Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

(Multiple Choice)
4.8/5
(34)

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

(Multiple Choice)
4.8/5
(21)

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

(Multiple Choice)
4.9/5
(36)

Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two.)

(Multiple Choice)
4.8/5
(39)

How is ICMP used as an exfiltration technique?

(Multiple Choice)
4.8/5
(32)

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)

(Multiple Choice)
4.9/5
(30)

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

(Multiple Choice)
4.8/5
(33)

Why would a user choose an on-premises ESA versus the CES solution?

(Multiple Choice)
4.8/5
(31)

What is the purpose of the My Devices Portal in a Cisco ISE environment?

(Multiple Choice)
4.9/5
(44)

A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?

(Multiple Choice)
4.7/5
(36)

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

(Multiple Choice)
4.7/5
(34)

  Refer to the exhibit. What will happen when the Python script is executed? Refer to the exhibit. What will happen when the Python script is executed?

(Multiple Choice)
5.0/5
(35)

In which cloud services model is the tenant responsible for virtual machine OS patching?

(Multiple Choice)
4.9/5
(35)

Which technology is used to improve web traffic performance by proxy caching?

(Multiple Choice)
4.7/5
(32)

What is a characteristic of traffic storm control behavior?

(Multiple Choice)
4.9/5
(35)

A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

(Multiple Choice)
4.8/5
(28)

An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

(Multiple Choice)
4.8/5
(32)

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two.)

(Multiple Choice)
4.8/5
(35)

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

(Multiple Choice)
4.9/5
(32)

  Refer to the exhibit. What will happen when this Python script is run? Refer to the exhibit. What will happen when this Python script is run?

(Multiple Choice)
5.0/5
(39)
Showing 101 - 120 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)