لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
A. Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing access on the network
B. Set up a profiling policy in Cisco Identity Services Engine to check an endpoint patch level before allowing access on the network
C. Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met before allowing access on the network
D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network
E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities patched in a timely fashion
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
A. Check integer, float, or Boolean string parameters to ensure accurate values
B. Use prepared statements and parameterized queries
C. Secure the connection between the web and the app tier
D. Write SQL code instead of using object-relational mapping libraries
E. Block SQL code execution in the web application database login
عرض الإجابة
اجابة صحيحة: CD
السؤال #3
Under which two circumstances is a CoA issued? (Choose two.)
A. A new authentication rule was added to the policy on the Policy Service node
B. An endpoint is deleted on the Identity Service Engine server
C. A new Identity Source Sequence is created and referenced in the authentication policy
D. An endpoint is profiled for the first time
E. A new Identity Service Engine server is added to the deployment with the Administration persona
عرض الإجابة
اجابة صحيحة: BE
السؤال #4
What is a result of the configuration?
A. Traffic from the DMZ network is redirected
B. Traffic from the inside network is redirected
C. All TCP traffic is redirected
D. Traffic from the inside and DMZ networks is redirected
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
A. PaaS
B. XaaSC
D. SaaS
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
A. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B. Cisco FTDv with one management interface and two traffic interfaces configured
C. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D. Cisco FTDv with two management interfaces and one traffic interface configured
E. Cisco FTDv configured in routed mode and IPv6 configured
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
A. Patch for cross-site scripting
B. Perform backups to the private cloud
C. Protect against input validation and character escapes in the endpoint
D. Install a spam and virus email filter
E. Protect systems with an up-to-date antimalware program
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: