لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is a difference between FlexVPN and DMVPN?
A. lexVPN uses IKEv2
B. lexVPN uses IKEv1 or IKEv2
C. MVPN uses only IKEv1
D. MVPN uses IKEv1 or IKEv2
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which two services must remain as on premises equipment when a hybrid email solution is deployed?
A. LP
B. ntivirus
C. ntispam
D. DoS
E. ncryptio
عرض الإجابة
اجابة صحيحة: AE
السؤال #3
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
A. y using Active Directory group policies to enforce Umbrella DNS servers
B. y using the Umbrella roaming client
C. y modifying the registry for DNS lookups
D. y forcing DNS queries to the corporate name server
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service?
A. nsure that interfaces are configured with the error-disable detection and recovery feature
B. nable the snmp-server enable traps command and wait 300 seconds
C. se EEM to have the ports return to service automatically in less than 300 seconds
D. nter the shutdown and no shutdown commands on the interfaces
E. ave Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the preconfigured interval
عرض الإجابة
اجابة صحيحة: AD
السؤال #5
Which two solutions help combat social engineering and phishing at the endpoint level?
A. isco Umbrella
B. isco ISE
C. isco Duo Security
D. isco DNA Center
E. isco TrustSe
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
What describes the function of the crypto isakmp key Cisco address 0.0.0.0 0.0.0.0 command when configuring an IPsec VPN tunnel on a Cisco IOS router?
A. t drops spoofed VPN traffic using 0
B. t configures the IP address and subnet mask of the VPN server
C. t defines that all data is going to be encrypted via the VPN
D. t allows connections from any hosts using the defined preshared key
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?
A. ransparent mode
B. outed mode
C. ultiple context mode
D. ultiple zone mod
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
A. haring
B. uthoring
C. onsumption
D. nalysi
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An organization has a Cisco Secure Cloud Analytics deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network. What actionwill resolve this issue?
A. eploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud
B. onfigure security appliances to send syslogs to Cisco Stealthwatch Cloud
C. eploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud
D. onfigure security appliances to send NetFlow to Cisco Stealthwatch Cloud
عرض الإجابة
اجابة صحيحة: A
السؤال #10
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?
A. ingle sign-on
B. ultiple factor auth
C. entral web auth
D. ocal web auth
E. ACACS
عرض الإجابة
اجابة صحيحة: CD
السؤال #11
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
A. he hash being uploaded is part of a set in an incorrect format
B. he engineer is attempting to upload a hash created using MD5 instead of SHA-256
C. he file being uploaded is incompatible with simple detections and must use advanced detections
D. he engineer is attempting to upload a file instead of a hash
عرض الإجابة
اجابة صحيحة: B
السؤال #12
An engineer notices traffic interruptions on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?
A. mbedded event monitoring
B. ridge Protocol Data Unit guard
C. ccess control lists
D. torm Contro
عرض الإجابة
اجابة صحيحة: D
السؤال #13
What are two examples of code injection vulnerabilities?
A. QL injection
B. ross-site scripting
C. ession hijacking
D. rbitrary command injection
E. ML external entity injectio
عرض الإجابة
اجابة صحيحة: AB
السؤال #14
Which security solution is used for posture assessment of the endpoints in a BYOD solution?
A. isco FTD
B. isco Umbrella
C. isco ISE
D. isco AS
عرض الإجابة
اجابة صحيحة: C
السؤال #15
What are two examples of code injection vulnerabilities?
A. QL injection
B. ross-site scripting
C. ession hijacking
D. rbitrary command injection
E. ML external entity injectio
عرض الإجابة
اجابة صحيحة: AB
السؤال #16
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
A. P-Layer Enforcement is not configured
B. ntelligent proxy and SSL decryption is disabled in the policy
C. lient computers do not have an SSL certificate deployed from an internal CA server
D. lient computers do not have the Cisco Umbrella Root CA certificate installed
عرض الإجابة
اجابة صحيحة: D
السؤال #17
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
A. ile conviction
B. ile manager
C. ile discovery
D. ile prevalenc
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
A. isco Application Visibility and Control
B. isco DNA Center
C. isco Model Driven Telemetry
D. isco Security Intelligenc
عرض الإجابة
اجابة صحيحة: A
السؤال #19
What is a benefit of a Cisco ESAv as compared to a physical ESA?
A. rovides an automated setup process
B. rovides faster performance
C. implifies the distribution of software updates
D. nables the allocation of additional resource
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: