- 积分
- 345
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 注册时间
- 2018-10-11
- 最后登录
- 1970-1-1
- 阅读权限
- 30
- 听众
- 收听
初级工程师
|
SCOR (2020.03.17) 102 Question is still valid but I found that some question is wrong answer5 L+ X( [0 r1 W! ?1 E g
; ]0 P. a7 R' y) H! {$ c9 d+ QQUESTION 1
! A5 Z- K+ L: t1 i0 PWhich feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
7 ?1 b2 s W, ?8 F! Y# {( F0 \A. security intelligence+ q L* \. Q/ {2 r# y
B. impact flags' X9 `) U! I5 e& k. h9 d& B
C. health monitoring
! {+ ?: ~3 h" f$ X4 ^4 |# w4 dD. URL filtering! h# L# G$ N* X5 n2 t
Correct Answer: B
: E' F- T' ?# F2 k! G5 T2 A; ^4 V% p* B
Question 5" q1 o' @$ m C% B
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
) B% i: p8 [- f4 X% ^" n; wA. show authentication registrations
/ R" k2 b) { F% Y, C% g' ~9 RB. show authentication method) q0 v/ f/ g! Z( q$ e' }8 |
C. show dot1x all& |8 n; B, S$ d
D. show authentication sessions
, v2 O, S w$ t$ Y4 gCorrect Answer: D
9 \! E5 e# A8 v1 B6 n$ b8 W4 g. @2 _! a
QUESTION 12 Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)# _: |3 Q; O% D) y4 v
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
3 }; b, |. \, `' XB. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
; @3 z7 Z1 L1 P5 q6 J qC. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
) P$ ]9 v2 u0 ?8 nD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.- z6 s# Q1 I6 z* {& U1 i* a# J/ ~
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
( n& y) a7 D2 ICorrect Answer: CE ; t; H% e! J$ q8 v' g6 W
3 V! b a$ S) u4 uQUESTION 15 Which flaw does an attacker leverage when exploiting SQL injection
U9 H7 `8 L' c0 J# P: q/ }vulnerabilities?
' {/ S0 g0 W* C0 C# N: sA. user input validation in a web page or web application
+ M3 d. j r' N9 x0 H% P8 K, SB. Linux and Windows operating systems
0 Z2 u! d1 Z( QC. database
N7 E; b) l/ ~- C* \) Z5 {+ |D. web page images1 Z$ U, H L/ I+ I
Correct Answer: A( z* H X; R8 ~! }
$ d. q' D% ~4 A9 N$ P5 u0 K5 P
QUESTION 27 What are the two most commonly used authentication factors in multifactor authentication?
: L- Q# D$ l3 V* C) O& j2 B(Choose two.)$ v- r8 X2 x* ^+ ?1 j
A. biometric factor
, C: B$ e7 Z8 r) `B. time factor
% C) d- m$ k) E5 U7 VC. confidentiality factor# }) ~5 Y0 J; Y6 B0 U. o; @
D. knowledge factor7 W: [/ u: @! r5 h! }; l
E. encryption factor, k( H4 w9 _* L$ R! x3 f8 X1 L
Correct Answer: BD
* F% M" B) C" p6 w# ]2 K% _# P1 o6 @# ~+ b
QUESTION 362 A C8 |( n& ]3 ?7 _
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?
% o" {$ K9 f! L* P- I- B' A; WA. Ensure that the client computers are pointing to the on-premises DNS servers.
! R2 E, z9 {8 i/ S- a) _' M) J6 Q0 r7 [3 dB. Enable the Intelligent Proxy to validate that traffic is being routed correctly.$ g5 E4 u5 y1 O; n
C. Add the public IP address that the client computers are behind to a Core Identity.
, g' ]5 _3 s# v# m/ N- `+ nD. Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
" I. s5 K/ e4 Y0 O. ECorrect Answer: D: @9 o6 D! ~9 e6 T0 r; z" M8 S
& ~. J' _8 k" |$ K. Q1 F% F
QUESTION 41 For which two conditions can an endpoint be checked using ISE posture
4 a; X4 S( v0 B4 b: ^5 L' K; [assessment? (Choose two.)1 J' o0 v) D% O2 D
A. computer identity% K4 x* u8 f8 F: I
B. Windows service2 L8 W$ @( [0 ]0 `" x* t6 T
C. user identity
4 K8 N4 s, y( {2 N7 @D. Windows firewall
' ^8 L' \: r% I3 K" s( BE. default browser
Y/ @* H0 N8 ~$ d* I# M% q) N7 bCorrect Answer: BD; h/ A3 G% {& Q" [" Z. C: u$ B
, [, K) ^6 u5 M+ ?7 q
And I think, here is one more error:* ]* e6 A& y7 h
QUESTION 88 What provides visibility and awareness into what is currently occurring
0 g( N7 P. e! @$ _5 ~/ D& Aon the network?% ]5 g$ K1 f! a1 @1 j2 \5 F
A. CMX1 U/ o) l6 X9 D; E$ @/ @: A6 F
B. WMI
' g' J0 E. f1 dC. Prime Infrastructure
8 {( e2 L' W% n5 ^ q0 s+ u! ND. Telemetry
7 ^, I4 ] x0 X' d4 ^Correct Answer: D
9 b8 d% r$ p: [* u/ `! S. T( q. G7 m1 ]. T; e: S* f
QUESTION 96 The main function of northbound APIs in the SDN architecture is to enable communication between which two( V l& Y0 M0 ^9 V0 [( E1 Y# @
areas of a network?
& S& Q7 X( N% ~3 z" B$ WA. SDN controller and the cloud' q, g, V! X9 p- K+ B0 P
B. management console and the SDN controller/ V/ C7 O& z9 W/ x
C. management console and the cloud
& Y% y" I! k& a2 @( G9 w6 RD. SDN controller and the management solution0 k3 m- n0 K4 g
4 e* [# k' x2 I, h! \Correct answer A% L E. a9 \ [8 Y. z
_( X% P- D1 A
GODD LUCK |
评分
-
查看全部评分
|