Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An engineer is configuring multifactor authentication using Duo. The implementation must use Duo Authentication Proxy and the Active Directory as an identity source. The company uses Azure and a local Active Directory. Which configuration is needed to meet the requirement?

A.

Configure the Identity Source as "SAML" on the Single Sign-On tab in the Duo Admin Panel, and configure the forwarding proxy as "local" for the Identity Source.

B.

Configure the Identity Source as "SAML" on the Single Sign-On tab, and configure the authentication proxy with the "[cloud]" section.

C.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab in the Duo Admin Panel, and configure the permit list to "Local database".

D.

Configure the Identity Source as "Active Directory" on the Single Sign-On tab, and configure the authentication proxy with the "[sso]" section.

How does Cisco XDR perform threat prioritization by using its visibility across multiple platforms?

A.

By assigning priority based on the detection platform

B.

By correlating detection risk and asset value at risk

C.

By prioritizing threats based on their frequency across platforms

D.

By using a fixed priority system for all platforms

Refer to the exhibit. An engineer must enable access to Salesforce using Cisco Umbrella and Cisco Cloudlock. These actions were performed:

    From Salesforce, add the Cloudlock IP address to the allow list

    From Cloudlock, authorize Salesforce

However, Salesforce access via Cloudlock is still unauthorized. What should be done to meet the requirements?

A.

From the Salesforce admin page, grant API access to Cloudlock.

B.

From the Salesforce admin page, grant network access to Cloudlock

C.

From the Cloudlock dashboard, grant API access to Salesforce.

D.

From the Cloudlock dashboard, grant network access to Salesforce.

Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile and received an activation code. Drag and drop the steps from left to right to complete the configuration.

Refer to the exhibit. An engineer configured a default segmentation policy in Cisco Secure Workload to block SMTP traffic. During testing, it is observed that the SMTP traffic is still allowed. Which action must the engineer take to complete the configuration?

A.

Add "port": [25, 25] to _rootScope

B.

Add _SMTPScope to provider_filter_ref

C.

Add "port": [25, 25] to _params

D.

Change consumer_filter_ref to: _SMTPScope

Refer to the exhibit. An engineer must implement a remote access VPN solution that provides user and device verification. The company uses Active Directory for user authentication and ID certificates for device identity. Users are currently able to connect using only a valid username and password, even if their computer is missing the required certificate.

Which command from the Cisco ASA tunnel-group completes the requirement of verifying device identity in addition to user identity?

A.

ldap-attribute-map PolicyAllow

B.

webvpn authorize-device

C.

authentication mfa

D.

authentication aaa certificate

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

A.

Move rule 2 to the first position.

B.

Configure a NAT overload rule

C.

Configure a virtual private cloud firewall rule

D.

Move rule 1 to the last position

What does the Cisco Telemetry Broker provide for telemetry data?

A.

Data analytics

B.

Data mining

C.

Data filtering

D.

Data brokering

In the zero-trust network access model, which criteria is used for continuous verification to modify trust levels?

A.

System patching status

B.

Detected threat levels

C.

User and device behavior

D.

Network traffic patterns

Which SAFE component logically arranges the security capabilities into blueprints?

A.

Reference Architectures

B.

Cisco Validated Designs

C.

Places in the Network

D.

Secure Domains