- 积分
- 345
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2018-10-11
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
|
SCOR (2020.03.17) 102 Question is still valid but I found that some question is wrong answer( F0 Q {9 Y- K5 @$ e* Q
3 D, S' y6 x# E- y: J3 n$ C
QUESTION 17 Q8 T% j9 Z# e' X9 I
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?; e3 Z: J: d4 Y( M$ X2 q. ?7 g# m
A. security intelligence( X4 j6 W1 a* k5 {/ d) a1 q
B. impact flags
. d5 t7 R5 s. t3 ^: yC. health monitoring
% {; p1 j2 h- N1 O7 wD. URL filtering
3 M4 G, K/ B' BCorrect Answer: B
2 X* z3 Y. {# f$ b
7 T% i0 B- D9 i5 V1 \. ZQuestion 55 T$ m0 u3 A/ T) S" J! k/ M3 u
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?" h% M2 j: E6 l H3 m
A. show authentication registrations
* v& Y) o- d9 s5 j: tB. show authentication method
" O3 A }( H" pC. show dot1x all
5 ~4 @ K) c$ U5 F0 r0 BD. show authentication sessions
0 ?1 V, j7 I; N8 s7 KCorrect Answer: D6 l/ y y. R4 `5 u4 b5 h& Z2 ]1 a0 I: `. S
3 d4 L m3 E0 H) @: F# r
QUESTION 12 Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
/ Q, c; p# `; g7 R8 mA. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.( E- H) V% {/ Z
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
$ A$ l9 z' h7 h2 c2 XC. The IPsec configuration that is set up on the active device must be duplicated on the standby device.0 a; h! \ o: q- m1 A# \# Z
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
+ @/ j* F7 A2 _* A* F6 l4 LE. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.& n4 T. l; j% U( `0 L
Correct Answer: CE $ k* {4 _) y: c# S# j# }/ K% q
' T, m: N) _9 i" L, j
QUESTION 15 Which flaw does an attacker leverage when exploiting SQL injection, W- v( J C0 P
vulnerabilities?: d6 i+ D2 [+ F8 N+ G
A. user input validation in a web page or web application! k6 {5 _2 s( O
B. Linux and Windows operating systems2 G( Z! K/ l0 a7 y
C. database
# D: B2 n, v0 PD. web page images
3 B5 ^2 K! g% E. f H4 HCorrect Answer: A
! p; W5 ~) q$ q: c7 ~ y; y% l2 \& J! j1 o4 P# }6 E! Q/ U& p8 \
QUESTION 27 What are the two most commonly used authentication factors in multifactor authentication?
* l" k) ?( p' w0 M% x(Choose two.)
- o7 v7 c1 R/ i: B+ `# wA. biometric factor9 ^9 q% y; s/ _8 z5 N9 m7 L# m2 G
B. time factor
* i. I6 `! s) VC. confidentiality factor
3 Z7 `: v( U* m+ A; g. iD. knowledge factor9 Q$ ]* h5 M: s9 R
E. encryption factor3 ^: k# C( o( N4 q* B, R
Correct Answer: BD, G, q, F. L6 M/ w
& q6 G" f- x/ w T
QUESTION 36
9 E) q2 X; B% k- h9 e$ o7 R0 lAn engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?5 ]" a. _5 }8 r. i- E, {
A. Ensure that the client computers are pointing to the on-premises DNS servers.$ m4 A. `4 K0 y7 Q
B. Enable the Intelligent Proxy to validate that traffic is being routed correctly.6 I' z; O0 _) R: k: H! H' y% h
C. Add the public IP address that the client computers are behind to a Core Identity." t! U( B. G% y4 x1 R, N
D. Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
4 y# O% G% I, K, e0 l$ K. u8 \Correct Answer: D3 H4 g% G5 Z5 ]- i
, r. _/ A4 n& o1 _- i8 ~
QUESTION 41 For which two conditions can an endpoint be checked using ISE posture/ d& w: p3 p- i- r5 y
assessment? (Choose two.)
5 ]5 V) a* Y- B0 e- q0 Z' h, H4 J8 VA. computer identity
4 e5 K* h5 M, A1 W4 g( \B. Windows service6 ~# H9 V5 ]! ?0 e5 M5 ]- a
C. user identity
4 e9 T g& w. A Y8 C" G7 ?) QD. Windows firewall
7 x: X' l: P1 X3 E/ @5 n' [( \2 w9 fE. default browser
& {* R3 N" ^! B! ]0 C& p- qCorrect Answer: BD: Z, `0 ~& i3 J. T( |
7 [9 U7 R9 @% i9 s
And I think, here is one more error:- I4 \* U! e& o4 F: ^* D
QUESTION 88 What provides visibility and awareness into what is currently occurring
7 Q/ ^, M( c% Ton the network?* G6 {! I( b. x. b. B+ J
A. CMX
' n5 D7 U. T# r ~* p; tB. WMI9 \1 F! J& B3 ?+ g
C. Prime Infrastructure
/ B, c1 Q3 K- W9 CD. Telemetry0 s5 t4 Y* g6 {/ ?6 a( U$ c# _
Correct Answer: D% z8 P& b: y% O6 p2 H% t s
* Y, |. C! R/ }: [; Q
QUESTION 96 The main function of northbound APIs in the SDN architecture is to enable communication between which two1 i' u# r' m S) Y1 L0 H( X
areas of a network?
4 f- o; D( P9 p. c. D+ m: h/ U" T. FA. SDN controller and the cloud
" J4 r1 o! v; Z( O, k; L$ B/ KB. management console and the SDN controller: `& G( v! X6 ^
C. management console and the cloud% ]0 a: a# b o2 q4 S- k
D. SDN controller and the management solution
1 ?8 e0 l4 o/ G L0 ]/ n
/ ?9 m8 y' y% e# Q6 _0 PCorrect answer A
& m+ {, D& g$ }- ^: p1 u* _" c/ Q2 r. L% o0 ^
GODD LUCK |
评分
-
查看全部评分
|