300-207 Exam - Implementing Cisco Threat Control Solutions (SITCS)

certleader.com

Q1. During initial configuration, the Cisco ASA can be configured to drop all traffic if the ASA CX SSP fails by using which command in a policy-map? 

A. cxsc fail 

B. cxsc fail-close 

C. cxsc fail-open 

D. cxssp fail-close 

Answer:

Q2. Which three statements about Cisco ASA CX are true? (Choose three.) 

A. It groups multiple ASAs as a single logical device. 

B. It can perform context-aware inspection. 

C. It provides high-density security services with high availability. 

D. It uses policy-based interface controls to inspect and forward TCP- and UDP-based packets. 

E. It can make context-aware decisions. 

F. It uses four cooperative architectural constructs to build the firewall. 

Answer: B,E,F 

Q3. Which type of signature is generated by copying a default signature and modifying its behavior? 

A. meta 

B. custom 

C. atomic 

D. normalized 

Answer:

Q4. Which four statements are correct regarding management access to a Cisco Intrusion Prevention System? (Choose four.) 

A. The Telnet protocol is enabled by default 

B. The Telnet protocol is disabled by default 

C. HTTP is enabled by default 

D. HTTP is disabled by default 

E. SSH is enabled by default 

F. SSH is disabled by default 

G. HTTPS is enabled by default 

H. HTTPS is disabled by default 

Answer: B,D,E,G 

Q5. Which two conditions must you configure in an event action override to implement a risk rating of 70 or higher and terminate the connection on the IPS? (Choose two.) 

A. Configure the event action override to send a TCP reset. 

B. Set the risk rating range to 70 to 100. 

C. Configure the event action override to send a block-connection request. 

D. Set the risk rating range to 0 to 100. 

E. Configure the event action override to send a block-host request. 

Answer: A,B 

Q6. Which five system management protocols are supported by the Intrusion Prevention System? (Choose five.) 

A. SNMPv2c 

B. SNMPv1 

C. SNMPv2 

D. SNMPv3 

E. syslog 

F. SDEE 

G. SMTP 

Answer: A,B,C,F,G 

Q7. The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). 

The simulator will provide access to the graphical user interfaces of one Cisco ASA and one Cisco WSA that are participating in a WCCP service. Not all aspects of the GUIs are implemented in the simulator. The options that have been implemented are sufficient to determine the best answer to each of the questions that are presented. 

Your task is to examine the details available in the simulated graphical user interfaces and select the best answer. 

What traffic is not redirected by WCCP? 

A. Traffic destined to public address space 

B. Traffic sent from public address space 

C. Traffic destined to private address space 

D. Traffic sent from private address space 

Answer:

Explanation: From the screen shot below we see the WCCP-Redirection ACL is applied, so all traffic from the Private IP space to any destination will be redirected. 

\\psf\Home\Desktop\Screen Shot 2015-01-27 at 9.38.36 AM.png 

Q8. Which Cisco Cloud Web Security Connector feature allows access by all of an organization's users while applying Active Directory group policies? 

A. a company authentication key 

B. a group authentication key 

C. a PAC file 

D. proxy forwarding 

E. a user authentication key 

Answer:

Q9. Which two statements about Cisco ESA clusters are true? (Choose two.) 

A. A cluster must contain exactly one group. 

B. A cluster can contain multiple groups. 

C. Clusters are implemented in a client/server relationship. 

D. The cluster configuration must be managed by the cluster administrator. 

E. The cluster configuration can be created and managed through either the GUI or the CLI. 

Answer: B,E 

Q10. Which three options are characteristics of router-based IPS? (Choose three.) 

A. It is used for large networks. 

B. It is used for small networks. 

C. It supports virtual sensors. 

D. It supports multiple VRFs. 

E. It uses configurable anomaly detection. 

F. Signature definition files have been deprecated. 

Answer: B,D,F