لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Topic 1Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
A. phishing
B. brute force
C. man-in-the-middle
D. DDOS
E. tear drop
عرض الإجابة
اجابة صحيحة: BC
السؤال #2
What is the purpose of the Cisco Endpoint IoC feature? The Endpoint Indication of Compromise (IOC) feature is a powerful incident response tool for scanning of post-compromise indicators across multiple computers.
A. t is an incident response tool
B. t provides stealth threat prevention
C. t is a signature-based engine
D. t provides precompromise detection
عرض الإجابة
اجابة صحيحة: A
السؤال #3
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task? Cisco Secure Workload (formerly Tetration) is a solution that provides visibility, segmentation, and security for cloud applications. It can monitor application communications, detect abnormal application behavior, and identify vulnerabilities within the a
A. onfigure Cisco Secure Workload to detect anomalies and vulnerabilities
B. se Cisco ISE to provide application visibility and restrict access to them
C. mplement Cisco Umbrella lo control the access each application is granted
D. odify the Cisco Duo configuration to restrict access between applications
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client? The functional difference between Cisco Secure Endpoint (formerly known as AMP for Endpoints) and Cisco Umbrella Roaming Client lies in their approach to security. Cisco Secure Endpoint is designed to prevent, detect, and respond to threats on the endpoint devices. It provides comprehensive protection by stopping and tracking malicious files and activities on hosts, utilizing continuous analysis and retrospectiv
A. ecure Endpoint authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity
B. ecure Endpoint stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats
C. he Umbrella Roaming Client authenticates users and provides segmentation, and Secure Endpoint allows only for VPN connectivity
D. he Umbrella Roaming client stops and tracks malicious activity on hosts, and Secure Endpoint tracks only URL-based threats
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Topic 1Which two mechanisms are used to control phishing attacks? (Choose two.)
A. Enable browser alerts for fraudulent websites
B. Define security group memberships
C. Revoke expired CRL of the websites
D. Use antispyware software
E. Implement email filtering techniques
عرض الإجابة
اجابة صحيحة: AE
السؤال #6
Topic 1Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Topic 1Which form of attack is launched using botnets?
A. TCP flood
B. DDOS
C. DOS
D. virus
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Topic 1What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role
B. A spear phishing campaign is aimed at a specific person versus a group of people
C. Spear phishing is when the attack is aimed at the C-level executives of an organization
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Topic 1Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
A. create an SNMP pull mechanism for managing AMP
B. gather network telemetry information from AMP for endpoints
C. get the process and PID information from the computers in the network
D. gather the network interface information about the computers AMP sees
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Topic 1Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B. water holing
C. DDoS
D. buffer overflow
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Topic 1What are two rootkit types? (Choose two.)
A. registry
B. buffer mode
C. user mode
D. bootloader
E. virtual
عرض الإجابة
اجابة صحيحة: CD
السؤال #12
Topic 1Which two behavioral patterns characterize a ping of death attack? (Choose two.)
A. The attack is fragmented into groups of 16 octets before transmission
B. The attack is fragmented into groups of 8 octets before transmission
C. Short synchronized bursts of traffic are used to disrupt TCP connections
D. Malformed packets are used to crash systems
E. Publicly accessible DNS servers are typically used to execute the attack
عرض الإجابة
اجابة صحيحة: BD
السؤال #13
Topic 1In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which statement about the authentication protocol used in the configuration is true?
A. The authentication request contains only a password
B. The authentication request contains only a username
C. The authentication and authorization requests are grouped in a single packet
D. There are separate authentication and authorization request packets
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
A. AA attributes
B. oA request
C. V pair
D. arrier-grade NAT
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Topic 1Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
A. Check integer, float, or Boolean string parameters to ensure accurate values
B. Use prepared statements and parameterized queries
C. Secure the connection between the web and the app tier
D. Write SQL code instead of using object-relational mapping libraries
E. Block SQL code execution in the web application database login
عرض الإجابة
اجابة صحيحة: AB
السؤال #17
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
A. IG Advantage
B. NS Security Essentials
C. IG Essentials
D. NS Security Advantage
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: