Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

(Multiple Choice)
4.8/5
(38)

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two.)

(Multiple Choice)
4.7/5
(40)

In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two.)

(Multiple Choice)
4.8/5
(30)

When wired 802.1X authentication is implemented, which two components are required? (Choose two.)

(Multiple Choice)
4.7/5
(35)

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

(Multiple Choice)
4.9/5
(31)

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

(Multiple Choice)
4.9/5
(37)

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

(Multiple Choice)
4.8/5
(37)

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

(Multiple Choice)
4.9/5
(39)

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

(Multiple Choice)
4.8/5
(40)

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

(Multiple Choice)
4.9/5
(40)

What is a characteristic of a bridge group in ASA Firewall transparent mode?

(Multiple Choice)
4.8/5
(42)

What are two list types within Cisco AMP for Endpoints Outbreak Control? (Choose two.)

(Multiple Choice)
4.9/5
(30)

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

(Multiple Choice)
4.9/5
(31)

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

(Multiple Choice)
4.8/5
(29)

Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

(Multiple Choice)
4.9/5
(46)

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

(Multiple Choice)
4.9/5
(36)

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

(Multiple Choice)
4.8/5
(38)

  Refer to the exhibit. A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration? Refer to the exhibit. A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?

(Multiple Choice)
4.8/5
(35)

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

(Multiple Choice)
4.7/5
(36)

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)

(Multiple Choice)
4.9/5
(32)
Showing 121 - 140 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)