ntp server 1.1.1.1 key 1 on the client so it uses key 1 with that NTP server. The other choices are flipped or use wrong IP. Pretty sure that's it, but open to corrections.Q: 11
[Secure Network Access, Visibility, and Enforcement]
An engineer is implementing NTP authentication within their network and has configured both the
client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The
server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so.
Which command is required to enable the client to accept the server’s authentication key?
Options
Discussion
B tbh. You need
Be respectful. No spam.
Q: 12
[Security Concepts]
Refer to the exhibit.
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the
switch
interface in order to provide the user with network connectivity?
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the
switch
interface in order to provide the user with network connectivity?Options
Discussion
Yeah, you have to use D. The port needs
ip dhcp snooping trust so DHCP responses can get through from the server side. Without this, clients won't get an address on that VLAN. Pretty sure that's it but shout if I'm missing anything.Looks like the interface needs to be trusted for DHCP replies to pass. D
Be respectful. No spam.
Q: 13
[Security Concepts]
What is an attribute of the DevSecOps process?
Options
Discussion
C. DevSecOps is all about building security into development, not just doing scans or isolating security teams. Think C fits best here.
Had something like this in a mock, pretty sure it's B.
Be respectful. No spam.
Q: 14
DRAG DROP
[Security Concepts]
Drag and drop the descriptions from the left onto the correct protocol versions on the right.


Your Answer
Discussion
Option D here. If the description mentions MD5 for integrity it's definitely valid for all IPsec versions, not just the newer ones. The protocol updates don't always remove those older algorithms outright. I think that's the edge case some might miss.
Be respectful. No spam.
Q: 15
[Content Security]
How does Cisco Advanced Phishing Protection protect users?
Options
Discussion
B . Is the question asking about BEC specifically or just general anti-phishing? That would flip it.
Be respectful. No spam.
Q: 16
[Security Concepts]
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA
Center?
Options
Discussion
Its B
A tbh, the /count endpoint directly returns the number of devices, B just lists them so it's a trap.
Be respectful. No spam.
Q: 17
[Security Concepts]
Which service allows a user export application usage and performance statistics with Cisco
Application Visibility
and control?
Options
Discussion
Going With B is right. Had something like this in a mock and NetFlow is the main one for exporting app usage stats with AVC. SNMP is more device monitoring, not detailed AppVis. Pretty sure about this, but happy to hear if anyone sees it differently.
Its C, since SNMP is typically used for stats and reporting on network devices. NetFlow seems more about traffic flows than app-level stats, right? If I'm missing something let me know.
Be respectful. No spam.
Q: 18
[Security Concepts]
What is an advantage of the Cisco Umbrella roaming client?
Options
Discussion
Option B fits based on what I've seen in Cisco's docs and practice exams-Umbrella roaming client helps with tunneling suspicious IP connections for threat visibility. Not totally sure since C kinda sounds close, but the official training guides usually point to B.
Be respectful. No spam.
Q: 19
DRAG DROP An engineer must configure AsyncOS for Cisco Secure Web Appliance to push log files to a syslog server using the SCP retrieval method. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
Drag & Drop
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
DRAG DROP [Security Concepts] Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Drag & Drop
Discussion
Not quite right, I think the correct mapping is file access from a different user → learns normal behavior, interesting file access → sensitive files, user login suspicious behavior → access failures/methods, privilege escalation → process lineage movement. Trap is mixing up the first two!
privilege escalation → Tetration platform learns the normal behavior of users
user login suspicious behavior → Tetration platform is armed to look at sensitive files
interesting file access → Tetration platform watches user access failures and methods
file access from a different user → Tetration platform watches for movement in the process lineage tree
Really clear drag and drop format, similar to some practice sets I've tried.
user login suspicious behavior → Tetration platform is armed to look at sensitive files
interesting file access → Tetration platform watches user access failures and methods
file access from a different user → Tetration platform watches for movement in the process lineage tree
Really clear drag and drop format, similar to some practice sets I've tried.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2

