لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the purpose of CA in a PKI?
A. o create the private key for a digital certificate
B. o validate the authenticity of a digital certificate
C. o certify the ownership of a public key by the named subject
D. o issue and revoke digital certificate
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which algorithm does ISAKMP use to securely derive encryption and integrity keys?
A. DES
B. SA
C. ES
D. iffie-Hellma
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which solution should be leveraged for secure access of a CI/CD pipeline?
A. uo Network Gateway
B. SL WebVPN
C. emote access client
D. isco FTD network gatewa
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which industry standard is used to integrate Cisco ISE and Cisco pxGrid to each other and with other interoperable security platforms?
A. NSI
B. IST
C. EEE
D. ET
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which two services must remain as on premises equipment when a hybrid email solution is deployed?
A. LP
B. ntivirus
C. ntispam
D. DoS
E. ncryptio
عرض الإجابة
اجابة صحيحة: AE
السؤال #6
What is the benefit of integrating Cisco ISE with a MDM solution?
A. t provides compliance checks for access to the network
B. t provides the ability to add applications to the mobile device through Cisco ISE
C. t provides the ability to update other applications on the mobile device
D. t provides network device administration access
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What are the components of endpoint protection against social engineering attacks?
A. irewall
B. Psec
C. DS
D. S
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which statement describes a serverless application?
A. he application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider
B. he application is installed on network equipment and not on physical servers
C. he application delivery controller in front of the server farm designates on which server the application runs each time
D. he application runs from a containerized environment that is managed by Kubernetes or Docker Swarm
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which standard is used to automate exchanging cyber threat information?
A. TIX
B. oC
C. ITRE
D. AXI
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An organization has a Cisco ESA set up with DLP policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide this capability?
A. uarantine and alter the subject header with a DLP violation
B. eliver and add disclaimer text
C. eliver and send copies to other recipients
D. uarantine and send a DLP violation notificatio
عرض الإجابة
اجابة صحيحة: B
السؤال #11
An organization must add new firewalls to is infrastructure and wants to use Cisco ASA or Cisco FTD. The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain silts after displaying a warning page and to reset the connection. Which solution should the organization choose?
A. SA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas FTD does not
B. TD because it enables interactive blocking and blocking with reset natively, whereas ASA does not
C. SA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas FTD does not
D. TD because it supports system rate level traffic blocking, whereas ASA does not
عرض الإجابة
اجابة صحيحة: B
السؤال #12
What are the components of endpoint protection against social engineering attacks?
A. irewall
B. Psec
C. DS
D. S
عرض الإجابة
اجابة صحيحة: D
السؤال #13
An engineer must set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration. Which switch port MAC address security setting must be used?
A. ging
B. ticky
C. tatic
D. aximu
عرض الإجابة
اجابة صحيحة: B
السؤال #14
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
A. anagement console and the SDN controller
B. DN controller and the cloud
C. DN controller and the management solution
D. anagement console and the clou
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Which feature must be configured before implementing NetFlow on a router?
A. yslog
B. P routing
C. NMPv3
D. R
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router?
A. ervice top-keepalives-in
B. o cdp run
C. o ip http server
D. p ssh version 2
E. o service password-recover
عرض الإجابة
اجابة صحيحة: BC
السؤال #17
An administrator needs to be able to have a router securely communicate with a network management system. The connections must be authenticated but not encrypted. While meeting these requirements, which command will create a group that allows a user on the network management system access to the router?
A. nmp-server group v2c
B. nmp-server group v3 auth
C. nmp-server group v2c write
D. nmp-server group v3 priv write
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which network monitoring solution uses streams and pushes operational data to provide a near real time view of activity?
A. odel-driven telemetry
B. MTP
C. NMP
D. yslo
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which industry standard is used to integrate Cisco ISE and Cisco pxGrid to each other and with other interoperable security platforms?
A. NSI
B. IST
C. EEE
D. ET
عرض الإجابة
اجابة صحيحة: D
السؤال #20
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service?
A. nsure that interfaces are configured with the error-disable detection and recovery feature
B. nable the snmp-server enable traps command and wait 300 seconds
C. se EEM to have the ports return to service automatically in less than 300 seconds
D. nter the shutdown and no shutdown commands on the interfaces
E. ave Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the preconfigured interval
عرض الإجابة
اجابة صحيحة: AD
السؤال #21
Which network monitoring solution uses streams and pushes operational data to provide a near real time view of activity?
A. odel-driven telemetry
B. MTP
C. NMP
D. yslo
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Which standard is used to automate exchanging cyber threat information?
A. TIX
B. oC
C. ITRE
D. AXI
عرض الإجابة
اجابة صحيحة: D
السؤال #23
What are two characteristics of the RESTful architecture used within Cisco DNA Center?
A. EST is a Linux platform-based architecture
B. EST uses HTTP to send a request to a web service
C. EST uses methods such as GET, PUT, POST, and DELETE
D. EST codes can be compiled with any programming language
E. he POST action replaces existing data at the URL path
عرض الإجابة
اجابة صحيحة: BC
السؤال #24
Which Cisco security solution stops exfiltration using HTTPS?
A. isco AnyConnect
B. isco FTD
C. isco ASA
D. isco CT
عرض الإجابة
اجابة صحيحة: D
السؤال #25
What is a difference between FlexVPN and DMVPN?
A. lexVPN uses IKEv2
B. lexVPN uses IKEv1 or IKEv2
C. MVPN uses only IKEv1
D. MVPN uses IKEv1 or IKEv2
عرض الإجابة
اجابة صحيحة: A
السؤال #26
What is the purpose of CA in a PKI?
A. o create the private key for a digital certificate
B. o validate the authenticity of a digital certificate
C. o certify the ownership of a public key by the named subject
D. o issue and revoke digital certificate
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
A. ommand-and-control communication
B. ata exfiltration
C. etwork footprinting
D. alware installatio
عرض الإجابة
اجابة صحيحة: B
السؤال #28
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
A. he hash being uploaded is part of a set in an incorrect format
B. he engineer is attempting to upload a hash created using MD5 instead of SHA-256
C. he file being uploaded is incompatible with simple detections and must use advanced detections
D. he engineer is attempting to upload a file instead of a hash
عرض الإجابة
اجابة صحيحة: B
السؤال #29
While using Cisco Secure Firewall's Security Intelligence pollcles, which two criterla is blocking based upon?
A. rotocol IDs
B. AC addresses
C. P addresses
D. ort numbers
E. RL
عرض الإجابة
اجابة صحيحة: CE
السؤال #30
Which two products are used to forecast capacity needs accurately in real time?
A. isco AppDynamics
B. isco Tetration
C. isco Cloudlock
D. isco Umbrella
E. isco Workload Optimization Manage
عرض الإجابة
اجابة صحيحة: AE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: