Q1. You ran the ssh generate-key command on the Cisco IPS and now administrators are unable to connect. Which action can be taken to correct the problem?
A. Replace the old key with a new key on the client.
B. Run the ssh host-key command.
C. Add the administrator IP addresses to the trusted TLS host list on the IPS.
D. Run the ssh authorized-keys command.
Answer: A
Q2. Which command verifies that CWS redirection is working on a Cisco IOS router?
A. show content-scan session active
B. show content-scan summary
C. show interfaces stats
D. show sessions
Answer: A
Q3. A user is deploying a Cisco IPS appliance in a data center to mitigate most attacks, including atomic attacks. Which two modes does Cisco recommend using to configure for this? (Choose two.)
A. VLAN pair
B. interface pair
C. transparent mode
D. EtherChannel load balancing
E. promiscuous mode
Answer: A,D
Q4. Which Cisco ASA configuration command drops traffic if the Cisco ASA CX module fails?
A. no fail-open
B. fail-close
C. fail-close auth-proxy
D. auth-proxy
Answer: B
Q5. What are three best practices for a Cisco Intrusion Prevention System? (Choose three.)
A. Checking for new signatures every 4 hours
B. Checking for new signatures on a staggered schedule
C. Automatically updating signature packs
D. Manually updating signature packs
E. Group tuning of signatures
F. Single tuning of signatures
Answer: B,C,E
Q6. Which five system management protocols are supported by the Intrusion Prevention System? (Choose five.)
A. SNMPv2c
B. SNMPv1
C. SNMPv2
D. SNMPv3
E. syslog
F. SDEE
G. SMTP
Answer: A,B,C,F,G
Q7. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs).
The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented.
Your task is to examine the details available in the simulated graphical user interfaces and select the best answer.
Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports?
A. Both are configured for port 80 only.
B. Both are configured for port 443 only.
C. Both are configured for both port 80 and 443.
D. Both are configured for ports 80, 443 and 3128.
E. There is a configuration mismatch on redirected ports.
Answer: C
Explanation: This can be seen from the WSA Network tab shown below:
\\psf\Home\Desktop\Screen Shot 2015-01-27 at 9.42.49 AM.png
Q8. What are the two policy types that can use a web reputation profile to perform reputation-based processing? (Choose two.)
A. profile policies
B. encryption policies
C. decryption policies
D. access policies
Answer: C,D
Q9. What is the default CX Management 0/0 IP address on a Cisco ASA 5512-X appliance?
A. 192.168.1.1
B. 192.168.1.2
C. 192.168.1.3
D. 192.168.1.4
E. 192.168.1.5
F. 192.168.8.8
Answer: F
Q10. What are three features of the Cisco Security Intellishield Alert Manager Service? (Choose three.)
A. validation of alerts by security analysts
B. custom notifications
C. complete threat and vulnerability remediation
D. vendor-specific threat analysis
E. workflow-management tools
F. real-time threat and vulnerability mitigation
Answer: A,B,E