Topic 2: Exam Pool B
Why is it important to have logical security controls on endpoints even though the users are
trained to spot security threats and the network devices already help prevent them?
A.
to prevent theft of the endpoints
B.
because defense-in-depth stops at the network
C.
to expose the endpoint to more threats
D.
because human error or insider threats will still exist
because human error or insider threats will still exist
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
A.
Multiple NetFlow collectors are supported
B.
Advanced NetFlow v9 templates and legacy v5 formatting are supported
C.
Secure NetFlow connections are optimized for Cisco Prime Infrastructure
D.
Flow-create events are delayed
Advanced NetFlow v9 templates and legacy v5 formatting are supported
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A.
STIX
B.
XMPP
C.
pxGrid
D.
SMTP
STIX
TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport
What is the purpose of the My Devices Portal in a Cisco ISE environment?
A.
to register new laptops and mobile devices
B.
to request a newly provisioned mobile device
C.
to provision userless and agentless systems
D.
to manage and deploy antivirus definitions and patches on systems owned by the end
user
to register new laptops and mobile devices
An organization recently installed a Cisco WSA and would like to take advantage of the
AVC engine to allow the organization to create a policy to control application specific
activity. After enabling the AVC engine, what must be done to implement this?
A.
Use security services to configure the traffic monitor, .
B.
Use URL categorization to prevent the application traffic
C.
Use an access policy group to configure application control settings
D.
Use web security reporting to validate engine functionality
Use an access policy group to configure application control settings
The Application Visibility and Control (AVC) engine
lets you create policies to control application activity on the network without having to fully
understand the underlying technology of each application. You can configure application
control settings in Access Policy groups. You can block or allow applications individually or
according to application type. You can also apply controls to particular application types.
Page 11 out of 126 Pages |
Previous |