Monday, August 29, 2022

700-760 Cisco Security Architecture for Account Managers Exam

 

700-760 SAAM
Security Architecture for Account Managers
Duration: 90 minutes
Languages: English

Exam overview

This exam is for the required knowledge across the Cisco Security portfolio for a registered partner organization to obtain the Security specialization in the AM role.

Exam topics
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

20% 1.0 Threat Landscape and Security Issues
1.1 Identify the role of digitization in cyber security
1.2 Identify cyber security challenges
1.3 Identify causes of fragmented security
1.4 Identify security opportunities and obstacles

15% 2.0 Selling Cisco Security
2.1 Identify how Cisco supports practice development
2.2 Identify areas of the Cisco security portfolio
2.3 Identify Cisco programs for partner support
2.4 Identify Cisco programs for partner profitability

15% 3.0 Customer Conversations
3.1 Identify Cisco portfolio components
3.2 Identify Cisco security solutions
3.3 Identify customer security challenges
3.4 Identify components of Cisco’s best-in-class technology

15% 4.0 IoT Security

4.1 Identify IoT solutions critical to business
4.2 Identify the evolution of and need for IoT security
4.3 Identify how Cisco IoT Security solutions provide layered protection
4.4 Identify components of Cisco’s IoT security

15% 5.0 Cisco Zero Trust
5.1 Identify the value of and drivers for trust-centric security
5.2 Identify the value of zero trust
5.3 Identify zero-trust solutions
5.4 Identify Cisco Zero Trust outcomes

20% 6.0 Cisco Security Solutions Portfolio
6.1 Identify the requirements of modern network environments
6.2 Identify the challenges of next generation networks
6.3 Identify Cisco solutions for next generation network security
6.4 Identify Cisco security solution sets

Exam preparation
Official Cisco training

Security Architecture for Account Managers
Cisco Partners can access Sales Connect for access to a variety of training content to help them prepare for this exam.

Examkingdom Cisco 700-760 Exam Brain dump pdf, Certkingdom Cisco 700-760 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best Cisco 700-760 Certification, Cisco 700-760 Brain Dumps Training at certkingdom.com


QUESTION 1
Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times

A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection

Answer: B


QUESTION 2
Which three products are Cisco Visibility & Enforcement solutions (Choose three.)

A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints

Answer: B,C,D


QUESTION 3
Which three products are in Cisco's Web & Email Security portfolio (Choose three.)

A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES

Answer: B,D,F


QUESTION 4
What is used to reduce attack surfaces

A. Access
B. Remediation
C. Segmentation
D. Device trust

Answer: C


QUESTION 5
Which two benefits of flexible purchasing does Cisco provide (Choose two.)

A. Simplify the datacenter
B. Meet immediate needs
C. Roll out more solutions
D. Plan for the future
E. Reduce training needs

Answer: B,D

Thursday, August 25, 2022

JN0-349 Juniper Enterprise Routing and Switching, Specialist Exam

 

Exam Details
Exam questions are derived from the recommended training and the exam resources listed above. Pass/fail status is available immediately after taking the exam. The exam is only provided in English.

Exam Code: JN0-349
Prerequisite Certification: JNCIA-Junos
Delivered by: Pearson VUE
Exam Length: 90 minutes
Exam Type: 65 multiple-choice questions
Software Versions: Junos 21.1


Recertification
Juniper certifications are valid for three years. For more information, see Recertification.

Examkingdom Juniper JN0-349 Exam Brain dump pdf, Certkingdom Juniper JN0-349 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best Juniper JN0-349 Certification, Juniper JN0-349 Brain Dumps Training at certkingdom.com

Exam Objectives
Here’s a high-level view of the skillset required to successfully complete the JNCIS-ENT certification exam.

Exam Objective
Layer 2 Switching or VLANs

Identify the concepts, operation, or functionality of Layer 2 switching for the Junos OS
Bridging components
Frame processing

Describe the concepts, benefits, or functionality of VLANs
Ports
Tagging
Native VLANs and voice VLANs
Inter-VLAN routing

Demonstrate knowledge how to configure, monitor or troubleshoot Layer 2 switching or VLANs
Interfaces and ports
VLANs
Inter-VLAN Routing

Spanning Tree
Describe the concepts, benefits, operation, or functionality of the Spanning Tree Protocol
STP and RSTP concepts
Port roles and states
BPDUs
Convergence and reconvergence

Demonstrate knowledge how to configure, monitor, or troubleshoot Spanning Tree
STP
RSTP

Layer 2 Security
Identify the concepts, benefits or operation of various Layer 2 protection or security features
BPDU, loop or root protection
Port security, including MAC limiting, DHCP snooping, Dynamic ARP inspection (DAI) or IP source guard
MACsec
Storm control

Identify the concepts, benefits or operation of Layer 2 firewall filters
Filter types
Processing order
Match criteria and actions

Demonstrate knowledge how to configure, monitor, or troubleshoot Layer 2 security
Protection
Port security
Storm control
Firewall filter configuration and application

Protocol Independent Routing
Identify the concepts, operation or functionality of various protocol-independent routing components
Static, aggregate, and generated routes
Martian addresses
Routing instances, including RIB groups
Load balancing
Filter-based forwarding

Demonstrate knowledge how to configure, monitor, or troubleshoot various protocol-independent routing components
Static, aggregate, and generated routes
Load balancing
Filter-based forwarding

OSPF
Describe the concepts, operation or functionality of OSPF
Link-state database
OSPF packet types
Router ID
Adjacencies and neighbors
Designated router (DR) and backup designated router (BDR)
OSPF area and router types
Realms
LSA packet types

Demonstrate knowledge how to configure, monitor or troubleshoot OSPF
Areas, interfaces and neighbors
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

IS-IS
Describe the concepts, operation or functionality of IS-IS
Link-state database
IS-IS PDUs
TLVs
Adjacencies and neighbors
Levels and areas
Designated intermediate system (DIS)
Metrics

Demonstrate knowledge of how to configure, monitor or troubleshoot IS-IS
Levels, interfaces and adjacencies
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

BGP
Describe the concepts, operation or functionality of BGP
BGP basic operation
BGP message types
Attributes
Route/path selection process
IBGP and EBGP functionality and interaction

Demonstrate knowledge of how to configure, monitor, or troubleshoot BGP
Groups and peers
Additional basic options
Routing policy application
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

Tunnels
Identify the concepts, requirements or functionality of IP tunneling
Tunneling applications and considerations
GRE
IP-IP

Demonstrate knowledge of how to configure, monitor or troubleshoot IP tunnels
GRE
IP-IP
Troubleshooting tools (e.g., ping, traceroute, trace options, show commands, logging)

High Availability
Identify the concepts, benefits, applications or requirements for high availability in a Junos OS environment
Link aggregation groups (LAG)
Redundant trunk groups (RTG)
Virtual Chassis
Graceful restart (GR)
Graceful Routing Engine switchover (GRES)
Nonstop active routing (NSR)
Nonstop bridging (NSB)
Bidirectional Forwarding Detection (BFD)
Virtual Router Redundancy Protocol (VRRP)
Unified In-Service Software Upgrade (ISSU)

Demonstrate knowledge of how to configure, monitor, or troubleshoot high availability components
LAG and RTG
Virtual Chassis
GR, GRES, NSB, and NSR
VRRP
ISSU
Troubleshooting tools (e.g., trace options, show commands, logging)


QUESTION 1
What are two benefits of 802.3ad link aggregation? (Choose two)

A. It increases bandwidth
B. It ensures symmetrical paths
C. It simplifies interface configuration.
D. It creates physical layer redundancy.

Answer: A, D

Aggregating multiple links between physical interfaces creates a single logical point-to-point trunk
link or a LAG. The LAG balances traffic across the member links within an aggregated Ethernet bundle
and effectively increases the uplink bandwidth. Another advantage of link aggregation is increased
availability, because the LAG is composed of multiple member links. If one member link fails, the LAG
continues to carry traffic over the remaining links.
https://www.juniper.net/documentation/us/en/software/junos/interfaces-ethernetswitches/
topics/topic-map/switches-interface-aggregated.html


QUESTION 2
Which statement is true about IP-IP tunnels?

A. Intermediate devices must have a route to the destination address of the traffic being tunneled.
B. Intermediate devices must have a route to both the tunnel source address and the tunnel destination address.
C. Intermediate devices must have a route to the tunnel destination address but do not require a route to the tunnel source address.
D. Intermediate devices must have a route to the tunnel source address but do not require a route to the tunnel destination address

Answer: B


QUESTION 3
You have a conference room with an open network port that is used by employees to connect to the
network. You are concerned about rogue switches being connected to this port
Which two features should you enable on your switch to limit access to this port? (Choose two.)

A. DHCP snooping
B. dynamic ARP inspection
C. MAC limiting
D. 802.1X

Answer: A, B


QUESTION 4
Which two port security features use the DHCP snooping database for additional port security?
(Choose two.)

A. dynamic ARP inspection
B. MACsec
C. IP Source guard
D. MAC learning

Answer: A, C


 

Tuesday, August 23, 2022

5V0-23.20 VMware vSphere with Tanzu Specialist Exam

 

VMware vSphere with Tanzu Specialist
VMware vSphere with Tanzu Specialist exam validates a candidate's knowledge about how vSphere with Tanzu can be used to orchestrate the delivery of Kubernetes clusters and containerized applications in a vSphere environment as well as their knowledge of deploying and managing VMware vSphere® with Tanzu.

Product: VMware vSphere with Tanzu
Associated Certification: VMware Certified Specialist - vSphere with Tanzu 2022

Exam Overview
Exam : 5V0-23.20 : VMware vSphere with Tanzu Specialist
Language : English
Number of Questions : 62
Format : Single and Multiple Choice, Proctored
Duration : 125 Minutes
Passing Score : 300

Passing Score –
VMware exams are scaled on a range from 100-500, with the determined raw cut score scaled to a value of 300.
Your exam may contain unscored questions in addition to the scored questions, this is a standard testing practice. You will not know which questions are unscored, your exam results will reflect your performance on the scored questions only.

Exam Details:
The VMware vSphere with Tanzu Specialist exam (5V0-23.20) which leads to VMware Certified Specialist - vSphere with Tanzu 2022 badge is a62-item exam, with a passing score of 300 using a scaled method. Exam time is 125 minutes.

Exam Delivery
This is a proctored exam delivered through Pearson VUE. For more information, visit the Pearson VUE website.

Badge Information:
For details and a complete list of requirements and recommendations for attainment, please reference the VMware Education Services – Certification website.

Minimally Qualified Candidate:
The Minimally Qualified Candidate(MQC) has basic knowledge of Kubernetes and containers, at least 12 months of experience with vSphere. The MQC also has experience with NSX-T and network, virtualization and OS experience or education. Candidates should have completed all recommended training courses for this credential and hold a VCP-DCV 2020.
The successful candidate will likely hold additional industry-recognized IT certifications or accreditations.
The MQC should have all the knowledge contained in the exam sections listed below.

Exam Sections:
This exam contains the seven sections below, some of which may NOT be included in the final exam blueprint depending on the exam objectives.
Section 1 Introduction - No testable objectives for this section
Section 2 Introduction to Containers and Kubernetes - No testable objectives for this section

Examkingdom VMware 5V0-23.20 Exam Brain dump pdf, Certkingdom VMware 5V0-23.20 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best VMware 5V0-23.20 Certification, VMware 5V0-23.20 Brain Dumps Training at certkingdom.com

Section 3 Introduction to vSphere with Tanzu

Objective 3.1: Identify the purpose and role of a Supervisor Cluster.
Objective 3.2: Identify the characteristics of the Control Plane VMs.
Objective 3.3: Given a scenario about a network, identify the workload, management, and front end.
Objective 3.4: Identify the purposes and differences between workload, management, and front end networks.
Objective 3.5: Identify the purpose and role of a Spherelet.
Objective 3.6: Identify the prerequisites and requirements to enable workload management.
Objective 3.7: Identify the characteristics and uses of kubectl CLI.
Objective 3.8: Identify how to authenticate to vSphere with Tanzu using kubectl.
Objective 3.9: Identify how to navigate namespaces using kubectl.
Objective 3.10: Given a scenario, identify the VMware solution for managing TKC.

Section 4 vSphere with Tanzu Core Services

Objective 4.1: Identify the characteristics of vSphere namespaces.
Objective 4.2: Identify the process to create a namespace.
Objective 4.3: Identify the prerequisites to create a namespace.
Objective 4.4: Given a scenario, identify the resources that can be limited in a namespace.
Objective 4.5: Given a scenario, identify the resources that can be limited for a Kubernetes object within a namespace.
Objective 4.6: Given a scenario, identify the roles that can be applied to user of a vSphere namespace.
Objective 4.7: Identify the process to allocate storage to a namespace.
Objective 4.8: Identify the characteristics of vSphere pods and CRX.
Objective 4.9: Identify the process to create a vSphere pod.
Objective 4.10: Identify the methods to scale out a vSphere pod.
Objective 4.11: Identify the characteristics of Cloud Native Storage.
Objective 4.12: Identify the relationship between a storage policy and storage class.
Objective 4.13: Given a scenario, identify the method that should be used to create a storage policy.
Objective 4.14: Identify how to view how much of the quota is being used in a given vSphere namespace.
Objective 4.15: Identify characteristics of persistent volumes in vSphere.
Objective 4.16: Identify use cases for persistent volumes.
Objective 4.17: Identify the process to manage a persistent volume claim.
Objective 4.18: Identify the method to view all the Persistent Volume claims in a vSphere environment.
Objective 4.19: Identify the characteristics of the NSX container plugin.
Objective 4.20: Identify the relationship between vSphere namespaces and NSX segments.
Objective 4.21: Identify the supervisor network topology when using NSX-T.
Objective 4.22: Identify the characteristics of Kubernetes services.
Objective 4.23: Identify the characteristics of Kubernetes network policies.
Objective 4.24: Identify the characteristics and components of vSphere with Tanzu on vSphere distributed switch.
Objective 4.25: Identify the purpose of external load balancer in vSphere with Tanzu.
Objective 4.26: Identify the characteristics of workload load balancers.
Objective 4.27: Identify the characteristics of workload networks.
Objective 4.28: Identify the relationship between workload networks and vSphere Namespaces.
Objective 4.29: Identify the supervisor network topology when using vSphere Distributed Switch Network Topology.
Objective 4.30: Identify the vSphere with Tanzu on vSphere Distributed Switch Network Requirements.
Objective 4.31: Identify the vSphere with Tanzu on vSphere Distributed Switch Prerequisites
Objective 4.32: Identify the process to enable vSphere with Tanzu on vSphere Distributed Switch
Objective 4.33: Identify the characteristics of Harbor.
Objective 4.34: Identify the use cases for an image registry.
Objective 4.35: Identify the process to enable the Harbor image registry.
Objective 4.36: Identify the integration between Harbor and vSphere with Tanzu.
Objective 4.37: Identify the process to push images to Harbor
Objective 4.38: Identify the process to deploy images from Harbor

Section 5 Tanzu Kubernetes Grid Service

Objective 5.1: Identify the characteristics of the Tanzu Kubernetes Grid Service.
Objective 5.2: Identify the differences and similarities of vSphere pods and Tanzu Kubernetes Grid clusters
Objective 5.3: Identify the relationship between supervisor clusters and TKC.
Objective 5.4: Identify the process to enable TKC versions.
Objective 5.5: Identify the characteristics of virtual machine class types for TKC.
Objective 5.6: Identify the process to deploy the TKC.
Objective 5.7: Identify the process to authenticate to a TKC.
Objective 5.8: Identify the process to Scale out a TKC.
Objective 5.9: Identify the process to Scale in a TKC.
Objective 5.10: Identify the process to upgrade a TKC.
Objective 5.11: Given a scenario with requirements, identify the kubectl command that should be used.

Section 6 Monitoring and Troubleshooting in vSphere with Tanzu - No testable objectives for this section


Section 7 vSphere with Tanzu Life Cycle
Objective 7.1: Identify the process to upgrade the vSphere with Tanzu supervisor cluster.
Objective 7.2: Identify the process to perform certificate management for vSphere with Tanzu supervisor cluster.

Question: 1
Identify the API that is not supported by Check Point currently.

A. R81 Management API
B. Identity Awareness Web Services API
C. Open REST API
D. OPSEC SDK

Answer: C

Question: 2
SandBlast Mobile identifies threats in mobile devices by using on-device, network, and cloud-based
algorithms and has four dedicated components that constantly work together to protect mobile
devices and their data. Which component is NOT part of the SandBlast Mobile solution?

A. Management Dashboard
B. Gateway
C. Personal User Storage
D. Behavior Risk Engine

Answer: C

Question: 3
What are the different command sources that allow you to communicate with the API server?

A. SmartView Monitor, API_cli Tool, Gaia CLI, Web Services
B. SmartConsole GUI Console, mgmt_cli Tool, Gaia CLI, Web Services
C. SmartConsole GUI Console, API_cli Tool, Gaia CLI, Web Services
D. API_cli Tool, Gaia CLI, Web Services

Answer: B

Question: 4
What makes Anti-Bot unique compared to other Threat Prevention mechanisms, such as URL Filtering, Anti-Virus, IPS, and Threat Emulation?

A. Anti-Bot is the only countermeasure against unknown malware
B. Anti-Bot is the only protection mechanism which starts a counter-attack against known Command & Control Centers
C. Anti-Bot is the only signature-based method of malware protection.
D. Anti-Bot is a post-infection malware protection to prevent a host from establishing a connection to a Command & Control Center.

Answer: D
 

Monday, August 22, 2022

500-560 Cisco Networking: On-Premise and Cloud Solutions Exam

 

500-560 OCSE
Associated Certification: Cisco Express Specialization – Networking Track
Duration: 60 minutes (45 - 55 questions)
Available languages: English

Exam overview
This exam tests a candidate's knowledge of the skills needed by an engineer to understand the necessary information to support the express specialization networking business customer.
This exam covers Switching, Routing, Wireless, Cloud and Security solutions for engagements with smaller business customers.

Exam topics
15% 1.0 Switching Overview and Features

1.1 Understand the market for switching portfolio
1.2 Explain the switching product portfolio and the solutions it enables
1.3 Identify the tools and resources available for switching

15% 2.0 Routing Overview and Features
2.1 Understand the routing overview
2.2 Describe the routing product portfolio
2.3 Explain the routing positioning
2.4 Identify the tools and resources available

25% 3.0 Wireless Overview and Features
3.1 Identify Cisco’s products in the wireless market
3.2 Describe and explain the Cisco wireless product portfolio and positioning
3.3 Describe, explain, and identify Cisco Mobility Express, wireless LAN controller, and access points features
3.4 Define the features and benefits of Cisco DNA Spaces
3.5 Define the features and benefits of Cisco DNA Assurance

35% 4.0 Meraki Overview and Products
4.1 Describe Meraki MX product mix and solutions
4.2 Describe Meraki MS product mix and solutions
4.3 Describe Meraki MR product mix and solutions
4.4 Describe Meraki SM product mix and solutions
4.5 Describe Meraki MV product mix and solutions
4.6 Explain Meraki licensing, support, and warranty
4.7 Identify the Meraki sales cycle

10% 5.0 Security Overview and Features
5.1 Describe the Branch Threat Defense Umbrella
5.2 Explain threat-centric security approach and security architecture

Examkingdom Cisco 500-560 Exam Brain dump pdf, Certkingdom Cisco 500-560 Brain Dumps PDF

MCTS Training, MCITP Trainnig

Best Cisco 500-560 Certification, Cisco 500-560 Brain Dumps Training at Certkingdom.com

Question: 1
What is one of the key drivers of growing security threats in the market?

A. comprehensive security solutions
B. security solution fragmentation
C. increased demand for cybersecurity professionals
D. hardware with integrated security solution

Answer: B

Question: 2
What feature of the Catalyst 2960-L allows customers to get a small branch or office network running within minutes?

A. support for Cisco DNA center
B. on-box web interface for configuration
C. flexible deployments with Stackwise-160
D. complete CLI support

Answer: B

Question: 3
What is one typical need of a small branch?

A. multiple network services integrated into a single device
B. comprehensive subscription-based services
C. multiple devices for optimal flexibility
D. ability for users to access the majority of resources at off-site data storage

Answer: A

Question: 4
What is one advantage of Umbrella branch package?

A. prevent already-infected devices from connecting to command and control
B. prevent guest or corporate users from connecting to malicious domains and IP addresses
C. deploy the branch package on a Cisco ISR4K router in 4 easy steps
D. no client side configuration required

Answer: B

Question: 5
What is a key feature of the Meraki MV Dashboard?

A. drag and drop camera feeds to create video walls with up to 16 cameras per layout
B. bulk configuration changes and software updates
C. device security and location analytics in a single pane of glass
D. single pane of glass showing root cause analysis for all connected wireless clients

Answer: A