Topic 1: Exam Pool A
What is the function of Cisco Cloudlock for data security?
A.
data loss prevention
B.
controls malicious cloud apps
C.
detects anomalies
D.
user and entity behavior analytics
data loss prevention
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
A.
Common Security Exploits
B.
Common Vulnerabilities and Exposures
C.
Common Exploits and Vulnerabilities
D.
Common Vulnerabilities, Exploits and Threats
Common Vulnerabilities and Exposures
CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
A.
data exfiltration
B.
command and control communication
C.
intelligent proxy
D.
snort
E.
URL categorization
data exfiltration
command and control communication
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatanalytics/
at-aglance-c45-736555.pdf
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
A.
IP Blacklist Center
B.
File Reputation Center
C.
AMP Reputation Center
D.
IP and Domain Reputation Center
IP and Domain Reputation Center
Which form of attack is launched using botnets?
A.
EIDDOS
B.
virus
C.
DDOS
D.
TCP flood
DDOS
ExplanationA botnet is a collection of internet-connected devices infected by
malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet
attacks, which include malicious activities such as credentialsleaks, unauthorized access,
data theft and DDoS attacks.
Page 2 out of 126 Pages |
Previous |