Topic 3: Exam Pool C
Which two capabilities does an MDM provide? (Choose two.)
A.
delivery of network malware reports to an inbox in a schedule
B.
unified management of mobile devices, Macs, and PCs from a centralized dashboard
C.
enforcement of device security policies from a centralized dashboard
D.
manual identification and classification of client devices
E.
unified management of Android and Apple devices from a centralized dashboard
unified management of mobile devices, Macs, and PCs from a centralized dashboard
enforcement of device security policies from a centralized dashboard
Which information is required when adding a device to Firepower Management Center?
A.
username and password
B.
encryption method
C.
device serial number
D.
registration key
registration key
In which scenario is endpoint-based security the solution?
A.
inspecting encrypted traffic
B.
device profiling and authorization
C.
performing signature-based application control
D.
inspecting a password-protected archive
performing signature-based application control
Which category includes DoS Attacks?
A.
Virus attacks
B.
Trojan attacks
C.
Flood attacks
D.
Phishing attacks
Flood attacks
Which two mechanisms are used to control phishing attacks? (Choose two)
A.
Enable browser alerts for fraudulent websites
B.
Define security group memberships.
C.
Revoke expired CRL of the websites.
D.
Use antispyware software.
E.
Implement email filtering techniques.
Enable browser alerts for fraudulent websites
Implement email filtering techniques.
What are two features of NetFlow flow monitoring? (Choose two)
A.
Can track ingress and egress information
B.
Include the flow record and the flow importer
C.
Copies all ingress flow information to an interface
D.
Does not required packet sampling on interfaces
E.
Can be used to track multicast, MPLS, or bridged traffic
Can track ingress and egress information
Can be used to track multicast, MPLS, or bridged traffic
Drag and drop the concepts from the left onto the correct descriptions on the right:
What is a characteristic of a bridge group in ASA Firewall transparent mode?
A.
It includes multiple interfaces and access rules between interfaces are customizable
B.
It is a Layer 3 segment and includes one port and customizable access rules
C.
It allows ARP traffic with a single access rule
D.
It has an IP address on its BVI interface and is used for management traffic
It includes multiple interfaces and access rules between interfaces are customizable
https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95- generalconfig/intro-fw.htmlNote: BVI interface is not used for management purpose. But we can add a separate Management slot/port interface that is not part of any bridge group, and that allows only management traffic to the ASA.
Which two criteria must a certificate meet before the WSA uses it to decrypt application
traffic? (Choose two.)
A.
It must include the current date.
B.
It must reside in the trusted store of the WSA.
C.
It must reside in the trusted store of the endpoint.
D.
It must have been signed by an internal CA.
E.
it must contain a SAN.
It must include the current date.
It must reside in the trusted store of the WSA.
An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site
VPN implementation. What must be un solution?
A.
L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.
B.
L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.
C.
GRE over IPsec adds its own header, and L2TP does not.
D.
GRE over IPsec cannot be used as a standalone protocol, and L2TP can.
GRE over IPsec cannot be used as a standalone protocol, and L2TP can.
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?
(Choose two)
A.
multiple factor auth
B.
local web auth
C.
single sign-on
D.
central web auth
E.
TACACS+
local web auth
central web auth
What is the process In DevSecOps where all changes In the central code repository are
merged and synchronized?
A.
CD
B.
EP
C.
CI
D.
QA
CI
Page 24 out of 53 Pages |
Previous |