option
Cuestiones
ayuda
daypo
buscar.php

sec automation

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
sec automation

Descripción:
dfgdfhdfghghjgfhjfghkhjkhjghmfghmgh

Fecha de Creación: 2021/04/08

Categoría: Otros

Número Preguntas: 27

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which curl command lists all tags (host groups) that are associated with a tenant using the cisco stealthwatch enterprise API. A. B. C. D.

A security network engineer must implement intrusion policies using the cisco FMC API. A. B. C. D.

Which description of synchronous calls to an API is true?. A. B. C. D.

What are two advantages of Python virtual environments? (Choose 2). A. B. C. D. E.

API token. domain UUID. access policy UUID. object UUID.

For which 2 programming languages does Cisco offer an SDK for cisco pxgrid v1.0 (choose 2). Python. Perl. Java. C. JavaScript.

Which two URI parameters are needed for the cisco StealthWatch Top Alarm Host v1 API? (choose 2). startAbsolute. esternalGeos. tenantId. intervalLenght. tagId.

Which two QPI capabilities are available on Cisco ISE?. Platform Configuration APIs. Monitoring REST APIs. Performance Management REST APIs. External Restful services APIs. Internal Restful services APIs.

Which API capability is available on Firepower Devices?. FMC - Sockets API. FMC - eStreamer API. FMC - Camera API. FMC - Host Output API.

Which API is designed to give technology partners the ability to send security events from their platform/service/apppliance within a mutual customer's environment to the Umbrella cloud for enforcement?. Umbrella Management API. Umbrella Security Events API. Umbrella Enforcement API. Umbrella Reporting API.

Which 2 event types can the eStreamer server transmit to the requesting client from a managed device and a management center?. user activity events. intrusion events. file events. intrusion event extra data. malware events.

Which 2 destinations are supported by the CSM appliance reporting APIs?. email. Microsoft word file. FTP. Web. CSV file.

What are 2 capabilities of FMC eStreamer?. eStreamer is used to get sources for intelligent services. eStreamer is used to send malware event data. eStreamer is used to get a list of access control policies. eStreamer is used to send policy data. eStreamer is used to send intrusion event data.

Which 2 statements describe the characteristics of API styles for REST and RPC?. REST-based APIs function in a similar way to procedures. REST-based APIs are used primarily for CRUD operations. REST and RPC API styles are the same. RPC-based APIs function in a similar way to procedures. RPC-based APIs are used primarily for CRUD operations.

What are 2 benefits of Ansible when managing security playforms?. A. B. C. D. E.

A. B. C. D.

Which 2 APIs are available for ThreatGrid? (Choose 2). Access. User scope. Data. Domains. Curated Feeds.

Two git commands to create a new local source code branch: git checkout -b new-branch. git branch -b new-branch. git checkout -t new-branch. git branch new-branch. git branch -m new-branch.

A. B. C. D.

Which API us used to query if the domain 'example.com' has been flagged as malicious by the Cisco Security Labs team?. A. B. C. D.

A. B. C. D.

Refer to the exhibit. A network operator wrote a Python script to retrieve events from Cisco AMP. A. B. C. D.

A. B. C. D.

A. B. C. D.

A. B. C. D.

A. B. C. D.

Which UTI string is used to create a policy that takes precedence over other applicable policies that areconfigured in cisco stealthwatch?. A. B. C. D.

Denunciar Test