لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which request searches for a process window in Cisco ThreatGRID that contains the word “secret”?
A. /api/v2/search/submissions?term=processwindow&title=secret
B. /api/v2/search/submissions?term=processwindow&q=secret
C. /api/v2/search/submissions?term=window&title=secret
D. /api/v2/search/submissions?term=process&q=secret
عرض الإجابة
اجابة صحيحة: D
السؤال #2
For which two programming languages does Cisco offer an SDK for Cisco pxGrid 1.0? (Choose two.)
A. Python
B. Perl
C. Java
D. C
E. JavaScript
عرض الإجابة
اجابة صحيحة: CD
السؤال #3
Which two methods are API security best practices? (Choose two.)
A. se tokens after the identity of a client has been established
B. se the same operating system throughout the infrastructure
C. se encryption and signatures to secure data
D. se basic auth credentials over all internal API interactions
E. se cloud hosting services to manage security configuration
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
Which API is designed to give technology partners the ability to send security events from their platform/service/appliancewithin a mutual customer's environment to the Umbrella cloud for enforcement?
A. Cisco Umbrella Management API
B. Cisco Umbrella Security Events API
C. Cisco Umbrella Enforcement API
D. Cisco Umbrella Reporting API
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which snippet describes the way to create an URL object in Cisco FDM using FDM REST APIs with curl? A) B) C) D)
A. ption A
B. ption B
C. ption C
D. ption D
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which two APIs are available from Cisco ThreatGRID? (Choose two.)
A. Access
B. User Scope
C. Data
D. Domains
E. Curated Feeds
عرض الإجابة
اجابة صحيحة: CE
السؤال #7
Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of aspecific message.What must be added to the script to achieve the desired result?
A. Add message ID information to the URL string as a URI
B. Run the script and parse through the returned data to find the desired message
C. Add message ID information to the URL string as a parameter
D. Add message ID information to the headers
عرض الإجابة
اجابة صحيحة: C
السؤال #8
What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?
A. Report on flow data during a customizable time period
B. Operate and return alerts discovered from infrastructure observations
C. Return current configuration data of Cisco Stealthwatch Cloud infrastructure
D. Create snapshots of supported Cisco Stealthwatch Cloud infrastructure
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server usingthe Cisco FDM REST API. The administrator sends an API query as shown in the exhibit.What is the outcome of that action?
A. The given code does not execute because the mandatory parameters, source, destination, and services are missing
B. The given code does not execute because it uses the HTTP method "PUT"
C. The appropriate rule is updated with the source, destination, services, and other fields set to "Any" and the action set to "DENY"
D. A new rule is created with the source, destination, services, and other fields set to "Any" and the action set to "DENY"
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which two event types can the eStreamer server transmit to the requesting client from a managed device and amanagement center? (Choose two.)
A. user activity events
B. intrusion events
C. file events
D. intrusion event extra data
E. malware events
عرض الإجابة
اجابة صحيحة: BD
السؤال #11
Which snippet describes the way to create an URL object in Cisco FDM using FDM REST APIs with curl?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What are two benefits of Ansible when managing security platforms? (Choose two.)
A. End users can be identified and tracked across a network
B. Network performance issues can be identified and automatically remediated
C. Policies can be updated on multiple devices concurrently, which reduces outage windows
D. Anomalous network traffic can be detected and correlated
E. The time that is needed to deploy a change is reduced, compared to manually applying the change
عرض الإجابة
اجابة صحيحة: CE
السؤال #13
Which description of synchronous calls to an API is true?
A. They can be used only within single-threaded processes
B. They pause execution and wait for the response
C. They always successfully return within a fixed time
D. They can be used only for small requests
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which API capability is available on Cisco Firepower devices?
A. Firepower Management Center - Sockets API
B. Firepower Management Center - eStreamer API
C. Firepower Management Center - Camera API
D. Firepower Management Center - Host Output API
عرض الإجابة
اجابة صحيحة: B
السؤال #15
After changes are made to the Cisco Firepower Threat Defense configuration using the Cisco Firepower Device ManagerAPI, what must be done to ensure that the new policy is activated?
A. Submit a POST to the /api/fdm/latest/operational/deploy URI
B. Submit a GET to the /api/fdm/latest/operational/deploy URI
C. Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy URI
D. Submit a POST to the /api/fdm/latest/devicesettings/pushpolicy URI
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority. Which approach must be taken to secure API keys and passwords?
A. mbed them directly in the code
B. tore them in a hidden file
C. tore them inside the source tree of the application
D. hange them periodically
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which two APIs are available from Cisco ThreatGRID? (Choose two.)
A. ccess
B. ser Scope
C. ata
D. omains
E. urated Feeds
عرض الإجابة
اجابة صحيحة: CE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: