Deck 28: Implementing Cisco Collaboration Applications (CLICA)

Full screen (f)
exit full mode
Question
In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which has a GUID of 6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 ?

A) https://api.amp.cisco.com/v1/endpoints?group []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 https://api.amp.cisco.com/v1/endpoints?group []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
B) https://api.amp.cisco.com/v1/computers?group_guid []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 https://api.amp.cisco.com/v1/computers?group_guid
C) https://api.amp.cisco.com/v1/computers?group_guid-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
D) https://api.amp.cisco.com/v1/endpoints?group-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
Use Space or
up arrow
down arrow
to flip the card.
Question
<strong>  Refer to the exhibit. A Python function named query has been developed and the goal is to use it to query the service com.cisco.ise.session via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50?</strong> A) query(config, secret, getSessionByIpAddress/10.0.0.50, ipAddress) B) query(config, 10.0.0.50, url, payload) C) query(config, secret, url, 10.0.0.50) D) query(config, secret, url, '{ipAddress: 10.0.0.50}') <div style=padding-top: 35px> Refer to the exhibit. A Python function named "query" has been developed and the goal is to use it to query the service "com.cisco.ise.session" via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50?

A) query(config, secret, "getSessionByIpAddress/10.0.0.50", "ipAddress")
B) query(config, "10.0.0.50", url, payload)
C) query(config, secret, url, "10.0.0.50")
D) query(config, secret, url, '{"ipAddress": "10.0.0.50"}')
Question
A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API. Which action does the engineer take to achieve the goal?

A) Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies .
B) Make a POST request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a POST request to the URI
C) Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.
D) Make a PUT request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a PUT request to the URI
Question
Which API is designed to give technology partners the ability to send security events from their platform/service/appliance within a mutual customer's environment to the Umbrella cloud for enforcement?

A) Cisco Umbrella Management API
B) Cisco Umbrella Security Events API
C) Cisco Umbrella Enforcement API
D) Cisco Umbrella Reporting API
Question
For which two programming languages does Cisco offer an SDK for Cisco pxGrid 1.0? (Choose two.)

A) Python
B) Perl
C) Java
D) C
E) JavaScript
Question
What are two advantages of Python virtual environments? (Choose two.)

A) Virtual environments can move compiled modules between different platforms.
B) Virtual environments permit non-administrative users to install packages.
C) The application code is run in an environment that is destroyed upon exit.
D) Virtual environments allow for stateful high availability.
E) Virtual environments prevent packaging conflicts between multiple Python projects.
Question
Which two API capabilities are available on Cisco Identity Services Engine? (Choose two.)

A) Platform Configuration APIs
B) Monitoring REST APIs
C) Performance Management REST APIs
D) External RESTful Services APIs
E) Internal RESTful Services APIs
Question
<strong>  Refer to the exhibit. Which URL returned the data?</strong> A) https://api.amp.cisco.com/v1/computers B) https://api.amp.cisco.com/v0/computers C) https://amp.cisco.com/api/v0/computers D) https://amp.cisco.com/api/v1/computers <div style=padding-top: 35px> Refer to the exhibit. Which URL returned the data?

A) https://api.amp.cisco.com/v1/computers
B) https://api.amp.cisco.com/v0/computers
C) https://amp.cisco.com/api/v0/computers
D) https://amp.cisco.com/api/v1/computers
Question
Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?

A) curl -X PUT"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/{tenant_id}/tags
B) curl -X POST -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/tags
C) curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/{tenant_id}/tags
D) curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/tags
Question
Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?

A) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
<strong>  Refer to the exhibit. What does the response from the API contain when this code is executed?</strong> A) error message and status code of 403 B) newly created domains in Cisco Umbrella Investigate C) updated domains in Cisco Umbrella Investigate D) status and security details for the domains <div style=padding-top: 35px> Refer to the exhibit. What does the response from the API contain when this code is executed?

A) error message and status code of 403
B) newly created domains in Cisco Umbrella Investigate
C) updated domains in Cisco Umbrella Investigate
D) status and security details for the domains
Question
After changes are made to the Cisco Firepower Threat Defense configuration using the Cisco Firepower Device Manager API, what must be done to ensure that the new policy is activated?

A) Submit a POST to the /api/fdm/latest/operational/deploy URI. Submit a POST to the /api/fdm/latest/operational/deploy URI.
B) Submit a GET to the /api/fdm/latest/operational/deploy URI. Submit a GET to the
C) Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy URI. Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy
D) Submit a POST to the /api/fdm/latest/devicesettings/pushpolicy URI.
Question
Which description of synchronous calls to an API is true?

A) They can be used only within single-threaded processes.
B) They pause execution and wait for the response.
C) They always successfully return within a fixed time.
D) They can be used only for small requests.
Question
When the URI "/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/accesspolicies" is used to make a POST request, what does "e276abec-e0f2-11e3-8169-6d9ed49b625f" represent?

A) API token
B) domain UUID
C) access policy UUID
D) object UUID
Question
Which two URI parameters are needed for the Cisco Stealthwatch Top Alarm Host v1 API? (Choose two.)

A) startAbsolute
B) externalGeos
C) tenantId
D) intervalLength
E) tagID
Question
<strong>  Refer to the exhibit. Which expression prints the text 802.1x?</strong> A) print(quiz[0]['choices']['b']) B) print(quiz['choices']['b']) C) print(quiz[0]['choices']['b']['802.1x']) D) print(quiz[0]['question']['choices']['b']) <div style=padding-top: 35px> Refer to the exhibit. Which expression prints the text "802.1x"?

A) print(quiz[0]['choices']['b'])
B) print(quiz['choices']['b'])
C) print(quiz[0]['choices']['b']['802.1x'])
D) print(quiz[0]['question']['choices']['b'])
Question
<strong>  Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.)</strong> A) Add recordLimit. followed by an integer (key:value) to the flow_data. B) Add a for loop at the end of the script, and print each key value pair separately. Add a for loop at the end of the script, and print each key value pair separately. C) Add flowLimit, followed by an integer (key:value) to the flow_data. D) Change the startDateTime and endDateTime values to include smaller time intervals. E) Change the startDate and endDate values to include smaller date intervals. <div style=padding-top: 35px> Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.)

A) Add recordLimit. followed by an integer (key:value) to the flow_data.
B) Add a for loop at the end of the script, and print each key value pair separately. Add a for loop at the end of the script, and print each key value pair separately.
C) Add flowLimit, followed by an integer (key:value) to the flow_data.
D) Change the startDateTime and endDateTime values to include smaller time intervals.
E) Change the startDate and endDate values to include smaller date intervals.
Question
<strong>  Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result?</strong> A) Add message ID information to the URL string as a URI. B) Run the script and parse through the returned data to find the desired message. C) Add message ID information to the URL string as a parameter. D) Add message ID information to the headers. <div style=padding-top: 35px> Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result?

A) Add message ID information to the URL string as a URI.
B) Run the script and parse through the returned data to find the desired message.
C) Add message ID information to the URL string as a parameter.
D) Add message ID information to the headers.
Question
Which API capability is available on Cisco Firepower devices?

A) Firepower Management Center - Sockets API
B) Firepower Management Center - eStreamer API
C) Firepower Management Center - Camera API
D) Firepower Management Center - Host Output API
Question
Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)

A) user activity events
B) intrusion events
C) file events
D) intrusion event extra data
E) malware events
Question
What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)

A) eStreamer is used to get sources for intelligence services.
B) eStreamer is used to send malware event data.
C) eStreamer is used to get a list of access control policies.
D) eStreamer is used to send policy data.
E) eStreamer is used to send intrusion event data.
Question
<strong>  Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run?</strong> A) reporting group with the name web_malware_category_malware_name_user_detail B) data for specified dates C) reporting group with the name blocked_malware D) data in the queried category <div style=padding-top: 35px> Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run?

A) reporting group with the name web_malware_category_malware_name_user_detail
B) data for specified dates
C) reporting group with the name blocked_malware
D) data in the queried category
Question
Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)

A) email
B) Microsoft Word file
C) FTP
D) web
E) csv file
Question
What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?

A) Report on flow data during a customizable time period.
B) Operate and return alerts discovered from infrastructure observations.
C) Return current configuration data of Cisco Stealthwatch Cloud infrastructure.
D) Create snapshots of supported Cisco Stealthwatch Cloud infrastructure.
Question
<strong>  Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action?</strong> A) The given code does not execute because the mandatory parameters, source, destination, and services are missing. B) The given code does not execute because it uses the HTTP method PUT. It should use the HTTP method POST. C) The appropriate rule is updated with the source, destination, services, and other fields set to Any and the action set to DENY. Traffic to the production web server is disallowed, as expected. D) A new rule is created with the source, destination, services, and other fields set to Any and the action set to DENY. Traffic to the production web server is disallowed, as expected. <div style=padding-top: 35px> Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action?

A) The given code does not execute because the mandatory parameters, source, destination, and services are missing.
B) The given code does not execute because it uses the HTTP method "PUT". It should use the HTTP method "POST".
C) The appropriate rule is updated with the source, destination, services, and other fields set to "Any" and the action set to "DENY". Traffic to the production web server is disallowed, as expected.
D) A new rule is created with the source, destination, services, and other fields set to "Any" and the action set to "DENY". Traffic to the production web server is disallowed, as expected.
Question
What are two benefits of Ansible when managing security platforms? (Choose two.)

A) End users can be identified and tracked across a network.
B) Network performance issues can be identified and automatically remediated.
C) Policies can be updated on multiple devices concurrently, which reduces outage windows.
D) Anomalous network traffic can be detected and correlated.
E) The time that is needed to deploy a change is reduced, compared to manually applying the change.
Question
The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/reporting/mail_incoming_traffic_summary/detected_amp?startDate=2016-09-10T19:00:00.000Z&endDate=2018-09-24T23:00:00.000Z&device_type=esa&device_name=esa01 . What does this GET call return?

A) values of all counters of a counter group, with the device group name and device type for web
B) value of a specific counter from a counter group, with the device name and type for email
C) value of a specific counter from a counter group, with the device name and type for web
D) values of all counters of a counter group, with the device group name and device type for email
Question
Which query parameter is required when using the reporting API of Cisco Security Management Appliances?

A) device_type
B) query_type
C) filterValue
D) startDate + endDate
Question
Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

A) /tenants/{tenantId}/policy/system/host-policy
B) /tenants/{tenantId}/policy/system/role-policy
C) /tenants/{tenantId}/policy/system
D) /tenants/{tenantId}/policy/system/{policyId}
Question
<strong>  Refer to the exhibit. What is the purpose of the API represented by this URL?</strong> A) Getting or setting intrusion policies in FMC B) Creating an intrusion policy in FDM C) Updating access policies D) Getting the list of intrusion policies configured in FDM <div style=padding-top: 35px> Refer to the exhibit. What is the purpose of the API represented by this URL?

A) Getting or setting intrusion policies in FMC
B) Creating an intrusion policy in FDM
C) Updating access policies
D) Getting the list of intrusion policies configured in FDM
Question
<strong>  Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.)</strong> A) Add params parameter in the get and assign in the {return: 10} value. Add params parameter in the get and assign in the {return: 10} value. B) Add ?limit=10 to the end of the URL string. Add ?limit=10 to the end of the URL string. C) Add params parameter in the get and assign in the {limit: 10} value. {limit: 10} D) Add ?find=10 to the end of the URL string. ?find=10 E) Add ?return=10 to the end of the URL string. ?return=10 <div style=padding-top: 35px> Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.)

A) Add params parameter in the get and assign in the {"return": "10"} value. Add params parameter in the get and assign in the {"return": "10"} value.
B) Add ?limit=10 to the end of the URL string. Add ?limit=10 to the end of the URL string.
C) Add params parameter in the get and assign in the {"limit": "10"} value. {"limit": "10"}
D) Add ?find=10 to the end of the URL string. ?find=10
E) Add ?return=10 to the end of the URL string. ?return=10
Question
<strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px> Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?

A) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
Which request searches for a process window in Cisco ThreatGRID that contains the word "secret"?

A) /api/v2/search/submissions?term=processwindow&title=secret
B) /api/v2/search/submissions?term=processwindow&q=secret
C) /api/v2/search/submissions?term=window&title=secret
D) /api/v2/search/submissions?term=process&q=secret
Question
Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?

A) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
B) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
C) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
D) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)   <div style=padding-top: 35px>
Question
Which two APIs are available from Cisco ThreatGRID? (Choose two.)

A) Access
B) User Scope
C) Data
D) Domains
E) Curated Feeds
Question
<strong>  Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?</strong> A) print(response[data][0]) B) print(response[results][0]) C) print(response.json()[data][0]) D) print(response.json()[results][0]) <div style=padding-top: 35px> Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?

A) print(response[data][0])
B) print(response[results][0])
C) print(response.json()[data][0])
D) print(response.json()[results][0])
Question
Which two statements describe the characteristics of API styles for REST and RPC? (Choose two.)

A) REST-based APIs function in a similar way to procedures.
B) REST-based APIs are used primarily for CRUD operations.
C) REST and RPC API styles are the same.
D) RPC-based APIs function in a similar way to procedures.
E) RPC-based APIs are used primarily for CRUD operations.
Question
Which two commands create a new local source code branch? (Choose two.)

A) git checkout -b new_branch
B) git branch -b new_branch
C) git checkout -f new_branch
D) git branch new_branch
E) git branch -m new_branch
Question
Which API is used to query if the domain "example.com" has been flagged as malicious by the Cisco Security Labs team?

A) https://s-platform.api.opendns.com/1.0/events?example.com
B) https://investigate.api.umbrella.com/domains/categorization/example.com
C) https://investigate.api.umbrella.com/domains/volume/example.com
D) https://s-platform.api.opendns.com/1.0/domains?example.com
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 28: Implementing Cisco Collaboration Applications (CLICA)
1
In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which has a GUID of 6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 ?

A) https://api.amp.cisco.com/v1/endpoints?group []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 https://api.amp.cisco.com/v1/endpoints?group []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
B) https://api.amp.cisco.com/v1/computers?group_guid []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 https://api.amp.cisco.com/v1/computers?group_guid
C) https://api.amp.cisco.com/v1/computers?group_guid-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
D) https://api.amp.cisco.com/v1/endpoints?group-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
https://api.amp.cisco.com/v1/computers?group_guid []=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03 https://api.amp.cisco.com/v1/computers?group_guid
2
<strong>  Refer to the exhibit. A Python function named query has been developed and the goal is to use it to query the service com.cisco.ise.session via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50?</strong> A) query(config, secret, getSessionByIpAddress/10.0.0.50, ipAddress) B) query(config, 10.0.0.50, url, payload) C) query(config, secret, url, 10.0.0.50) D) query(config, secret, url, '{ipAddress: 10.0.0.50}') Refer to the exhibit. A Python function named "query" has been developed and the goal is to use it to query the service "com.cisco.ise.session" via Cisco pxGrid 2.0 APIs. How is the function called, if the goal is to identify the sessions that are associated with the IP address 10.0.0.50?

A) query(config, secret, "getSessionByIpAddress/10.0.0.50", "ipAddress")
B) query(config, "10.0.0.50", url, payload)
C) query(config, secret, url, "10.0.0.50")
D) query(config, secret, url, '{"ipAddress": "10.0.0.50"}')
query(config, secret, url, '{"ipAddress": "10.0.0.50"}')
3
A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API. Which action does the engineer take to achieve the goal?

A) Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies .
B) Make a POST request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a POST request to the URI
C) Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.
D) Make a PUT request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies . Make a PUT request to the URI
Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.
4
Which API is designed to give technology partners the ability to send security events from their platform/service/appliance within a mutual customer's environment to the Umbrella cloud for enforcement?

A) Cisco Umbrella Management API
B) Cisco Umbrella Security Events API
C) Cisco Umbrella Enforcement API
D) Cisco Umbrella Reporting API
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
For which two programming languages does Cisco offer an SDK for Cisco pxGrid 1.0? (Choose two.)

A) Python
B) Perl
C) Java
D) C
E) JavaScript
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
What are two advantages of Python virtual environments? (Choose two.)

A) Virtual environments can move compiled modules between different platforms.
B) Virtual environments permit non-administrative users to install packages.
C) The application code is run in an environment that is destroyed upon exit.
D) Virtual environments allow for stateful high availability.
E) Virtual environments prevent packaging conflicts between multiple Python projects.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Which two API capabilities are available on Cisco Identity Services Engine? (Choose two.)

A) Platform Configuration APIs
B) Monitoring REST APIs
C) Performance Management REST APIs
D) External RESTful Services APIs
E) Internal RESTful Services APIs
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
<strong>  Refer to the exhibit. Which URL returned the data?</strong> A) https://api.amp.cisco.com/v1/computers B) https://api.amp.cisco.com/v0/computers C) https://amp.cisco.com/api/v0/computers D) https://amp.cisco.com/api/v1/computers Refer to the exhibit. Which URL returned the data?

A) https://api.amp.cisco.com/v1/computers
B) https://api.amp.cisco.com/v0/computers
C) https://amp.cisco.com/api/v0/computers
D) https://amp.cisco.com/api/v1/computers
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?

A) curl -X PUT"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/{tenant_id}/tags
B) curl -X POST -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/tags
C) curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/{tenant_id}/tags
D) curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/tags
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?

A) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)
B) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)
C) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)
D) <strong>Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
<strong>  Refer to the exhibit. What does the response from the API contain when this code is executed?</strong> A) error message and status code of 403 B) newly created domains in Cisco Umbrella Investigate C) updated domains in Cisco Umbrella Investigate D) status and security details for the domains Refer to the exhibit. What does the response from the API contain when this code is executed?

A) error message and status code of 403
B) newly created domains in Cisco Umbrella Investigate
C) updated domains in Cisco Umbrella Investigate
D) status and security details for the domains
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
After changes are made to the Cisco Firepower Threat Defense configuration using the Cisco Firepower Device Manager API, what must be done to ensure that the new policy is activated?

A) Submit a POST to the /api/fdm/latest/operational/deploy URI. Submit a POST to the /api/fdm/latest/operational/deploy URI.
B) Submit a GET to the /api/fdm/latest/operational/deploy URI. Submit a GET to the
C) Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy URI. Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy
D) Submit a POST to the /api/fdm/latest/devicesettings/pushpolicy URI.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
Which description of synchronous calls to an API is true?

A) They can be used only within single-threaded processes.
B) They pause execution and wait for the response.
C) They always successfully return within a fixed time.
D) They can be used only for small requests.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
When the URI "/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/accesspolicies" is used to make a POST request, what does "e276abec-e0f2-11e3-8169-6d9ed49b625f" represent?

A) API token
B) domain UUID
C) access policy UUID
D) object UUID
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
Which two URI parameters are needed for the Cisco Stealthwatch Top Alarm Host v1 API? (Choose two.)

A) startAbsolute
B) externalGeos
C) tenantId
D) intervalLength
E) tagID
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
<strong>  Refer to the exhibit. Which expression prints the text 802.1x?</strong> A) print(quiz[0]['choices']['b']) B) print(quiz['choices']['b']) C) print(quiz[0]['choices']['b']['802.1x']) D) print(quiz[0]['question']['choices']['b']) Refer to the exhibit. Which expression prints the text "802.1x"?

A) print(quiz[0]['choices']['b'])
B) print(quiz['choices']['b'])
C) print(quiz[0]['choices']['b']['802.1x'])
D) print(quiz[0]['question']['choices']['b'])
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
<strong>  Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.)</strong> A) Add recordLimit. followed by an integer (key:value) to the flow_data. B) Add a for loop at the end of the script, and print each key value pair separately. Add a for loop at the end of the script, and print each key value pair separately. C) Add flowLimit, followed by an integer (key:value) to the flow_data. D) Change the startDateTime and endDateTime values to include smaller time intervals. E) Change the startDate and endDate values to include smaller date intervals. Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information. Which two actions enable the operator to limit returned data? (Choose two.)

A) Add recordLimit. followed by an integer (key:value) to the flow_data.
B) Add a for loop at the end of the script, and print each key value pair separately. Add a for loop at the end of the script, and print each key value pair separately.
C) Add flowLimit, followed by an integer (key:value) to the flow_data.
D) Change the startDateTime and endDateTime values to include smaller time intervals.
E) Change the startDate and endDate values to include smaller date intervals.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
<strong>  Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result?</strong> A) Add message ID information to the URL string as a URI. B) Run the script and parse through the returned data to find the desired message. C) Add message ID information to the URL string as a parameter. D) Add message ID information to the headers. Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message. What must be added to the script to achieve the desired result?

A) Add message ID information to the URL string as a URI.
B) Run the script and parse through the returned data to find the desired message.
C) Add message ID information to the URL string as a parameter.
D) Add message ID information to the headers.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
Which API capability is available on Cisco Firepower devices?

A) Firepower Management Center - Sockets API
B) Firepower Management Center - eStreamer API
C) Firepower Management Center - Camera API
D) Firepower Management Center - Host Output API
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)

A) user activity events
B) intrusion events
C) file events
D) intrusion event extra data
E) malware events
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)

A) eStreamer is used to get sources for intelligence services.
B) eStreamer is used to send malware event data.
C) eStreamer is used to get a list of access control policies.
D) eStreamer is used to send policy data.
E) eStreamer is used to send intrusion event data.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
<strong>  Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run?</strong> A) reporting group with the name web_malware_category_malware_name_user_detail B) data for specified dates C) reporting group with the name blocked_malware D) data in the queried category Refer to the exhibit. What must be present in a Cisco Web Security Appliance before the script is run?

A) reporting group with the name web_malware_category_malware_name_user_detail
B) data for specified dates
C) reporting group with the name blocked_malware
D) data in the queried category
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)

A) email
B) Microsoft Word file
C) FTP
D) web
E) csv file
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?

A) Report on flow data during a customizable time period.
B) Operate and return alerts discovered from infrastructure observations.
C) Return current configuration data of Cisco Stealthwatch Cloud infrastructure.
D) Create snapshots of supported Cisco Stealthwatch Cloud infrastructure.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
<strong>  Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action?</strong> A) The given code does not execute because the mandatory parameters, source, destination, and services are missing. B) The given code does not execute because it uses the HTTP method PUT. It should use the HTTP method POST. C) The appropriate rule is updated with the source, destination, services, and other fields set to Any and the action set to DENY. Traffic to the production web server is disallowed, as expected. D) A new rule is created with the source, destination, services, and other fields set to Any and the action set to DENY. Traffic to the production web server is disallowed, as expected. Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit. What is the outcome of that action?

A) The given code does not execute because the mandatory parameters, source, destination, and services are missing.
B) The given code does not execute because it uses the HTTP method "PUT". It should use the HTTP method "POST".
C) The appropriate rule is updated with the source, destination, services, and other fields set to "Any" and the action set to "DENY". Traffic to the production web server is disallowed, as expected.
D) A new rule is created with the source, destination, services, and other fields set to "Any" and the action set to "DENY". Traffic to the production web server is disallowed, as expected.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
What are two benefits of Ansible when managing security platforms? (Choose two.)

A) End users can be identified and tracked across a network.
B) Network performance issues can be identified and automatically remediated.
C) Policies can be updated on multiple devices concurrently, which reduces outage windows.
D) Anomalous network traffic can be detected and correlated.
E) The time that is needed to deploy a change is reduced, compared to manually applying the change.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/reporting/mail_incoming_traffic_summary/detected_amp?startDate=2016-09-10T19:00:00.000Z&endDate=2018-09-24T23:00:00.000Z&device_type=esa&device_name=esa01 . What does this GET call return?

A) values of all counters of a counter group, with the device group name and device type for web
B) value of a specific counter from a counter group, with the device name and type for email
C) value of a specific counter from a counter group, with the device name and type for web
D) values of all counters of a counter group, with the device group name and device type for email
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
Which query parameter is required when using the reporting API of Cisco Security Management Appliances?

A) device_type
B) query_type
C) filterValue
D) startDate + endDate
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

A) /tenants/{tenantId}/policy/system/host-policy
B) /tenants/{tenantId}/policy/system/role-policy
C) /tenants/{tenantId}/policy/system
D) /tenants/{tenantId}/policy/system/{policyId}
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
<strong>  Refer to the exhibit. What is the purpose of the API represented by this URL?</strong> A) Getting or setting intrusion policies in FMC B) Creating an intrusion policy in FDM C) Updating access policies D) Getting the list of intrusion policies configured in FDM Refer to the exhibit. What is the purpose of the API represented by this URL?

A) Getting or setting intrusion policies in FMC
B) Creating an intrusion policy in FDM
C) Updating access policies
D) Getting the list of intrusion policies configured in FDM
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
<strong>  Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.)</strong> A) Add params parameter in the get and assign in the {return: 10} value. Add params parameter in the get and assign in the {return: 10} value. B) Add ?limit=10 to the end of the URL string. Add ?limit=10 to the end of the URL string. C) Add params parameter in the get and assign in the {limit: 10} value. {limit: 10} D) Add ?find=10 to the end of the URL string. ?find=10 E) Add ?return=10 to the end of the URL string. ?return=10 Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API. Which two configurations restrict the returned result to only 10 entries? (Choose two.)

A) Add params parameter in the get and assign in the {"return": "10"} value. Add params parameter in the get and assign in the {"return": "10"} value.
B) Add ?limit=10 to the end of the URL string. Add ?limit=10 to the end of the URL string.
C) Add params parameter in the get and assign in the {"limit": "10"} value. {"limit": "10"}
D) Add ?find=10 to the end of the URL string. ?find=10
E) Add ?return=10 to the end of the URL string. ?return=10
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
<strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)   Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?

A) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)
B) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)
C) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)
D) <strong>  Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag. Which code segment completes the script and achieves the goal?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Which request searches for a process window in Cisco ThreatGRID that contains the word "secret"?

A) /api/v2/search/submissions?term=processwindow&title=secret
B) /api/v2/search/submissions?term=processwindow&q=secret
C) /api/v2/search/submissions?term=window&title=secret
D) /api/v2/search/submissions?term=process&q=secret
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?

A) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)
B) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)
C) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)
D) <strong>Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?</strong> A)   B)   C)   D)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
Which two APIs are available from Cisco ThreatGRID? (Choose two.)

A) Access
B) User Scope
C) Data
D) Domains
E) Curated Feeds
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
<strong>  Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?</strong> A) print(response[data][0]) B) print(response[results][0]) C) print(response.json()[data][0]) D) print(response.json()[results][0]) Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?

A) print(response[data][0])
B) print(response[results][0])
C) print(response.json()[data][0])
D) print(response.json()[results][0])
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
Which two statements describe the characteristics of API styles for REST and RPC? (Choose two.)

A) REST-based APIs function in a similar way to procedures.
B) REST-based APIs are used primarily for CRUD operations.
C) REST and RPC API styles are the same.
D) RPC-based APIs function in a similar way to procedures.
E) RPC-based APIs are used primarily for CRUD operations.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Which two commands create a new local source code branch? (Choose two.)

A) git checkout -b new_branch
B) git branch -b new_branch
C) git checkout -f new_branch
D) git branch new_branch
E) git branch -m new_branch
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
Which API is used to query if the domain "example.com" has been flagged as malicious by the Cisco Security Labs team?

A) https://s-platform.api.opendns.com/1.0/events?example.com
B) https://investigate.api.umbrella.com/domains/categorization/example.com
C) https://investigate.api.umbrella.com/domains/volume/example.com
D) https://s-platform.api.opendns.com/1.0/domains?example.com
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.