Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit. An engineer must configure SAML SSO in Cisco ISE to use Microsoft Azure AD as an identity provider. These configurations were performed:

    Configure a SAML IdP in ISE.

    Configure the Azure AD IdP settings.

Which two actions must the engineer take in Cisco ISE? (Choose two.)

A.

Add a SAML IdP.

B.

Upload metadata from Azure AD to ISE.

C.

Configure SAML groups in ISE.

D.

Configure the External Identity Sources settings.

E.

Configure the Internal Identity Source Sequence setting.

Refer to the exhibit. An engineer is analyzing a Cisco Secure Firewall Management Center report. Which activity does the output verify?

A.

An HTTP response from IP address 10.1.104.101 was blocked.

B.

An HTTP request to IP address 10.1.113.7 was blocked.

C.

A DNS request to IP address 172.17.1.2 was blocked.

D.

A DNS response from IP address 10.1.108.100 was blocked.

What helps prevent drive-by compromise?

A.

Ad blockers

B.

VPN

C.

Incognito browsing

D.

Browsing known websites

Refer to the exhibit. An engineer must troubleshoot an incident by using Cisco Secure Cloud Analytics. What is the cause of the issue?

A.

SYN flood attack toward the DNS server that has IP address 10.10.10.10

B.

DoS attack toward the 50.10.10.0/24 network from an internal IP address

C.

Ping of Death attack toward the host that has IP address 10.10.10.10

D.

TCP fingerprinting toward the 50.10.10.0/24 network

Refer to the exhibit. An engineer must troubleshoot an issue with excessive SSH traffic leaving the internal network between the hours of 18:00 and 08:00. The engineer applies a policy to the Cisco ASA firewall to block outbound SSH during the indicated hours; however, the issue persists. What should be done to meet the requirement?

A.

Change the time of rule 2.

B.

Delete rule 4

C.

Delete rule 3

D.

Change the time of rule 5

According to the MITRE ATT&CK framework, which approach should be used to mitigate exploitation risks?

A.

Performing regular data backups and testing recovery procedures

B.

Keeping systems updated with the latest patches

C.

Consistently maintaining up-to-date antivirus software

D.

Ensuring that network traffic is closely monitored and controlled

Refer to the exhibit. An engineer must create a segmentation policy in Cisco Secure Workload to block HTTP traffic. The indicated configuration was applied; however, HTTP traffic is still allowed. What should be done to meet the requirement?

A.

Change consumer_filter_ref to HTTP Consumer.

B.

Add HTTP to 14_params.

C.

Decrease the priority of the template to 50.

D.

Increase the priority of the template to 200.

Refer to the exhibit. An engineer must configure Cisco ASA so that the Secure Client deployment is removed when the user laptop disconnects from the VPN. The indicated configuration was applied to the Cisco ASA firewall. Which command must be run to meet the requirement?

A.

client-bypass-protocol enable

B.

anyconnect keep-installer none

C.

anyconnect firewall-rule client-interface

D.

D. client-bypass-protocol disable