option
Questions
ayuda
daypo
search.php

Carlos 433 - 468

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Carlos 433 - 468

Description:
CCNP SCOR 433 - 468

Creation Date: 2025/07/04

Category: Computers

Number of questions: 36

Rating:(0)
Share the Test:
Nuevo ComentarioNuevo Comentario
New Comment
NO RECORDS
Content:

Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?. A. api/v1/onboarding/pnp-device/import. B. api/v1/onboarding/workflow. C. api/v1/onboarding/pnp-device. D. api/v1/file/config.

What are two benefits or using an MDM solution? (Choose two.). A. allow for mobile endpoints to be used for authentication methods. B. antimalware and antispyware functionality. C. enhanced DNS security for endpoint devices. D. on-device content management. E. remote wipe capabilities to protect information on lost or stolen devices.

For Cisco IOS PKI, which two types of servers are used as a distribution point for CRLs? (Choose two.). A. LDAP. B. subornidate CA. C. SCP. D. HTTP. E. SDP.

An engineer must deploy Cisco Secure Email with Cloud URL Analysis and must meet these requirements: 1. to protect the network from large-scale virus outbreaks 2. to protect the network from non-viral attacks such as phishing and malware distribution 3. to provide active analysis of the structure of the URL and information about the domain and page contents Which two prerequisites must the engineer ensure are configured? (Choose two.). A. Outbreak Filters must be enabled globally. B. Enable TLS by setting to Preferred to the Default Domain. C. Scanning enabled for each Verdict, Prepend Subject and Deliver. D. Service Logs must be enabled. E. Enable Reject Connection Logging.

Refer to the exhibit. An engineer must configure an outgoing mail policy to flag any email sent from example@cisco.com to example@example.com which contains financial information. Which additional mail policy configuration is needed to meet the requirement?. A. Policy Name: DLP-Policy Sender: @cisco.com Recipient: @example.com. B. Policy Name: malware protection Sender: Any Recipient: @cisco.com. C. Policy Name: Default-Policy Sender: example@cisco.com Recipient: example@example.com. D. Policy Name: Anti-spam Sender: Any Recipient: @example.com.

Refer to the exhibit. An engineer is designing a solution to prevent an attacker from sending unauthorized DHCP requests to a company's DHCP server hosted in a private cloud. The company's default policy for DHCP requests is that the lease be valid for 24 hours. Which solution must be used to achieve these requirements?. A. leasing. B. snooping. C. antivirus. D. TrustSec.

Refer to the exhibit. Which tasks is the Python script performing by calling the API?. A. requesting the use of basic authentication to make changes to Cisco Secure Email Gateway. B. retrieving and displaying an authentication token from Cisco DNA Center. C. retrieving and displaying an authentication token from Cisco Secure Email Gateway. D. requesting the use of basic authentication to make changes in Cisco DNA Center.

A network engineer must create a workflow to detect when a device joins a network and send the onboarding configuration to the device by using the Cisco DNA Center API. Which two method and endpoint pairs must be used to implement the workflow? (Choose two.). A. POST /dna/intent/api/v1/discovery. B. POST /dna/intent/api/v1/onboarding/pnp-device/import. C. POST /dna/intent/api/v1/onboarding/pnp-device/site-claim. D. GET /dna/intent/api/v1/topology/site-topology. E. GET /dna/intent/api/v1/discovery/{discovery_id}/network-device.

What is a capability of Cisco Secure Email Gateway compared to Cisco Secure Web Appliance?. A. Secure Email Gateway protects a web server from malware and distributed denial-of-service attacks, and Secure Web Appliance blocks malware and phishing attempts sent by email. B. Secure Email Gateway provides a single management interface for email security, and Secure Web Appliance acts as web application firewall. C. Secure Email Gateway provides a single management interface for email and web security, and Secure Web Appliance acts as web application firewall. D. Secure Email Gateway blocks malware and phishing attempts sent by email, and Secure Web Appliance blocks internal users from accessing inappropriate web sites.

What is an advantage of static virtual tunnel interfaces when compared to crypto map?. A. Static virtual tunnel interfaces provide IPsec VPN configurations without access lists, and crypto map provides IPsec VPN configurations that have access lists. B. Static virtual tunnel interfaces provide Extensible Authentication Protocol tunnelling, and crypto map provides XAUTH. C. Static virtual tunnel interfaces provide IPsec VPN configurations using access lists, and crypto map provides IPsec VPN configurations without access lists. D. Static virtual tunnel interfaces provide IKEv2 for VPN configurations, and crypto map provides support for IKEv1.

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?. A. CoA. B. posture assessment. C. SNMP probe. D. external identity source.

Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?. A. Contiv. B. SDLC. C. Lambda. D. Docker.

What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?. A. continuous integration and continuous deployment. B. compile-time instrumentation. C. cloud application security broker. D. container orchestration.

What is the process of performing automated static and dynamic analysis of files in an isolated environment against preloaded behavioral indicators for threat analysis?. A. point-in-time checks. B. deep visibility scan. C. advanced sandboxing. D. adaptive scanning.

Which attack type attempts to shut down a machine or network so that users are not able to access it?. A. bluesnarfing. B. smurf. C. IP spoofing. D. MAC spoofing.

Which service allows a user export application usage and performance statistics with Cisco Application Visibility and Control?. A. SNORT. B. SNMP. C. 802.1X. D. NetFlow.

A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?. A. enable port-based network access control. B. dedicated VLAN ID for all trunk ports. C. disable STP on the network devices. D. DHCP snooping on all the switches.

A security engineer deploying Cisco Secure Client on endpoints so that remote users can access corporate resources. A Cisco router is used as VPN Concentrator and configured as Flex VPN server. VPN uses a local authentication for the IKEv2 profile. Which configuration profile to allow a successful Secure Client connection to the router?. A. Configure IPsec Authentication method to EAP-Secure Client. B. Add router IP address as trusted in the Policy. C. Set DNS server address to internal corporate DNS. D. Enable Split Tunnelling in the VPN profile.

What is a characteristic of the zero-trust security model?. A. Access for all devices must be verified. B. Access is distributed across multiple cloud providers. C. Access is granted once then persists across applications. D. User access keys are time limited for application usage.

Which parameter must be set for an invalid certificate handling on a Cisco Secure Web Appliance with a policy for HTTPS traffic?. A. Scan. B. Accept. C. Reject. D. Decrypt.

A company named ABC.inc has an older web server that is used for its website named www.abc.inc. The company plans to move the website to the public cloud to reduce costs. The company regularly performs the security activities: 1. VA scans 2. PEN tests When the migration to the cloud is complete, which activity must be performed to scan for source code errors?. A. SAST scans. B. on-demand website scans. C. DAST scans. D. PEN tests.

Refer to the exhibit. Which task is the Python script performing by using the Umbrella Enforcement API?. A. editing malicious domains in Cisco Umbrella Enforcement that have changed status. B. editing malicious domains in Cisco Umbrella Enforcement that have changed IP address. C. importing malicious domains to Cisco Umbrella Enforcement for blocking. D. importing malicious domains to Cisco Umbrella Enforcement for additional processing.

A security engineer must configure URL filtering in Cisco vManage to show a default message of "Access to the requested page has been denied" when a user tries to visit a blocked URL. Which vManage setting must the engineer use to implement the requirement?. A. Block Page Content. B. Default Block Page. C. Block Page Message. D. Redirect URL.

Refer to the exhibit. A network security engineer must enable and configure port security on a Cisco Catalyst switch. Up to 20 secure MAC addresses must be supported per port. In case of a violation, the port must be disabled immediately, and the port LED must turn off. Which command completes the configuration?. A. switchport port-security violation shutdown. B. switchport port-security violation restrict. C. switchport port-security violation protect. D. switchport port-security violation disable.

What are two advantages of using Cisco Secure Client over DMVPN? (Choose two.). A. It provides spoke-to-spoke communications without traversing the hub. B. It allows different routing protocols to work over the tunnel. C. It allows multiple sites to connect to the data center. D. It allows customization of access policies based on user identity. E. It enables VPN access for individual users from their machines.

Which technology provides a combination of endpoint protection, endpoint detection, and response?. A. Cisco AMP. B. Cisco Secure Malware Analytics. C. Cisco Talos. D. Cisco Umbrella.

Refer to the exhibit. An engineer must modify the header priority to match a mail policy on a Cisco Secure Email Gateway. The From header must be set to priority P1, and Envelope Sender must be set to priority P2. Which action must be taken next to complete the configuration?. A. Modify the Mail Policy settings. B. Modify the Incoming Mail Policies default policy. C. Create a new Incoming Mail policy. D. Create a new Mail Flow policies.

Refer to the exhibit. A security engineer must collect usera1’s activity from a Cisco Secure Endpoint device for an investigation. The engineer plans to use a Python script to automate the activity. Which code snippet completes the script?. A. request = requests.get(url, auth=(amp_client_id, amp_api_key), params={'q': usera1}). B. request = requests.get(url, auth=(amp_client_id, amp_api_key), params={'q': user}). C. request = requests.get(url, auth=(amp_client_id, amp_api_key), params={'q': 'user_activity'}). D. request = requests.post(url, auth=(amp_client_id, amp_api_key), params={'q': user}).

Refer to the exhibit. An administrator must configure authentication, authorization, and accounting (AAA) on a Cisco router for SSH access. Which code snippet completes the configuration?. A. ! aaa new-model ! line vty 0 4 transport input all authorization exec author-list accounting exec account-list login authentication authen-list !. B. ! aaa new-model ! line vty 0 4 transport input ssh authorization exec author-list accounting exec account-list login authentication enable !. C. ! line vty 0 4 transport input ssh authorization exec author-list accounting exec account-list login authentication authen-list !. D.! aaa new-model ! line vty 0 4 transport input ssh authorization exec author-list accounting exec account-list login authentication authen-list !.

What is a difference between an EPP and EDR?. A. EPP addresses firewall capabilities, and EDR can perform disk encryption. B. EPP addresses antimalware, and EDR addresses port control. C. EPP addresses security incident detection, and EDR prevents data loss. D. EPP addresses application sandboxing, and EDR provides threat intelligence.

A company named ABC wants to migrate to the cloud to reduce operational costs. The company requires a cloud solution where the cloud provider is responsible for: 1. Virtualization upgrades 2. Servers and storage patching 3. Network security The company must keep control of the OS, middleware, and applications. Which cloud service model must be used?. A. IaaS. B. SaaS. C. Hybrid. D. PaaS.

A security engineer is developing a security solution for a customer’s cloud environment. The solution must make the customer responsible for all cloud security excluding the operating system and include everything developers need to build, run, and manage applications. Which two cloud service models must be used? (Choose two.). A. Hybrid cloud. B. IaaS. C. SaaS. D. Private cloud. E. PaaS.

Which type of DDoS attack masks an attacker's identity?. A. direct. B. amplification. C. SYN flood. D. reflection.

An engineer must configure an email policy to create an incident every time an outbound email that contains financial records is sent. Which Cisco Secure Email Gateway feature must be configured?. A. mail flow policy. B. verification profile. C. data loss prevention policy. D. exception table.

An engineer must modify an existing remote access VPN using a Cisco Secure Client solution and a Cisco Secure Firewall. Currently, all the traffic generated by the user is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goal?. A. routing table. B. NAT exemption. C. encryption domain. D. group policy.

An engineer must configure a new site-to-site VPN connection using Cisco Secure Firewall Threat Defense as node A and Cisco ASA as node B. These configurations were performed already in Cisco Secure Firewall Threat Defense: 1. Configure IKE and IPsec parameters 2. Bypass access control 3. Create an access control policy Which action completes the configuration?. A. Create a tunnel group for the peer. B. Add a VPN client profile. C. Configure NAT exemption. D. Enable IKEv2 on the outside interface.

Report abuse