- (Exam Topic 1)
Which two capabilities does TAXII support? (Choose two)
Correct Answer:
AB
The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchangingstructured cyber threat information between parties over the network.TAXII exists to provide specific capabilities to those interested in sharing structured cyber threat information.TAXII Capabilities are the highest level at which TAXII actions can be described. There are three capabilitiesthat this version of TAXII supports: push messaging, pull messaging, and discovery.Although there is no “binding” capability in the list but it is the best answer here.
- (Exam Topic 3)
A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)
Correct Answer:
AB
- (Exam Topic 2)
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
Correct Answer:
D
Reference: https://cyruslab.net/2019/09/03/ciscocisco-firepower-lab-setup/
- (Exam Topic 2)
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Correct Answer:
C
Reference:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118796-technoteesa-00.htmlIn this question, it stated “the network is congested” (not the file analysis server was overloaded) so theappliance will not try to upload the file again.
- (Exam Topic 2)
Which two cryptographic algorithms are used with IPsec? (Choose two)
Correct Answer:
CE
Cryptographic algorithms defined for use with IPsec include:+ HMAC-SHA1/SHA2 for integrity protection and authenticity.+ TripleDES-CBC for confidentiality+ AES-CBC and AES-CTR for confidentiality.+ AES-GCM and ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.