Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a feature of the open platform capabilities of Cisco DNA Center?

(Multiple Choice)
4.9/5
(38)

Which command enables 802.1X globally on a Cisco switch?

(Multiple Choice)
4.9/5
(23)

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

(Multiple Choice)
4.8/5
(40)

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

(Multiple Choice)
4.8/5
(35)

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?

(Multiple Choice)
4.8/5
(27)

A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?

(Multiple Choice)
4.7/5
(34)

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

(Multiple Choice)
4.9/5
(32)

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

(Multiple Choice)
5.0/5
(39)

An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?

(Multiple Choice)
4.8/5
(44)

Which two capabilities does TAXII support? (Choose two.)

(Multiple Choice)
4.7/5
(39)

A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?

(Multiple Choice)
4.8/5
(33)

What is the function of Cisco Cloudlock for data security?

(Multiple Choice)
4.9/5
(24)

A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)

(Multiple Choice)
4.8/5
(36)

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)

(Multiple Choice)
4.7/5
(27)

A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?

(Multiple Choice)
4.8/5
(34)

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

(Multiple Choice)
4.9/5
(42)

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0383320506 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN?

(Multiple Choice)
5.0/5
(30)

An organization has a Cisco ESA set up with DLP policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide this capability?

(Multiple Choice)
4.8/5
(36)

  Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing? Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?

(Multiple Choice)
4.9/5
(34)

What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two.)

(Multiple Choice)
4.9/5
(29)
Showing 81 - 100 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)