectivity, security settings, and remote VPN access to all devices on your network at once. Instead of manually provisioning devices for network connectivity, or relying on end users to do so, configure settings such as WPA2-Enterprise in the dashboard, and let the cloud push the settings to end-user devices. passyourccie@gmail.com Reference: https://www.cloudwifiworks.com/Solutions-Mobile-Device-Management.asp Question 43 Drag and drop the concepts from the left onto the correct descriptions on the right. Answer: x BYOD: My Devices portal that allows users to register their device posture assessment: Results can have a status of compliant or noncompliant profiling: requires probes to collect attributes of connected endpoints guest services: sponsor portal that is used to gain access to network resources Explanation Posture assessment includes a set of rules in a security policy that define a series of checks before an endpoint is granted access to the network. Posture assessment checks include the passyourccie@gmail.com installation of operating system patches, host-based firewalls, antivirus and antimalware software, disk encryption, and more. -> Posture assessment can be compliant or noncompliant. Cisco Identity Services Engine (Cisco ISE) guest services enable you to provide secure network access to guests such as visitors, contractors, consultants, and customers. Sponsor Accounts: Use the Sponsor portal to create temporary accounts for authorized visitors to securely access your corporate network or the Internet. After creating the guest accounts, you can also use the Sponsor portal to manage these accounts and provide account details to the guests. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/24/admin_guide/b_ISE_admin_guide_24/m_ise_guest.html Question 44 An engineer is configuring device-hardening on a router in order to prevent credentials from being seen if the router configuration was compromised. Which command should be used? A. username < username> password <password> B. username <username> privilege 15 password <password> C. service password-recovery D. service password-encryption Answer: D Question 45 What are two security benefits of an MDM deployment? (Choose two) A. distributed software upgrade B. robust security policy enforcement C. on-device content management D. privacy control checks E. distributed dashboard Answer: B C Question 46 Refer to the exhibit. passyourccie@gmail.com The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally? A. B. C. D. P2 and P3 only P5, P6, and P7 only P1, P2, P3, and P4 only P2, P3, and P6 only Answer: B Explanation In a typical network configuration for DAI, all ports connected to host ports are configured as untrusted, while all ports connected to switches are configured as trusted. With this configuration, all ARP packets entering the network from a given switch will have passed the security check. Configuring interfaces as untrusted when they should be trusted can result in a loss of connectivity. Configuring interfaces to be trusted when they are actually untrusted leaves a security hole in the network. Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/25ew/configuration/guide/conf/dynarp.html Question 47 Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption? A. B. C. D. Cisco Advanced Malware Protection Cisco Stealthwatch Cisco Identity Services Engine Cisco AnyConnect Answer: B Question 48 A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two) A. RADIUS communication must be permitted between the ISE server and the domain controller B. The ISE account must be a domain administrator in Active Directory to perform JOIN operations C. Active Directory only supports user authentication by using MSCHAPv2 D. LDAP communication must be permitted between the ISE server and the domain controller E. Active Directory supports user and machine authentication by using MSCHAPv2 Answer: D E Explanation Cisco ISE supports user and machine authentication and change password against Active Directory using EAP-FAST and PEAP with an inner method of Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2) and Extensible Authentication Protocol-Generic Token Card (EAPGTC) -> Answer C is not correct while answer E is correct. The Active Directory username that you provide while joining to an Active Directory domain should be predefined in Active Directory and should have any one of the following permissions: –Add the workstation to the domain to which you are trying to connect. –On the computer where the Cisco ISE account was created, establish permissions for creating computer objects or deleting computer objects before you join Cisco ISE to the domain. –Permissions for searching users and groups that are required for authentication. passyourccie@gmail.com -> Therefore the ISE account must not be a domain administrator in Active Directory -> Answer B is not correct. Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_id_stores. html ISE will use LDAP, KRB, and MSRBC to communicate with AD during the join/leave and authentication process -> Answer D is correct. Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-servicesengine/215233-identity-service-engine-ise-and-active.html Question 49 Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device? A. B. C. D. CoA-ACK CoA-NAK CoA-MAB CoA-NCL Answer: A Explanation If an authorization state is changed successfully, a positive acknowledgment (ACK) is sent. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15sy/sec-usr-aaa-15-sy-book/sec-rad-coa.html Question 50 What is a feature of container orchestration? A. B. C. D. ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane ability to deploy Kubernetes clusters in air-gapped sites ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane automated daily updates Answer: B Explanation The ability to deploy Kubernetes clusters in air-gapped sites Cisco Container Platform (CCP) tenant images contain all the necessary binaries and don’t need internet access to function. Reference: https://www.cisco.com/c/en/us/products/cloud-systems-management/containerplatform/index.html#~stickynav=3 Question 51 Which metric is used by the monitoring agent to collect and output packet loss and jitter information? A. B. C. D. WSAv performance AVC performance RTP performance OTCP performance Answer: C Explanation passyourccie@gmail.com The monitoring agent collects: – TCP performance metrics such as bandwidth usage, response time, and latency. – RTP performance metrics such as packet loss and jitter. Reference: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/avc/ios15-4-3T-ios-xe313/avc-user-guide-ios15-4-3T-ios-xe3-13.pdf Question 52 Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats? A. B. C. D. Cisco AMP for Endpoints Cisco AnyConnect Cisco Umbrella Cisco Duo Answer: A Question 53 Which two components do southbound APIs use to communicate with downstream devices? (Choose two) A. services running over the network B. external application APIs C. OpenFlow D. applications running over the network E. OpFlex Answer: C E Question 54 Which solution detects threats across a private network, public clouds, and encrypted traffic? A. B. C. D. Cisco Stealthwatch Cisco CTA Cisco Encrypted Traffic Analytics Cisco Umbrella Answer: A Explanation Stealthwatch provides a consistent experience for detecting threats across private networks and multiple-public clouds such as Microsoft Azure, Amazon Web Services, and Google Public Cloud. Stealthwatch closely monitors the activity of every device on the network and is able to create a baseline of normal behavior. Stealthwatch automatically normalizes traffic events gathered natively from your network telemetry and natively from flow logs generated by your cloud infrastructure, presents with you a single view of the threats across your entire environment. Reference: https://blogs.cisco.com/security/cisco-stealthwatch-becomes-the-only-securityanalytics-product-to-detect-threats-across-private-networks-public-clouds-and-encrypted-traffic Question 55 What limits communication between applications or containers on the same node? A. B. C. D. microservicing container orchestration microsegmentation Software-Defined Access passyourccie@gmail.com Answer: C Explanation Microservices are about dissecting applications to smaller units and run those units independently instead of running them in a monolithic application. But this question asks about communication between applications so “microservicing” is not correct. Micro-segmentation is a network security technique that isolates different workloads from one another within a data center. A workload can be broadly defined as the resources and processes needed to run an application. Hosts, virtual machines and containers are a few examples of workloads. Question 56 Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated? A. B. C. D. Cisco Talos Cisco Stealthwatch Cloud Cisco Cloudlock Cisco Umbrella Investigate Answer: C Question 57 What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation? A. B. C. D. container orchestration cloud application security broker compile-time instrumentation continuous integration and continuous deployment Answer: D Question 58 Which type of attack is MFA an effective deterrent for? A. B. C. D. ping of death phishing teardrop syn flood Answer: B Explanation what types of cyberattacks does MFA protect against? + Phishing + Spear phishing + Keyloggers + Credential stuffing + Brute force and reverse brute force attacks + Man-in-the-middle (MITM) attacks Reference: https://www.onelogin.com/learn/mfa-types-of-cyber-attacks Question 59 An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal? passyourccie@gmail.com A. B. C. D. Install the Cisco Umbrella root CA onto the user’s device. Modify the user’s browser settings to suppress errors from Cisco Umbrella. Upload the organization root CA to Cisco Umbrella. Restrict access to only websites with trusted third-party signed certificates. Answer: A Explanation Other features are dependent on SSL Decryption functionality, which requires the Cisco Umbrella root certificate. Having the SSL Decryption feature improves: Custom URL Blocking—Required to block the HTTPS version of a URL. … Umbrella’s Block Page and Block Page Bypass features present an SSL certificate to browsers that make connections to HTTPS sites. This SSL certificate matches the requested site but will be signed by the Cisco Umbrella certificate authority (CA). If the CA is not trusted by your browser, an error page may be displayed. Typical errors include “The security certificate presented by this website was not issued by a trusted certificate authority” (Internet Explorer), “The site’s security certificate is not trusted!” (Google Chrome) or “This Connection is Untrusted” (Mozilla Firefox). Although the error page is expected, the message displayed can be confusing and you may wish to prevent it from appearing. To avoid these error pages, install the Cisco Umbrella root certificate into your browser or the browsers of your users—if you’re a network admin. Reference: https://docs.umbrella.com/deployment-umbrella/docs/rebrand-cisco-certificate-importinformation Question 60 A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic. The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue? A. B. C. D. Resynchronization of NTP is not forced NTP is not configured to use a working server An access list entry for UDP port 123 on the inside interface is missing An access list entry for UDP port 123 on the outside interface is missing Answer: B Question 61 Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling? A. B. C. D. inbound north-south east-west outbound Answer: D Question 62 Which solution should be leveraged for secure access of a CI/CD pipeline? A. B. C. D. SSL WebVPN remote access client Duo Network Gateway Cisco FTD network gateway passyourccie@gmail.com Answer: C Explanation Continuous integration/continuous delivery, known as CI/CD, is a set of processes that help software development teams deliver code changes more frequently and reliably. CI/CD is part of DevOps, which helps shorten the software development lifecycle. Using Cisco Secure Access by Duo will establish user-device trust and highly secure access to applications to help you identify corporate versus personal devices with easy certificate deployment, block untrusted endpoints, and give users secure access to internal applications without using VPNs. Furthermore, Duo Network Gateway provides granular user and endpoint access control to CI/CD applications and infrastructure over HTTPS, SSH and RDP. Reference: https://blogs.cisco.com/developer/cloudnativesecurity01 Also from https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/R6BGArNQ/TECSEC2768.pdf Question 63 Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella? A. DNS tunneling B. DNS flood attack C. cache poisoning D. DNS hijacking Answer: A Question 64 Which system performs compliance checks and remote wiping? A. OTP B. MDM C. AMP D. ISE Answer: B Explanation passyourccie@gmail.com The MDM service usually offers a “corporate wipe”, which only deletes the vendor’s configuration from the device (not the whole device). The user can also remove the files. For example, on an iOS device, the user can go to the Settings > General >Device management window, and click Remove Management. Or the user can go to the MyDevices portal in Cisco ISE and click Corporate Wipe. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/24/admin_guide/b_ISE_admin_guide_24/m_ise_interoperability_mdm.html MDM can also perform periodic compliance check. Question 65 Why is it important to patch endpoints consistently? A. B. C. D. Patching helps to mitigate vulnerabilities. Patching reduces the attack surface of the infrastructure. Patching is required per the vendor contract. Patching allows for creating a honeypot. Answer: A Question 66 What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two) A. It is defined as a Transparent proxy deployment. B. In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy. C. The PAC file, which references the proxy, is deployed to the client web browser. D. It is defined as an Explicit proxy deployment. E. It is defined as a Bridge proxy deployment. Answer: C D Explanation A Proxy Auto-Configuration (PAC) file is a JavaScript function that instructs a browser to forward traffic to a proxy server, instead of directly to the destination server. PAC files are used to support explicit proxy deployments (-> Answer A and answer E are not correct while answer D is correct) in which client browsers are explicitly configured to send traffic to the web proxy. The big advantage of PAC files is that they are usually relatively easy to create and maintain. When a user initiates a browser session, a request is sent to a Proxy server to download the Proxy Auto-Configuration (PAC) file to the client PC -> Answer C is correct. Question 67 How does Cisco Umbrella protect clients when they operate outside of the corporate network? A. B. C. D. by modifying the registry for DNS lookups by using Active Directory group policies to enforce Cisco Umbrella DNS servers by forcing DNS queries to the corporate name servers by using the Cisco Umbrella roaming client Answer: D Explanation Umbrella Roaming is a cloud-delivered security service for Cisco’s next-generation firewall. It protects your employees even when they are off the VPN. Question 68 passyourccie@gmail.com Which function is included when Cisco AMP is added to web security? A. B. C. D. multifactor, authentication-based user identity detailed analytics of the unknown file’s behavior phishing detection on emails threat prevention on an infected endpoint Answer: B Explanation File Sandboxing provides you with the ability to analyze unknown files that are traversing the Cisco Web Security gateway. Reference: https://www.cisco.com/c/dam/global/th_th/assets/docs/seminar/AMP_WSA.pdf Question 69 When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two) A. continuous monitoring of all files that are located on connected endpoints B. macro-based protection to keep connected endpoints safe C. signature-based endpoint protection on company endpoints D. email integration to protect endpoints from malicious content that is located in email E. real-time feeds from global threat intelligence centers Answer: A E Question 70 Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two) A. The latest antivirus updates are applied before access is allowed. B. Assignments to endpoint groups are made dynamically, based on endpoint attributes. C. Patch management remediation is performed. D. A centralized management solution is deployed. E. Endpoint supplicant configuration is deployed. Answer: A C Explanation You can create a patch management remediation, which updates clients with up-to-date file definitions for compliance after remediation. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/24/admin_guide/b_ISE_admin_guide_24/m_client_posture_policies.html Question 71 Why should organizations migrate to a multifactor authentication strategy? A. B. C. D. Single methods of authentication can be compromised more easily than MFA. Biometrics authentication leads to the need for MFA due to its ability to be hacked easily. MFA methods of authentication are never compromised. MFA does not require any piece of evidence for an authentication mechanism. Answer: A Question 72 passyourccie@gmail.com What is the purpose of joining Cisco WSAs to an appliance group? A. B. C. D. All WSAs in the group can view file analysis results It simplifies the task of patching multiple appliances It supports cluster operations to expedite the malware analysis process The group supports improved redundancy Answer: A Explanation You must join all managed appliances to the same appliance group in order to allow all content security appliances in your organization to display detailed results in the cloud about files sent for analysis from any Cisco Email Security appliance or Cisco Web Security appliance in your organization. Reference: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma140/b_sma_admin_guide_14_0/b_NGSMA_Admin_Guide_chapter_0111.html Question 73 Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments? A. B. C. D. Cisco Umbrella Cisco Stealthwatch Cloud Cisco Appdynamics Cisco CloudLock Answer: B Question 74 Which two Cisco ISE components must be configured for BYOD? (Choose two) A. central WebAuth B. local WebAuth C. null WebAuth D. guest E. dual Answer: A D Question 75 Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch? A. B. C. D. inter-EPG isolation intra-EPG isolation inter-VLAN security placement in separate EPGs Answer: B Explanation Intra-EPG Isolation is an option to prevent physical or virtual endpoint devices that are in the same base EPG or uSeg EPG from communicating with each other. By default, endpoint devices included in the same EPG are allowed to communicate with one another. However, conditions exist in which total isolation of the endpoint devices from on another within an EPG is desirable. For passyourccie@gmail.com example, you may want to enforce intra-EPG isolation if the endpoint VMs in the same EPG belong to multiple tenants, or to prevent the possible spread of a virus. Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/3x/virtualization/b_ACI_Virtualization_Guide_3_1_1/b_ACI_Virtualization_Guide_3_1_1_chapter_01 01.html Question 76 In which scenario is endpoint-based security the solution? A. B. C. D. inspecting encrypted traffic device profiling and authorization performing signature-based application control inspecting a password-protected archive Answer: D Question 77 What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two) A. allows developers to create code once and deploy to multiple clouds B. helps maintain source code for cloud deployments C. manages Docker containers D. manages Kubernetes clusters E. creates complex tasks for managing code Answer: A D Question 78 What is the recommendation in a zero-trust model before granting access to corporate applications and resources? A. B. C. D. to use multifactor authentication to use strong passwords to use a wired network, not wireless to disconnect from the network when inactive Answer: A Question 79 An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD. The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose? A. Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not B. Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not. C. Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not D. Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not. Answer: C Question 80 Which IETF attribute is supported for the RADIUS CoA feature? passyourccie@gmail.com A. 81 Message-Authenticator B. 30 Calling-Station-ID C. 42 Acct-Session-ID D. 24 State Answer: D Explanation The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication,authorization,and accounting(AAA)session after it is authenticated.When a policy changes for a user or user group in AAA,administrators can send the RADIUS CoA packets from the AAA server such as a Cisco Secure Access Control Server (ACS) to reinitialize authentication and apply the new policy The following table shows the IETF attributes that are supported for the RADIUS Change of Authorization (CoA) feature. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/xe-1610/sec-usr-aaa-xe-16-10-book/sec-rad-coa.pdf Question 81 Which Cisco cloud security software centrally manages policies on multiple platforms such as Cisco ASA, Cisco Firepower, Cisco Meraki, and AWS? A. Cisco Secureworks B. Cisco Configuration Professional C. Cisco Defense Orchestrator D. Cisco DNAC Answer: C Explanation Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms. Cisco Defense Orchestrator features: …. Management of hybrid environments: Managing a mix of firewalls running the ASA, FTD, and Meraki MX software is now easy, with the ability to share policy elements across platforms. passyourccie@gmail.com Reference: https://www.cisco.com/c/en/us/products/collateral/security/defenseorchestrator/datasheet-c78-736847.html Question 82 Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center? A. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count B. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device C. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value&param eter2=value&…. D. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice/startIndex/recordsToRetur n Answer: A Explanation “/dna/intent/api/v1/network-device/count” Description: Returns the count of network devices based on the filter criteria by management IP address, mac address, hostname and location name. Reference: https://developer.cisco.com/docs/dna-center/#!get-device-count-1 Question 83 What is the difference between a vulnerability and an exploit? A. B. C. D. A vulnerability is a hypothetical event for an attacker to exploit An exploit is a hypothetical event that causes a vulnerability in the network An exploit is a weakness that can cause a vulnerability in the network A vulnerability is a weakness that can be exploited by an attacker Answer: D Explanation A vulnerability is a weakness in a software system. And an exploit is an attack that leverages that vulnerability. Question 84 An administrator needs to configure the Cisco ASA via ASDM such that the network management system can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration? (Choose two) A. Specify the SNMP manager and UDP port. B. Specify an SNMP user group C. Specify a community string. D. Add an SNMP USM entry E. Add an SNMP host access entry Answer: A E Explanation passyourccie@gmail.com This is how to configure SNMP on your Cisco ASA using ASDM: The first order of business is to navigate to the screen shown below: Next, click on the Add button above and the window below appears: Question 85 Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system? A. Cisco Endpoint Security Analytics B. Cisco AMP for Endpoints C. Endpoint Compliance Scanner D. Security Posture Assessment Service Answer: D passyourccie@gmail.com Question 86 When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get? A. B. C. D. guest limited Internet blocked full Internet Answer: C Question 87 Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them? A. B. C. D. Cisco Identity Services Engine Cisco Enterprise Security Appliance Cisco Web Security Appliance Cisco Advanced Stealthwatch Appliance Answer: C Question 88 Which technology provides a combination of endpoint protection endpoint detection, and response? A. B. C. D. Cisco AMP Cisco Talos Cisco Threat Grid Cisco Umbrella Answer: A Question 89 When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy? A. B. C. D. It blocks the request. It applies the global policy. It applies the next identification profile policy. It applies the advanced policy. Answer: B Question 90 Which solution supports high availability in routed or transparent mode as well as in northbound and southbound deployments? A. B. C. D. Cisco FTD with Cisco ASDM Cisco FTD with Cisco FMC Cisco Firepower NGFW physical appliance with Cisco. FMC Cisco Firepower NGFW Virtual appliance with Cisco FMC Answer: B Question 91 passyourccie@gmail.com Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion events that are flagged as possible active breaches? A. B. C. D. retrospective detection elastic search file trajectory indication of compromise Answer: D Explanation Indications of compromise (IoCs): File and telemetry events are correlated and prioritized as potential active breaches. AMP automatically correlates multisource security event data, such as intrusion and malware events, to help security teams connect events to larger, coordinated attacks and also prioritize high-risk events. Reference: https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advancedmalware-protection/solution-overview-c22-734228.html Question 92 Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is authenticated? A. B. C. D. Authorization Accounting Authentication CoA Answer: D Question 93 Which two authentication protocols are supported by the Cisco WSA? (Choose two) A. WCCP B. NTLM C. TLS D. SSL E. LDAP Answer: B E Question 94 Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization? A. B. C. D. RADIUS-based REAP fingerprinting Dynamic ARP Inspection multifactor authentication Answer: D Explanation Credential stuffing is a type of cyberattack in which a cybercriminal uses stolen usernames and passwords from one organization (obtained in a breach or purchased off of the dark web) to access user accounts at another organization. passyourccie@gmail.com How To Prevent Credential Stuffing Attacks Most people know password reuse is unsafe but choose to use the same password on multiple sites anyway because they have roughly 100 passwords to remember. Password managers are an option, but adoption rates are low. So to prevent credential stuffing attacks, it’s up to organizations to take measures — such as removing passwords altogether — to ensure cybercriminals can’t use stolen credentials to access their users’ accounts. Below are several methods for doing so. … Multi-factor authentication (MFA) is a highly effective way to prevent credential stuffing because it requires users to log in with another form of authentication in addition to a username-password combination. For example, this could mean biometric authentication such as a fingerprint, a onetime code sent to a device associated with the user, or an email sent to a secured account — none of which a cybercriminal will have access to. Reference: https://auth0.com/blog/what-is-credential-stuffing/ Question 95 Which baseline form of telemetry is recommended for network infrastructure devices? A. SDNS B. NetFlow C. passive taps D. SNMP Answer: D Question 96 Refer to the exhibit. Consider that any feature of DNS requests, such as the length off the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with? A. Spectre Worm B. Eternal Blue Windows C. Heartbleed SSL Bug D. W32/AutoRun worm Answer: D Question 97 Drag and drop the posture assessment flow actions from the left into a sequence on the right. passyourccie@gmail.com Answer: Step Step Step Step Step 1: 2: 3: 4: 5: Validate user credentials Permit just enough for the posture assessment Check device compliance with security policy Apply updates or take other necessary action Grant appropriate access with compliant device Question 98 Which Cisco WSA feature supports access control using URL categories? A. transparent user identification B. SOCKS proxy services C. web usage controls D. user session restrictions Answer: C Explanation Using policy groups, you can create secure policies that control access to web sites containing questionable content. The sites that are blocked, allowed, or decrypted depend on the categories you select when setting up category blocking for each policy group. To control user access based on a URL category, you must enable Cisco Web Usage Controls. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa117/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html Question 99 What is an advantage of the Cisco Umbrella roaming client? A. the ability to see all traffic without requiring TLS decryption B. visibility into IP-based threats by tunneling suspicious IP connections C. the ability to dynamically categorize traffic to previously uncategorized sites D. visibility into traffic that is destined to sites within the office environment Answer: B Explanation The Umbrella roaming client enables security at the DNS and IP layers, in the cloud, no matter where the endpoint is located. The client simply forwards DNS requests or tunnels suspect IP connections to the Umbrella global network. Reference: https://learn-umbrella.cisco.com/feature-briefs/lightweight-transparent-roaming-client passyourccie@gmail.com Question 100 An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints? A. Configure Dynamic ARP Inspection and add entries in the DHCP snooping database B. Configure DHCP snooping and set an untrusted interface for all clients C. Configure Dynamic ARP Inspection and antispoofing ACLs in the DHCP snooping database D. Configure DHCP snooping and set a trusted interface for the DHCP server Answer: D Explanation Dynamic ARP inspection is a security feature that validates ARP packets in a network. Dynamic ARP inspection determines the validity of packets by performing an IP-to-MAC address binding inspection stored in a trusted database, (the DHCP snooping binding database) before forwarding the packet to the appropriate destination. But this question asks about “prevent malicious DHCP traffic” so DHCP snooping is a better choice. DHCP snooping is a feature which allows a Cisco switch to inspect DHCP traffic traversing a layer two segment and track which IP addresses have been assigned to hosts on which switch ports. We need to set a trusted interface (which is connected to the real DHCP server) because all the interfaces are untrusted by default. Question 101 Refer to the exhibit. What is the result of the Python script? A. It uses the POST HTTP method to obtain a username and password to be used for authentication B. It uses the POST HTTP method to obtain a token to be used for authentication C. It uses the GET HTTP method to obtain a token to be used for authentication D. It uses the GET HTTP method to obtain a username and password to be used for authentication Answer: B Question 102 Which solution stops unauthorized access to the system if a user’s password is compromised? A. VPN B. MFA C. AMP D. SSL Answer: B Question 103 Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering? passyourccie@gmail.com A. B. C. D. filters group key company key connector Answer: D Question 104 Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other interoperable security platforms? A. B. C. D. IEEE IETF NIST ANSI Answer: B Question 105 What is a function of the Layer 4 Traffic Monitor on a Cisco WSA? A. B. C. D. blocks traffic from URL categories that are known to contain malicious content decrypts SSL traffic to monitor for malicious content monitors suspicious traffic across all the TCP/UDP ports prevents data exfiltration by searching all the network traffic for specified sensitive information Answer: C Explanation The Web Security appliance has an integrated Layer-4 Traffic Monitor that detects rogue traffic across all network ports and stops malware attempts to bypass port 80. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa110/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_010110.html Question 106 Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications? A. B. C. D. OWASP Fuzzing Framework Radamsa AFL Answer: A Explanation OWASP secure coding is a set of secure coding best practices and guidelines put out by the Open Source Foundation for Application Security. It outlines both general software security principles and secure coding requirements. Reference: https://snyk.io/learn/secure-coding-practices/ Question 107 What is the process of performing automated static and dynamic analysis of files against preloaded behavioral indicators for threat analysis? passyourccie@gmail.com A. B. C. D. deep visibility scan point-in-time checks advanced sandboxing advanced scanning Answer: C Question 108 Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to the network? A. B. C. D. posture profiler Cisco TrustSec Threat Centric NAC Answer: A Explanation Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the compliance, also known as posture, of endpoints, before allowing them to connect to your network. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/22/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010111.html Question 109 Refer to the exhibit. import requests client_id = ‘a1b2c3d4e5f6g7h8i9j0’ api_key = ‘a1b2c3d4-e5f6-g7h8-i9j0k1l2m3n4o5p6’ What does the API key do while working with https://api.amp.cisco.com/v1/computers? A. B. C. D. displays client ID HTTP authorization Imports requests HTTP authentication Answer: D Explanation Use API keys for APIs and data extraction. API keys authenticate your client application with Cisco GMM and includes an access key ID and a secret access key in place of a username and password. API keys are used by partners who do not have access to the Cisco GMM Cloud Application. For example, use API Keys to: Securely authenticate API calls from external systems Reference: https://developer.cisco.com/docs/GMM/#!generate-api-keys/generate-api-keys Question 110 How does the Cisco WSA enforce bandwidth restrictions for web applications? passyourccie@gmail.com A. It implements a policy route to redirect application traffic to a lower-bandwidth link B. It dynamically creates a scavenger class QoS policy and applies it to each client that connects through the WSA C. It sends commands to the uplink router to apply traffic policing to the application traffic D. It simulates a slower link by introducing latency into application traffic Answer: D Explanation Defining bandwidth limits only throttles the data going to users. It does not block data based on reaching a quota. The Web Proxy introduces latency into each application transaction to mimic a slower link to the server. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa118/user_guide/b_WSA_UserGuide_11_8/b_WSA_UserGuide_11_7_chapter_01111.html Question 111 Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the network? A. B. C. D. Posture Profiling pxGrid MAB Answer: A Question 112 Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint? A. B. C. D. endpoint isolation advanced search advanced investigation retrospective security Answer: D passyourccie@gmail.com Part-3 Question 1 Refer to the exhibit. What does this python script accomplish? A. It lists the LDAP users from the external identity store configured on Cisco ISE B. It authenticates to a Cisco ISE server using the username of ersad C. It allows authentication with TLSv1 SSL protocol D. It authenticates to a Cisco ISE with an SSH connection Answer: A Explanation In this question the username of “ersad” is just an example and it is in the comment section (which is started by a #) so it has no effect on the script. In fact the username will be taken from the second argument of the command. For example, suppose the file name of the above script is “Internal_user.py” then if we call the script with the command: python Internal_user.py 192.168.1.10 digitaltut digitaltutPassWord! Then the username would be “digitaltut”. -> Answer B is not correct. From the line “conn = http.client.HTTPSConnection(“{}:9060″.format(host), context=ssl.SSLContext(ssl.PROTOCOL_TLSv1_2))”, we specify we are using TLS version 1.2 as the channel encryption protocol (not TLSv1) -> Answer C is not correct. Also from the line above, we are using HTTPS to make a request. It is different from a SSH connection so answer D is not correct. passyourccie@gmail.com -> Therefore only answer A is left. Note: The purpose of this Python script is used to get the guest users through ISE External RESTful Services (ERS) API. ERS is designed to allow external clients to perform CRUD (Create, Read, Update, Delete) operations on Cisco ISE resources. Question 2 Refer to the exhibit. ntp authentication-key 10 md5 cisco123 ntp trusted-key 10 A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced. What is the cause of this issue? A. The hashing algorithm that was used was MD5 which is unsupported. B. The key was configured in plain text. C. NTP authentication is not enabled. D. The router was not rebooted after the NTP configuration updated Answer: C Explanation In order to enable NTP, we need an additional command “ntp authenticate”. Question 3 Refer to the exhibit. How does Cisco Umbrella manage traffic that is directed toward risky domains? A. Traffic is managed by the application settings, unhandled and allowed B. Traffic is allowed but logged C. Traffic is managed by the security settings and blocked D. Traffic is proxied through the intelligent proxy Answer: D Explanation passyourccie@gmail.com The ‘greylist’ of risky domains is compromised of domains that host both malicious and safe content—we consider these “risky” domains. These sites often allow users to upload and share content—making them difficult to police, even for the admins of the site. There’s no reason to proxy requests to domains that are already known to be safe or bad. Umbrella’s intelligent proxy only routes the requests for risky domains for deeper inspection -> Answer D is correct. Reference: https://docs.umbrella.com/deployment-msp/docs/what-is-the-intelligent-proxy Question 4 An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN? A. B. C. D. Change the IP address of the new Cisco ISE node to the same network as the others Make the new Cisco ISE node a secondary PAN before registering it with the primary Open port 8905 on the firewall between the Cisco ISE nodes Add the DNS entry for the new Cisco ISE node into the DNS server Answer: D Explanation You can register Cisco ISE nodes to the primary PAN to form a multinode deployment. Nodes in a deployment other than the primary PAN are referred to as secondary nodes. … Ensure that the primary PAN and the node being registered are DNS resolvable to each other. … Step 4. Enter the DNS-resolvable fully qualified domain name (FQDN) of the standalone node that you are going to register (in the format hostname.domain-name, for example, abc.xyz.com). The FQDN of the primary PAN and the node being registered must be resolvable from each other. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/27/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_deployment.html Question 5 Refer to the exhibit. crypto ikev2 name-mangler MANGLER dn organization-unit An engineer is implementing a certificate based VPN. What is the result of the existing configuration? A. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy B. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully C. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER D. The OU of the IKEv2 peer certificate is set to MANGLER Answer: A Question 6 An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements? passyourccie@gmail.com A. B. C. D. Cisco Stealthwatch Cloud Cisco Umbrella NetFlow collectors Cisco Cloudlock Answer: A Question 7 How is data sent out to the attacker during a DNS tunneling attack? A. B. C. D. as part of the UDP’53 packet payload as part of the domain name as part of the TCP/53 packet header as part of the DNS response packet Answer: B Question 8 A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access. The Cisco ESA must also join a cluster machine using preshared keys. What must be configured to meet these requirements? A. Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA CLI B. Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA GUI C. Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA GUI D. Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA CLI Answer: A Explanation You cannot create or join a cluster from the Graphical User Interface (GUI). You must use the Command Line Interface (CLI) to create, join, or configure clusters of machines. Once you have created a cluster, you can change configuration settings from either the GUI or the CLI. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa110/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_0100111.html Cisco ESA does not support TACACS+ server. Question 9 What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems? A. B. C. D. trusted automated exchange Indicators of Compromise The Exploit Database threat intelligence Answer: D Explanation Threat intelligence is referred to as the knowledge about an existing or emerging threat to assets, including networks and systems. Threat intelligence includes context, mechanisms, indicators of compromise (IoCs), implications, and actionable advice. Threat intelligence is referred to as the passyourccie@gmail.com information about the observables, IoCs intent, and capabilities of internal and external threat actors and their attacks. Reference: CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide. Question 10 Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection? A. B. C. D. Cisco Tetration Cisco ISE Cisco AMP for Network Cisco AnyConnect Answer: A Explanation What use cases are supported by the Cisco Secure Workload platform (formerly Tetration)? A. The platform supports the following use cases: … + Process behavior baseline and deviation: Collect the complete process inventory along with the process hash information, baseline the behavior, and identify deviations. + Software inventory and vulnerability detection: Identify all the software packages and versions installed on the servers. Using the Common Vulnerabilities and Exposures (CVE) database and additional data feeds, detect if there are any associated vulnerabilities or exposures and take action to protect against active exploit. Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetrationanalytics/q-and-a-c67-737402.html Question 11 Which portion of the network do EPP solutions solely focus on and EDR solutions do not? A. B. C. D. server farm perimeter core East-West gateways Answer: B Question 12 What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA? A. Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not B. Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco WSA. C. URL categories are updated more frequently on Cisco CWS than they are on Cisco WSA D. Content scanning for SAAS cloud applications is available through Cisco CWS and not available through Cisco WSA Answer: A Explanation Malware can enter the Cisco network when an infected user PC connects over a direct link in the office or a VPN link from a remote location. For these connections, Cisco IT uses the Cisco Web Security Appliance (WSA) to protect the network from malware intrusion. However, WSA protection is not available when a user connects to the Internet directly, without connecting via passyourccie@gmail.com the Cisco network, such as when using a public Wi-Fi service in a coffee shop. In this case, the user’s PC can become infected with malware, which may disrupt the user’s activity, spread to other networks and devices, and present the risk of a data security or privacy breach. Cisco IT uses the Cisco Cloud Web Security (CWS) solution to help protect user PCs from these malware infections. The Cisco CWS solution, previously known as Cisco Scan Safe, enforces secure communication to and from the Internet. It uses the Cisco AnyConnect Secure Mobility Client 3.0 to provide remote workers the same level of security as onsite employees when using a laptop issued by Cisco. Reference: https://www.cisco.com/c/dam/en_us/about/ciscoitatwork/borderless_networks/docs/Cl oud_Web_Security_IT_Methods.pdf Cisco ISR with Cloud Web Security Connector: … Eliminates the need to backhaul Internet traffic from branch offices, so offices can access the web directly, without losing control of or visibility into web usage. Reference: https://www.cisco.com/c/en/us/products/collateral/security/routersecurity/data_sheet_c78-655324.pdf Question 13 An organization wants to improve its cybersecurity processes and to add intelligence to its data. The organization wants to utilize the most current intelligence data for URL filtering, reputations, and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA. What must be done to accomplish these objectives? A. Create a Cisco pxGrid connection to NIST to import this information into the security products for policy use B. Create an automated download of the Internet Storm Center intelligence feed into the Cisco FTD and Cisco WSA databases to tie to the dynamic access control policies. C. Download the threat intelligence feed from the IETF and import it into the Cisco FTD and Cisco WSA databases D. Configure the integrations with Talos Intelligence to take advantage of the threat intelligence that it provides Answer: D Explanation We need an automated solution to deal with the rapid change of cybersecurity so answer A and C are not correct. According to the following facts about Talos, we believe answer D is the best choice: Cisco WSA detects and correlates threats in real time by tapping into the largest threat-detection network in the world, Cisco Talos. To discover where threats are hiding, Cisco Talos pulls massive quantities of information across multiple vectors – firewall, IPS, web, email, and VPN. Cisco Talos constantly refreshes information every 3 to 5 minutes – adding intelligence to and receiving intelligence from Cisco WSA and other network security devices. This enables Cisco WSA to deliver industry-leading defense hours and even days ahead of competitors. Reference: https://www.cisco.com/c/en/us/products/collateral/security/web-securityappliance/solution-overview-c22-732948.html Talos’ threat intelligence supports a two-way flow of telemetry and protection across marketleading security solutions including Next-Generation Intrusion Prevention System (NGIPS), NextGeneration Firewall (NGFW), Advanced Malware Protection (AMP), Email Security Appliance (ESA), Cloud Email Security (CES), Cloud Web Security (CWS), Web Security Appliance (WSA), Umbrella, and ThreatGrid, as well as numerous open-source and commercial threat protection systems. Reference: https://www.talosintelligence.com/docs/Talos_WhitePaper.pdf Question 14 passyourccie@gmail.com Cisco SensorBase gathers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats. Which term describes this process? A. deployment B. consumption C. authoring D. sharing Answer: A Question 15 An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services. They want to use this information for behavior analytics and statistics. Which two actions must be taken to implement this requirement? (Choose two) A. Configure Cisco ACI to ingest AWS information B. Configure Cisco Thousand Eyes to ingest AWS information C. Send syslog from AWS to Cisco Stealthwatch Cloud D. Send VPC Flow Logs to Cisco Stealthwatch Cloud E. Configure Cisco Stealthwatch Cloud to ingest AWS information Answer: D E Question 16 Refer to the exhibit. What will occur when this device tries to connect to the port? A. 802.1X will not work, but MAB will start and allow the device on the network B. 802.1X will not work and the device will not be allowed network access C. 802.1X will work and the device will be allowed on the network D. 802.1X and MAB will both be used and ISE can use policy to determine the access level Answer: C Explanation In this question we don’t see “mab” command so MAC Authentication Bypass (MAB) is not enabled on the interface -> Answer A and answer D are not correct. passyourccie@gmail.com In order to enable 802.1X on a port, we need two commands: + access-session port-control auto: enables 802.1X port-based authentication on the interface + dot1x pae {supplicant | authenticator | both}: sets the Port Access Entity (PAE) type. In this case “authenticator” keyword was chosen so the interface acts only as an authenticator and does not respond to any messages meant for a supplicant.+ authentication periodic: enables reauthentication on the interface We had both of these commands so 802.1X will work on the interface. Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe3se/3850/sec-user-8021x-xe-3se-3850-book/config-ieee-802x-pba.html Other commands are explained below: + authentication host-mode multi-auth: allows voice and multiple endpoints on the same physical access port + dot1x timeout tx-period 10: sets the retransmit period to 10 seconds + device-tracking attach-policy {policy-name}: applies the IP device tracking (IPDT) policy to switchport. The main task is to keep track of connected hosts (association of MAC and IP address) These commands enable the SNMP trap for added and removed MACs on the interface: + snmp trap mac-notification change added + snmp trap mac-notification change removed Question 17 An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1.1.1.1 using the flow record Steathwatch406397954 command. Which additional command is required to complete the flow record? A. B. C. D. transport udp 2055 match ipv4 ttl cache timeout active 60 destination 1.1.1.1 Answer: B Explanation The “transport udp …” command can only be used under flow exporter. The “cache timeout active …” command can only be used under flow monitor. Under flow record, we cannot type “destination 1.1.1.1”. This command can only be used under flow exporter. We can only use the “match ipv4 ttl” command under flow record in this question. Good reference: https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/configtrouble-netflow-stealth.pdf Question 18 An engineer needs to add protection for data in transit and have headers in the email message. Which configuration is needed to accomplish this goal? A. B. C. D. Provision the email appliance Deploy an encryption appliance Map sender IP addresses to a host interface Enable flagged message handling Answer: B Question 19 An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration? passyourccie@gmail.com A. B. C. D. Only requests that originate from a configured NAS IP are accepted by a RADIUS server The RADIUS authentication key is transmitted only from the defined RADIUS source interface RADIUS requests are generated only by a router if a RADIUS source interface is defined Encrypted RADIUS authentication requires the RADIUS source interface be defined Answer: A Explanation The source IP address of the RADIUS packets must match the NAS IP address configured on the RADIUS server. A mismatch leads to RADIUS packet timeout and the server gets marked “DEAD”. Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-basednetworking-services/whitepaper_C11-731907.html Question 20 Refer to the exhibit. interface GigabitEthernet1/0/18 switchport access vlan 41 switchport mode access switchport voice vlan 44 device-tracking attach-policy IPDT_MAX_10 authentication periodic authentication timer reauthenticate server access-session host-mode multi-domain access-session port-control auto dot1x pae authenticator dot1x timeout tx-period 7 dot1x max-reauth-req 3 spanning-tree portfast service-policy type control subscriber POLICY_Gi1/0/18 A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access. Most PCs and IP phones can connect and authenticate using their machine certificate credentials. However printer and video cameras cannot based on the interface configuration provided. What must be to get these devices on to the network using Cisco ISE for authentication and authorization while maintaining security controls? A. B. C. D. Change the default policy in Cisco ISE to allow all devices not using machine authentication Enable insecure protocols within Cisco ISE in the allowed protocols configuration Configure authentication event fail retry 2 action authorize vlan 41 on the interface Add mab to the interface configuration Answer: A Question 21 What is the function of the crypto isakmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel? A. B. C. D. It defines what data is going to be encrypted via the VPN It configures the pre-shared authentication key It prevents all IP addresses from connecting to the VPN server. It configures the local address for the VPN server. Answer: B passyourccie@gmail.com Explanation Note: + “address 0.0.0.0 0.0.0.0” means remote peer is any -> any destination can try to negotiate with this router. + The Phase 1 password is “cisc406397954”. Question 22 An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task? A. Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE B. Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE C. Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO D. Modify the current policy with the condition MFASourceSequence DUO=true in the authorization conditions within Cisco ISE Answer: B Explanation Duo MFA Integration with ISE for TACACS+ Device Administration with Local/Internal (ISE) Users In this setup, ISE will forward the TACACS+ authentication requests to the Duo Authentication proxy. The proxy will then punt the requests back to ISE for local user authentication. This can be a little bit confusing but it is necessary for organizations that want to utilize the local user database on ISE and not relay on external identity sources such as Active Directory, LDAP, etc. If the authentication is successful, the end user/admin will be send a “DUO Push.” If the local ISE authentication fails, then the process will stop and no “Duo Push” will occur. 1. Admin user initiates a shell connection to a network device where he/she uses Active Directory based credentials 2. Network device forwards the request to the TACACS+ server (ISE) 3. ISE sends the authentication request to Duo’s Authentication Proxy 4. The proxy forwards the request back to ISE for the 1st factor authentication 5. ISE informs the Authentication Proxy if the local authentication was successful 6. Upon successful ISE authentication, the Authentication Proxy sends an authentication request to Duo cloud for 2nd factor authentication 7. Duo cloud sends a “push” to the admin user 8. Admin user “approves” the “push” 9. Duo informs the Authentication Proxy of the successful push 10. Authentication proxy informs ISE of a successful Authentication 11. ISE Authorizes the admin user passyourccie@gmail.com Also according to this Cisco link, we need to configure “Identity Source Sequenc” in Cisco ISE: Therefore answer B is the best choice. Question 23 An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment? A. Platform as a Service because the customer manages the operating system B. Infrastructure as a Service because the customer manages the operating system C. Platform as a Service because the service provider manages the operating system D. Infrastructure as a Service because the service provider manages the operating system passyourccie@gmail.com Answer: C Explanation We don’t want to manage the OS so we should choose PaaS or SaaS. But this question only wants to compare between PaaS and IaaS so we must choose PaaS. Question 24 How does a cloud access security broker function? A. It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution B. It integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution C. It acts as a security information and event management solution and receives syslog from other cloud solutions D. It scans other cloud solutions being used within the network and identifies vulnerabilities Answer: B Question 25 A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures. The configuration is created in the simple detection policy section, but it does not work. What is the reason for this failure? A. The administrator must upload the file instead of the hash for Cisco AMP to use B. The MD5 hash uploaded to the simple detection policy is in the incorrect format C. The APK must be uploaded for the application that the detection is intended D. Detections for MD5 signatures must be configured in the advanced custom detection policies Answer: D passyourccie@gmail.com Question 26 What is the difference between a vulnerability and an exploit? A. B. C. D. A vulnerability is a hypothetical event for an attacker to exploit A vulnerability is a weakness that can be exploited by an attacker An exploit is a weakness that can cause a vulnerability in the network An exploit is a hypothetical event that causes a vulnerability in the network Answer: B Explanation A vulnerability is a weakness in a software system. And an exploit is an attack that leverages that vulnerability. Question 27 Which feature is leveraged by advanced antimalware capabilities to be an effective endpoint protection platform? A. B. C. D. big data storm centers sandboxing blocklisting Answer: C Question 28 Which system facilitates deploying microsegmentation and multi-tenancy services with a policybased container? A. B. C. D. SDLC Docker Lambda Contiv Answer: D Explanation Contiv is an open source project that allows you to deploy micro-segmentation policy-based services in container environments. It offers a higher level of networking abstraction for microservices by providing a policy framework. Contiv has built-in service discovery and service routing functions to allow you to scale out services. Reference: https://www.ciscopress.com/articles/article.asp?p=3004581&seqNum=2 Question 29 An engineer integrates Cisco FMC and Cisco ISE using pxGrid. Which role is assigned for Cisco FMC? A. B. C. D. client server publisher controller Answer: C Explanation passyourccie@gmail.com pxGrid stands for Platform Exchange Grid, and it is a technology that allows integrating multiple vendors security products together and grouping them in an ecosystem domain. The main purpose of using pxGrid is to share contextual data between the integrated partners. pxGrid uses a built-in API in ISE and it is comprised of three main components which are the controller, publisher and the subscriber. The controller is the core component to make everything working and as said is going to be ISE. The publisher instead is the partner that has some contextual data to be shared with the other partners. And finally the subscriber is the partner that is interested in parsing some contextual data from the other partners. Reference: https://bluenetsec.com/fmc-pxgrid-integration-with-ise/ In fact, according to figure 6-5 (which is posted below) of this link https://www.ciscopress.com/articles/article.asp?p=2963461&seqNum=2, FMC is a subscriber but we have no such option so the best answer here is “publisher”. Question 30 A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://<FMC IP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue? A. Disable the proxy setting on the browser B. Disable the HTTPS server and use HTTP instead C. Use the Cisco FTD IP address as the proxy server setting on the browser D. Enable the HTTPS server for the device platform policy Answer: D Explanation When you see this HTTP RESPONSE in a packet capture (PCAP), it’s likely that proxy is denying the request. To verify this, get a policy trace, and look for the exact HTTP REQUEST sent by the client, and match it with the policy rules. You will find either a DENY or Denied by Exception result. You can then modify the rule to allow this HTTP REQUEST, if appropriate. passyourccie@gmail.com Reference: https://knowledge.broadcom.com/external/article/167567/why-do-my-pcaps-show-anhttp-response-fr.html Therefore we should modify the policy to allow HTTPS request. Question 31 Which security solution protects users leveraging DNS-layer security? A. B. C. D. Cisco Umbrella Cisco ISE Cisco ASA Cisco FTD Answer: A Question 32 What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router? A. After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses A are permitted in ACL 60 B. After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses C are permitted in ACL 100 C. If four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt D. If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds Answer: D Explanation The following example shows how to configure your router to enter a 100 second quiet period if 15 failed login attempts is exceeded within 100 seconds; all login requests will be denied during the quiet period except hosts from the ACL “myacl.” Router(config)# login block-for 100 attempts 15 within 100 Router(config)# login quiet-mode access-class myacl Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_cfg/configuration/xe16/sec-usr-cfg-xe-16-book/sec-login-enhance.html Question 33 What is an advantage of network telemetry over SNMP pulls? A. B. C. D. scalability security encapsulation accuracy Answer: A Explanation SNMP uses the pull model when retrieving data from a switch. This model cannot scale for today’s high-density platforms, and offers very limited extensibility. The pull model is based on a client sending a request to the switch, then the switch responds to that request. On average, network operators using SNMP poll data every five to thirty minutes. But with today’s speeds and scale that’s not enough to capture important network events. passyourccie@gmail.com … These traditional models also impose limits like scale and efficiency -> So we can deduce network telemetry is more scalable than SNMP pulls. Reference: https://blogs.cisco.com/developer/its-time-to-move-away-from-snmp-and-cli-and-usemodel-driven-telemetry Question 34 What is a benefit of using a multifactor authentication strategy? A. B. C. D. It provides secure remote access for applications It provides an easy, single sign-on experience against multiple applications It protects data by enabling the use of a second validation of identity It provides visibility into devices to establish device trust Answer: C Explanation Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA requires means of verification that unauthorized users won’t have. Note: Single sign-on (SSO) is a property of identity and access management that enables users to securely authenticate with multiple applications and websites by logging in only once with just one set of credentials (username and password). With SSO, the application or website that the user is trying to access relies on a trusted third party to verify that users are who they say they are. Question 35 An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be understood before choosing a solution? A. B. C. D. L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701. GRE over IPsec cannot be used as a standalone protocol, and L2TP can. GRE over IPsec adds its own header, and L2TP does not L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol. Answer: C Explanation L2TP uses UDP port 1701 while GRE use IP protocol 47 -> Answer A is not correct. L2TP stands for Layer 2 Tunneling Protocol while GRE is a simple IP packet encapsulation protocol> Answer D is not correct This Oreilly link says: “It is unlikely that you will set up L2TP as a standalone protocol, as it has no authentication and encryption on its own. The more likely scenario is setting up an L2TP/IPsec tunnel”. So we understand that L2TP can be set up as a standalone protocol, but should not -> Answer B is not correct. The CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide book says “the GRE protocol adds its own header (4 bytes plus options) between the payload (data) and the delivery header” while the entire L2TP packet, including payload and L2TP header, is sent within a User Datagram Protocol (UDP) datagram -> Answer C is correct. Question 36 What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.) A. Southbound APIs are used to define how SDN controllers integrate with applications. B. Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices. C. Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE. passyourccie@gmail.com D. Southbound interfaces utilize device configurations such as VLANs and IP addresses. E. Southbound APIs utilize CLI, SNMP, and RESTCONF. Answer: C E Explanation Northbound APIs are used to define how SDN controllers integrate with applications -> Answer A is not correct. OpenFlow and OpFlex are Southbound APIs -> Answer B is not correct. Southbound APIs ultilize NETCONF, RESTCONF, SNMP, Telnet, SSH… -> Answer D is not correct while answer E is correct. Question 37 Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two) A. Cisco ISEN B. Cisco Umbrella C. Cisco DNA Center D. Cisco TrustSec E. Cisco Duo Security Answer: B E Question 38 A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware Motion. What is a requirement for both physical hosts? A. The hosts must run different versions of Cisco Asyncos B. The hosts must run Cisco AsyncOS 10.0 or greater C. The hosts must have access to the same defined network D. The hosts must use a different datastore than the virtual appliance Answer: C Explanation Requirements: + Both physical hosts must have the same network configuration. + Both physical hosts must have access to the same defined network(s) to which the interfaces on the virtual appliance are mapped. + Both physical hosts must have access to the datastore that the virtual appliance uses. This passyourccie@gmail.com datastore can be a storage area network (SAN) or Network-attached storage (NAS). + The Cisco Secure Email Virtual Gateway must have no mail in its queue. Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/content_security/virtual_applian ces/Cisco_Content_Security_Virtual_Appliance_Install_Guide.pdf Question 39 An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CES addresses. Which DNS record must be modified to accomplish this task? A. CNAME B. МХ C. DKIM D. SPF Answer: B Explanation In order to route inbound email to Cisco CES addresses we must change the MX record. Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2020/pdf/BRKSEC-3433.pdf At this point, you are ready to cut over the domain through a Mail Exchange (MX) record change. Work with your DNS administrator to resolve your MX records to the IP addresses for your Cisco Secure Email Cloud instance as provided in your Cisco Secure Email welcome letter. Reference: https://www.cisco.com/c/en/us/support/docs/security/cloud-email-security/214812configuring-office-365-microsoft-with.html Question 40 passyourccie@gmail.com Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victims web browser executes the code? A. B. C. D. buffer overflow SQL injection browser WGET cross-site scripting Answer: D Question 41 What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two) A. Create an LDAP authentication realm and disable transparent user identification B. Deploy a separate eDirectory server, the client IP address is recorded in this server. C. Create NTLM or Kerberos authentication realm and enable transparent user identification. D. The eDirectory client must be installed on each client workstation E. Deploy a separate Active Directory agent such as Cisco Context Directory Agent. Answer: C E Explanation Consider the following when you identify users transparently using Active Directory: + Transparent user identification with Active Directory works with an NTLM or Kerberos authentication scheme only. You cannot use it with an LDAP authentication realm that corresponds to an Active Directory instance. + Transparent user identification works with the versions of Active Directory supported by an Active Directory agent. Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa110/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html Question 42 Which endpoint solution protects a user from a phishing attack? A. B. C. D. Cisco AnyConnect with Umbrella Roaming Security module Cisco AnyConnect with Network Access Manager module Cisco Identity Services Engine Cisco AnyConnect with ISE Posture module Answer: A Explanation Umbrella Roaming is a cloud-delivered security service for Cisco’s next-generation firewall. It protects your employees even when they are off the VPN. No additional agents are required. Simply enable the Umbrella functionality in the Cisco AnyConnect client. You’ll get seamless protection against malware, phishing, and command-and-control callbacks wherever your users go. Reference: https://www.cisco.com/c/en/us/products/security/umbrella/umbrella-roaming.html Question 43 An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one? A. Configure only the policy with the most recently changed timestamp. B. Make the correct policy first in the policy order. passyourccie@gmail.com C. Configure the default policy to redirect the requests to the correct policy. D. Place the policy with the most-specific configuration last in the policy order. Answer: B Question 44 Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network? A. aaa authorization network default group ise B. aaa authorization exec default ise C. aaa authentication login console ise D. aaa authentication enable default enable Answer: A Explanation + The exhibit in this question shows a a successful MAB authorization for the MAC address (from the line “Status: Authorized” the last line “mab Authc Success”) so we need the keyword “authorization” in our AAA command. + The authorized device is a Microsoft WorkStation so we need the keyword “network” in our AAA command. ->The command “aaa authorization network default group ise” is the correct answer. This command configures network authorization via ISE. passyourccie@gmail.com Question 45 Refer to the exhibit. What is the function of the Python script code snippet for the Cisco ASA REST API? A. deletes a global rule from policies B. obtains the saved configuration of the Cisco ASA firewall C. changes the hostname of the Cisco ASA D. adds a global rule into policies Answer: D Explanation passyourccie@gmail.com Reference: https://github.com/timwukp/Cisco-ASA-RESTAPI/blob/master/POST api_access_global_rules_input_loop.py Question 46 Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration? A. Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked B. Only URLs for botnets with reputation scores of 1-3 will be blocked C. Only URLs for botnets with reputation scores of 3-5 will be blocked D. Only URLs for botnets with a reputation score of 3 will be blocked Answer: B Explanation When you create a rule to Block traffic based on a reputation level, selection of a reputation level also selects all of the reputation levels more severe than the level you originally selected. For example, if you configure a rule to block Benign Sites with security risks (level 3), it also automatically blocks Suspicious sites (level 2) and High risk (level 1) sites. Reference: https://www.cisco.com/c/en/us/support/docs/security/firesight-managementcenter/118852-technote-firesight-00.html Question 47 What are two functionalities of SDN Northbound APIs? (Choose two) A. Northbound APIs provide a programmable interface for applications to dynamically configure the network. B. Northbound APIs form the interface between the SDN controller and business applications. C. Northbound APIs use the NETCONF protocol to communicate with applications. D. Northbound APIs form the interface between the SDN controller and the network switches or routers. E. OpenFlow is a standardized northbound API protocol. Answer: A B Explanation passyourccie@gmail.com Northbound APIs present an abstraction of network functions with a programmable interface for applications to consume the network services and configure the network dynamically -> Answer A is correct. Northbound APIs usually use RESTful APIs to communicate with applications -> Answer C is not correct. Southbound APIs form the interface between the SDN controller and the network switches or routers -> Answer D is not correct. OpenFlow and NETCONF are Southbound APIs used for most SDN implementations -> Answer E is not correct. Question 48 What must be enabled to secure SaaS-based applications? A. two-factor authentication B. end-to-end encryption C. application security gateway D. modular policy framework Answer: A Explanation According to this link, we can use the following to secure SaaS-based applications: + Set up single sign-on (SSO) integrations + Use multi-factor authentication (MFA) -> Answer A is correct. + Install and integrate an identity governance solution + Stay up to date Question 49 A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work? A. Create an advanced attribute setting of Cisco.cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit. B. Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit. C. Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit D. Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit Answer: C passyourccie@gmail.com Explanation Using an Authorization Profile to Redirect Guest Endpoints to ISE As explained in Understanding Guest Flow, when endpoints first access the network, they are authenticated with MAB, and must be redirected to the Guest portal for authorization. ISE comes with a built-in profile called Cisco_WebAuth that references a built-in self-registered Guest portal. The WLC and switch require a preconfigured redirect ACL. … AireOS does not support downloadable ACLs. Therefore, ACLs must be configured locally on the wireless controller (or access points in FlexConnect mode). The ACL names must match in both ISE and in AireOS. The figure below indicates for a wireless guest: Reference: https://community.cisco.com/t5/security-documents/ise-guest-access-prescriptivedeployment-guide/ta-p/3640475 Question 50 What is a difference between Cisco AMP for Endpoints and Cisco Umbrella? A. Cisco AMP for Endpoints prevents, detects, and responds to attacks before damage can be done, and Cisco Umbrella provides the first line of defense against Internet threats. B. Cisco AMP for Endpoints prevents connections to malicious destinations, and Cisco Umbrella works at the file level to prevent the initial execution of malware. C. Cisco AMP for Endpoints automatically researches indicators of compromise and confirms threats, and Cisco Umbrella does not D. Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not Answer: A Question 51 What is the intent of a basic SYN flood attack? A. to flush the register stack to re-initiate the buffers B. to solicit DNS responses passyourccie@gmail.com C. to exceed the threshold limit of the connection queue D. to cause the buffer to overflow Answer: C Explanation A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources. By repeatedly sending initial connection request (SYN) packets, the attacker is able to overwhelm all available ports on a targeted server machine, causing the targeted device to respond to legitimate traffic sluggishly or not at all. Question 52 Which open standard creates a framework for sharing threat intelligence in a machine-digestible format? A. B. C. D. OpenC2 OpenIoC STIX Cybox Answer: B Explanation OpenIOC is an open framework, meant for sharing threat intelligence information in a machinereadable format. It was developed by the American cybersecurity firm MANDIANT in November 2011. It is written in eXtensible Markup Language (XML) and can be easily customized for additional intelligence so that incident responders can translate their knowledge into a standard format. Organizations can leverage this format to share threat-related latest Indicators of Compromise (IoCs) with other organizations, enabling real-time protection against the latest threats. Question 53 Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two) A. PowerOn Auto Provisioning B. Cisco Cloud Director C. Seed IP D. CDP AutoDiscovery E. Cisco Prime Infrastructure Answer: A C Explanation Cisco Data Center Network Manager (DCNM) offers network management system (NMS) support for traditional or multiple-tenant LAN and SAN fabrics. Cisco DCNM uses PowerOn Auto Provisioning (POAP) to automate the process of upgrading software images and installing configuration files on Cisco Nexus switches that are being deployed in the network. Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/primedata-center-network-manager/guide-c07-740626.html Question 54 Which role is a default guest type in Cisco ISE? A. Full-Time B. Contractor passyourccie@gmail.com C. Yearly D. Monthly Answer: B Explanation Each guest account must be associated with a guest type. Guest types allow a sponsor to assign different levels of access and different network connection times to a guest account. These guest types are associated with particular network access policies. Cisco ISE includes these default guest types: Contractor – Users who need access to the network for an extended amount of time, up to a year. Daily – Guests who need access to the resources on the network for just 1 to 5 days. Weekly – Users who need access to the network for a couple of weeks. Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/13/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_01111.html Question 55 An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives? A. Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories B. Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them. C. Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device. D. Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below. Answer: A Explanation The ‘greylist’ of risky domains is compromised of domains that host both malicious and safe content—we consider these “risky” domains. These sites often allow users to upload and share content—making them difficult to police, even for the admins of the site. Reference: https://docs.umbrella.com/deployment-msp/docs/what-is-the-intelligent-proxy In order to enable intelligent proxy, we need to use “Advanced Settings”: passyourccie@gmail.com Question 56 An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists? A. B. C. D. consumption editing sharing authoring Answer: A Question 57 Why is it important to have a patching strategy for endpoints? A. B. C. D. so that functionality is increased on a faster scale when it is used so that known vulnerabilities are targeted and having a regular patch cycle reduces risks so that patching strategies can assist with disabling nonsecure protocols in applications to take advantage of new features released with patches Answer: B Question 58 What is a description of microsegmentation? A. Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery B. Environments apply a zero-trust model and specify how applications on different servers or containers can communicate C. Environments implement private VLAN segmentation to group servers with similar applications D. Environments deploy centrally managed host-based firewall rules on each server or container Answer: B Explanation Zero Trust is a security framework requiring all users, whether in or outside the organization’s network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data. Zero Trust assumes that there is no traditional network edge; networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as workers in any location. The Zero Trust model uses microsegmentation — a security technique that involves dividing perimeters into small zones to maintain separate access to every part of the network — to contain attacks. Question 59 Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access? A. B. C. D. Cisco Container Controller Cisco Container Platform Cisco Cloud Platform Cisco Content Platform Answer: B Explanation passyourccie@gmail.com The ability to deploy Kubernetes clusters in air-gapped sites Cisco Container Platform (CCP) tenant images contain all the necessary binaries and don’t need internet access to function. Reference: https://www.cisco.com/c/en/us/products/cloud-systems-management/containerplatform/index.html#~stickynav=3 Question 60 What are two functions of TAXII in threat intelligence sharing? (Choose two) A. B. C. D. exchanges trusted anomaly intelligence information determines how threat intelligence information is relayed determines the “what” of threat intelligence supports STIX information and allows users to describe threat motivations and abilities Answer: A B Explanation In short, TAXII is about how parties communicate to exchange threat intelligence and STIX is about describing that threat intelligence in a structured way. Reference: https://logsentinel.com/blog/the-importance-of-threat-intelligence-sharing-throughtaxii-and-stix/?cookie-state-change=1639912854054 STIX states the “what” of threat intelligence, while TAXII defines “how” that information is relayed. Reference: https://www.anomali.com/resources/what-are-stix-taxii Question 61 An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements. What else must be done to accomplish this task? A. B. C. D. Create a destination list for addresses to be allowed or blocked Use content categories to block or allow specific addresses Add the specified addresses to the identities list and create a block action Modify the application settings to allow only applications to connect to required addresses Answer: A Explanation Content Categories – Allows you to block access to categories of websites – groupings of sites with similarly themed content. For example, sports, gambling, or astrology…, not specific addresses -> Answer B is not correct. Application Settings – Allows you to block access to specific applications (not specific addresses). For example, Netflix, Facebook, or Amazon -> Answer D is not correct. Destination Lists allows you to create a unique list of destinations (for example, domain name or URL) to which you can block or allow access -> Answer A is correct. Reference: https://docs.umbrella.com/deployment-umbrella/docs/customize-your-policies-1 An identity list cannot be an address as Umbrella uses the following identities:Network, Network Device, Roaming Computers, Mobile Devices, Chrome Book, Network Tunnel and WebUsers and Groups. Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise/design-zonesecurity/umbrella-design-guide.pdf Question 62 Drag and drop the descriptions from the right onto the correct positions on the left. passyourccie@gmail.com Answer: + threat prevention and mitigation for known and unknown threats: NGIPS + real-time threat intelligence and security protection: Collective Security Intelligence + detection, blocking and remediation to protect the enterprise against targeted malware attacks: AMP + policy enforcement based on complete visibility of users and communication between virtual machines: Full Context Awareness Question 63 Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and all servers must communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication between DNS servers and the file server? A. Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as community ports. B. Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports. C. Configure GigabitEthernet0/1 as promiscuous port, Gigabithernet0/2 as community port and GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports. D. Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports. Answer: A passyourccie@gmail.com Explanation * Isolated: only communicate with promiscuous ports. Notice that it cannot even communicate with another isolated port. Also, there can be only 1 isolated VLAN per PVLAN. * Promiscuous: can communicate with all other ports. The default gateway is usually connected to this port so that all devices in PVLAN can go outside. * Community: can communicate with other members of that community and promiscuous ports but cannot communicate with other communities. There can be multiple community VLANs per PVLAN.