Exam 28: Implementing Cisco Collaboration Applications (CLICA)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two API capabilities are available on Cisco Identity Services Engine? (Choose two.)

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B,D

Which API is used to query if the domain "example.com" has been flagged as malicious by the Cisco Security Labs team?

Free
(Multiple Choice)
4.7/5
(41)
Correct Answer:
Verified

B

Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?

Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
Verified

B

  Refer to the exhibit. What is the purpose of the API represented by this URL? Refer to the exhibit. What is the purpose of the API represented by this URL?

(Multiple Choice)
4.8/5
(29)

What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?

(Multiple Choice)
4.8/5
(37)

For which two programming languages does Cisco offer an SDK for Cisco pxGrid 1.0? (Choose two.)

(Multiple Choice)
4.8/5
(40)

Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?

(Multiple Choice)
4.9/5
(32)

Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)

(Multiple Choice)
4.8/5
(37)

Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?

(Multiple Choice)
4.9/5
(36)

  Refer to the exhibit. Which URL returned the data? Refer to the exhibit. Which URL returned the data?

(Multiple Choice)
4.8/5
(29)

When the URI "/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/accesspolicies" is used to make a POST request, what does "e276abec-e0f2-11e3-8169-6d9ed49b625f" represent?

(Multiple Choice)
5.0/5
(41)

The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/reporting/mail_incoming_traffic_summary/detected_amp?startDate=2016-09-10T19:00:00.000Z&endDate=2018-09-24T23:00:00.000Z&device_type=esa&device_name=esa01 . What does this GET call return?

(Multiple Choice)
4.8/5
(33)

  Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run? Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run?

(Multiple Choice)
4.8/5
(39)

  Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.) Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.)

(Multiple Choice)
4.8/5
(33)

Which description of synchronous calls to an API is true?

(Multiple Choice)
4.9/5
(33)

Which two commands create a new local source code branch? (Choose two.)

(Multiple Choice)
4.9/5
(28)

What are two benefits of Ansible when managing security platforms? (Choose two.)

(Multiple Choice)
4.7/5
(33)

  Refer to the exhibit. What does the response from the API contain when this code is executed? Refer to the exhibit. What does the response from the API contain when this code is executed?

(Multiple Choice)
4.8/5
(40)

After changes are made to the Cisco Firepower Threat Defense configuration using the Cisco Firepower Device Manager API, what must be done to ensure that the new policy is activated?

(Multiple Choice)
4.7/5
(28)

What are two advantages of Python virtual environments? (Choose two.)

(Multiple Choice)
5.0/5
(32)
Showing 1 - 20 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)