Exam 28: Implementing Cisco Collaboration Applications (CLICA)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which two APIs are available from Cisco ThreatGRID? (Choose two.)

(Multiple Choice)
4.8/5
(33)

What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)

(Multiple Choice)
4.8/5
(32)

  Refer to the exhibit. Which expression prints the text 802.1x? Refer to the exhibit. Which expression prints the text "802.1x"?

(Multiple Choice)
4.9/5
(39)

  Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result? Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result?

(Multiple Choice)
4.7/5
(34)

Which API is designed to give technology partners the ability to send security events from their platform/service/appliance within a mutual customer's environment to the Umbrella cloud for enforcement?

(Multiple Choice)
4.8/5
(38)

  Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert? Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?

(Multiple Choice)
4.8/5
(39)

In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which has a GUID of 6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 ?

(Multiple Choice)
4.7/5
(39)

Which two statements describe the characteristics of API styles for REST and RPC? (Choose two.)

(Multiple Choice)
4.9/5
(37)

Which request searches for a process window in Cisco ThreatGRID that contains the word "secret"?

(Multiple Choice)
4.8/5
(42)

  Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.) Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.)

(Multiple Choice)
4.8/5
(27)

Which query parameter is required when using the reporting API of Cisco Security Management Appliances?

(Multiple Choice)
4.9/5
(27)

Which two URI parameters are needed for the Cisco Stealthwatch Top Alarm Host v1 API? (Choose two.)

(Multiple Choice)
4.9/5
(42)

A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API. Which action does the engineer take to achieve the goal?

(Multiple Choice)
4.7/5
(30)

Which API capability is available on Cisco Firepower devices?

(Multiple Choice)
4.8/5
(38)

Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

(Multiple Choice)
4.8/5
(36)

  Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action? Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action?

(Multiple Choice)
4.8/5
(42)

  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal? Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?

(Multiple Choice)
4.8/5
(38)

Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)

(Multiple Choice)
4.8/5
(37)

  Refer to the exhibit. A Python function named query has been developed and the goal is to use it to query the service com.cisco.ise.session via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50? Refer to the exhibit. A Python function named "query" has been developed and the goal is to use it to query the service "com.cisco.ise.session" via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50?

(Multiple Choice)
4.9/5
(34)
Showing 21 - 39 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)