Exam 41: Implementing Cisco Collaboration Core Technologies (CLCOR)

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

(Multiple Choice)
5.0/5
(31)

Which deployment model is the most secure when considering risks to cloud adoption?

(Multiple Choice)
4.8/5
(27)

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

(Multiple Choice)
4.8/5
(37)

Which benefit does endpoint security provide the overall security posture of an organization?

(Multiple Choice)
4.9/5
(34)

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

(Multiple Choice)
4.8/5
(40)

A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category. Which reputation score should be selected to accomplish this goal?

(Multiple Choice)
4.8/5
(32)

An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?

(Multiple Choice)
4.8/5
(32)

An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?

(Multiple Choice)
4.8/5
(32)

With which components does a southbound API within a software-defined network architecture communicate?

(Multiple Choice)
5.0/5
(44)

What provides visibility and awareness into what is currently occurring on the network?

(Multiple Choice)
4.9/5
(38)

  Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output? Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?

(Multiple Choice)
4.8/5
(42)

A Cisco FirePower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two.)

(Multiple Choice)
4.8/5
(43)

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

(Multiple Choice)
4.9/5
(32)

An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network. What action will resolve this issue?

(Multiple Choice)
4.9/5
(33)

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

(Multiple Choice)
4.8/5
(34)

A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the Interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?

(Multiple Choice)
4.8/5
(22)

Which form of attack is launched using botnets?

(Multiple Choice)
4.9/5
(41)

What must be used to share data between multiple security products?

(Multiple Choice)
4.8/5
(36)

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

(Multiple Choice)
4.9/5
(28)

What is a characteristic of Firepower NGIPS inline deployment mode?

(Multiple Choice)
4.9/5
(37)
Showing 161 - 180 of 213
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)