Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

(Multiple Choice)
4.7/5
(38)

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

(Multiple Choice)
4.8/5
(32)

Which two activities can be done using Cisco DNA Center? (Choose two.)

(Multiple Choice)
4.9/5
(32)

How does DNS Tunneling exfiltrate data?

(Multiple Choice)
4.8/5
(31)

Which two key and block sizes are valid for AES? (Choose two.)

(Multiple Choice)
4.9/5
(32)

How is ICMP used an exfiltration technique?

(Multiple Choice)
4.8/5
(39)

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?

(Multiple Choice)
4.9/5
(27)

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

(Multiple Choice)
4.9/5
(32)

What is the function of the Context Directory Agent?

(Multiple Choice)
4.8/5
(31)

In which type of attach does the attacker insert their machine between two hosts that are communicating with each other?

(Multiple Choice)
4.7/5
(37)

What is a prerequisite when integrating a Cisco ISE server and an AD domain?

(Multiple Choice)
4.8/5
(34)

Which attack is commonly associated with C and C++ programming languages?

(Multiple Choice)
4.9/5
(23)

An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?

(Multiple Choice)
4.7/5
(42)

What is the function of SDN southbound API protocols?

(Multiple Choice)
4.8/5
(45)

What is managed by Cisco Security Manager?

(Multiple Choice)
4.9/5
(38)

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal?

(Multiple Choice)
4.7/5
(43)

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

(Multiple Choice)
4.7/5
(34)

Which attack is preventable by Cisco ESA but not by the Cisco WSA?

(Multiple Choice)
4.7/5
(30)

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

(Multiple Choice)
4.9/5
(45)

Which compliance status is shown when a configured posture policy requirement is not met?

(Multiple Choice)
4.8/5
(26)
Showing 41 - 60 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)