1. The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/reporting/mail_incoming_traffic_summary/detected_amp?startDate=2016-09-10T19:00:00.000Z&endDate=2018- 0924T23:00:00.000Z&device_type=esa&device_name=esa01. What does this GET call return?
A) value of a specific counter from a counter group, with the device name and type for email
B) value of a specific counter from a counter group, with the device name and type for web
C) values of all counters of a counter group, with the device group name and device type for email
D) values of all counters of a counter group, with the device group name and device type for web
2. Which request searches for a process window in Cisco ThreatGRID that contains the word â??secretâ??
A) /api/v2/search/submissions?term=process&q=secret
B) /api/v2/search/submissions?term=window&title=secret
C) /api/v2/search/submissions?term=processwindow&title=secret
D) /api/v2/search/submissions?term=processwindow&q=secret
3. Which query parameter is required when using the reporting API of Cisco Security Management Appliances?
A) startDate + endDate
B) query_type
C) device_type
D) filterValue
4. What are two benefits of Ansible when managing security platforms? (Choose two.)(Select 2answers)
A) End users can be identified and tracked across a network.
B) The time that is needed to deploy a change is reduced, compared to manually applying the change
C) Policies can be updated on multiple devices concurrently, which reduces outage windows.
D) Network performance issues can be identified and automatically remediated.
5. Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?
A) /tenants/{tenantId}/policy/system/host-policy
B) /tenants/{tenantId}/policy/system
C) /tenants/{tenantId}/policy/system/role-policy
D) /tenants/{tenantId}/policy/system/{policyId}
Write a public review