Q1. What are two benefits of using SPAN with promiscuous mode deployment? (Choose two.) A. SPAN does not introduce latency to network traffic. B. SPAN can perform granular scanning on captures of per-IP-address or per-port monitoring. C. Promiscuous Mode can silently block traffic flows on the IDS. D. SPAN can analyze network traffic from multiple points. View AnswerAnswer: A,D Q2. Which version of AsyncOS for web…
Q1. Which centralized reporting function of the Cisco Content Security Management Appliance aggregates data from multiple Cisco ESA devices? A. message tracking B. web tracking C. system tracking D. logging View AnswerAnswer: A Q2. Which Cisco Web Security Appliance design requires minimal change to endpoint devices? A. Transparent Mode B. Explicit Forward Mode C. Promiscuous Mode D. Inline Mode View AnswerAnswer: A Q3. You ran the ssh generate-key command on the Cisco IPS…
Q1. What CLI command configures IP-based access to restrict GUI and CLI access to a Cisco Email Security appliance's administrative interface? A. adminaccessconfig B. sshconfig C. sslconfig D. ipaccessconfig View AnswerAnswer: A Q2. What is the access-list command on a Cisco IPS appliance used for? A. to permanently filter traffic coming to the Cisco.IPS.appliance via the sensing port B. to filter for traffic when the Cisco.IPS.appliance is in…
Q1. Refer to the exhibit. When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) A. Row 1 B. Row 2 C. Row 3 D. Row 4 E. Row 5 F. Row 6 G. Row 7 H. Row 8 View…
Q1. Which two statements about devices within a Cisco ESA cluster are true? (Choose two.) A. Clustered systems must consist of devices in the same hardware series. B. Clustered devices can communicate via either SSH or Cluster Communication Service. C. Clustered devices can communicate only with Cluster Communication Service. D. In-the-cloud devices must be in a separate cluster from on-premise devices. E. Clustered devices can…
Q1. Which two GUI options display users' activity in Cisco Web Security Appliance?.(Choose two.) A. Web Security Manager Identity Identity Name B. Security Services Reporting C. Reporting Users D. Reporting Reports by User Location View AnswerAnswer: C,D Q2. What is a primary difference between the web security features of the Cisco WSA and the Cisco ASA NGFW? A. Cisco WSA provides URL filtering, while Cisco ASA NGFW…
Q1. Which three statements about the Cisco IPS appliance configurations are true? (Choose three.) A. The maximum number of denied attackers is set to 10000. B. The block action duraton is set to 3600 seconds. C. The Meta Event Generator is globally enabled. D. Events Summarization is globally disabled. E. Threat Rating Adjustment is globally disabled. View AnswerAnswer: A,B,C Q2. Which Cisco ASA configuration command drops traffic…
Q1. Which Cisco monitoring solution displays information and important statistics for the security devices in a network? A. Cisco Prime LAN Management B. Cisco ASDM Version 5.2 C. Cisco Threat Defense Solution D. Syslog Server E. TACACS+ View AnswerAnswer: B Q2. Which Cisco WSA is intended for deployment in organizations of up to 1500 users? A. WSA S370 B. WSA S670 C. WSA S370-2RU D. WSA S170 View AnswerAnswer: D Q3. Which five…
Q1. Which Cisco IPS CLI command shows the most fired signature? A. show statistics virtual-sensor B. show event alert C. show alert D. show version View AnswerAnswer: A Q2. Refer to the exhibit. What Cisco ESA CLI command generated the output? A. smtproutes B. tophosts C. hoststatus D. workqueuestatus View AnswerAnswer: B Q3. What action will the sensor take regarding IP addresses listed as known bad hosts in the Cisco SensorBase network? A.…
Q1. Which Cisco Security IntelliShield Alert Manager Service component mitigates new botnet, phishing, and web-based threats? A. the IntelliShield Threat Outbreak Alert B. IntelliShield Alert Manager vulnerability alerts C. the IntelliShield Alert Manager historical database D. the IntelliShield Alert Manager web portal E. the IntelliShield Alert Manager back-end intelligence engine View AnswerAnswer: A Q2. Which three options are characteristics of router-based IPS? (Choose three.) A. It is used…
Q1. Which Cisco technology is a modular security service that combines a stateful inspection firewall with next-generation application awareness, providing near real-time threat protection? A. Cisco ASA 5500 series appliances B. Cisco ASA CX Context-Aware Security C. WSA D. Internet Edge Firewall / IPS View AnswerAnswer: B Q2. Which IPS engine detects ARP spoofing? A. Atomic ARP Engine B. Service Generic Engine C. ARP Inspection Engine D. AIC Engine View AnswerAnswer:…
Q1. Which command sets the number of packets to log on a Cisco IPS sensor? A. ip-log-count number B. ip-log-packets number C. ip-log-bytes number D. ip-log number View AnswerAnswer: B Q2. Which two conditions must you configure in an event action override to implement a risk rating of 70 or higher and terminate the connection on the IPS? (Choose two.) A. Configure the event action override to…
Q1. At which value do custom signatures begin? A. 1024 B. 10000 C. 1 D. 60000 View AnswerAnswer: D Q2. Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.) A. The Telnet protocol is enabled by default B. The Telnet protocol is disabled by default C. HTTP is enabled by default D. HTTP is disabled by default E. SSH is enabled by default F. SSH…
Q1. Who or what calculates the signature fidelity rating? A. the signature author B. Cisco Professional Services C. the administrator D. the security policy View AnswerAnswer: A Q2. Which Cisco Web Security Appliance deployment mode requires minimal change to endpoint devices? A. Transparent Mode B. Explicit Forward Mode C. Promiscuous Mode D. Inline Mode View AnswerAnswer: A Q3. Which three administrator actions are used to configure IP logging in Cisco IME? (Choose…
Q1. Which three options are valid event actions for a Cisco IPS? (Choose three.) A. deny-packet-inline B. deny-attack-reset C. produce-verbose-alert D. log-attacker-packets E. deny-packet-internal F. request-block-drop-connection View AnswerAnswer: A,C,D Q2. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map? A. cxsc fail B. cxsc fail-close C. cxsc fail-open D. cxssp fail-close View AnswerAnswer: B Q3. What are…
Q1. When learning accept mode is set to auto, and the action is set to rotate, when is the KB created and used? A. It is created every 24 hours and used for 24 hours. B. It is created every 24 hours, but the current KB is used. C. It is created every 1 hour and used for 24 hours. D. A KB is…
Q1. Which three statements about threat ratings are true? (Choose three.) A. A threat rating is equivalent to a risk rating that has been lowered by an alert rating. B. The largest threat rating from all actioned events is added to the risk rating. C. The smallest threat rating from all actioned events is subtracted from the risk rating. D. The alert rating for…
Q1. Refer to the exhibit. When designing the network to redirect web traffic utilizing the Catalyst 6500 to the Cisco Web Security Appliance, impact on the switch platform needs consideration. Which four rows identify the switch behavior in correlation to the redirect method? (Choose four.) A. Row 1 B. Row 2 C. Row 3 D. Row 4 E. Row 5 F. Row 6 G. Row 7 H. Row 8 View…