<< Prev Question Next Question >>

Question 234/309

A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic. The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (309q)
Question 1: Which ESA implementation method segregates inbound and outbo...
Question 2: For a given policy in Cisco Umbrella, how should a customer ...
Question 3: An engineer is configuring Cisco Umbrella and has an identit...
Question 4: Which algorithm is an NGE hash function?...
Question 5: An organization must add new firewalls to its infrastructure...
Question 6: Which Cisco platform onboards the endpoint and can issue a C...
Question 7: Which information is required when adding a device to Firepo...
Question 8: Why should organizations migrate to a multifactor authentica...
Question 9: What is the purpose of the Cisco Endpoint loC feature?...
Question 10: Refer to the exhibit. (Exhibit) What does the API key do whi...
Question 11: Which two behavioral patterns characterize a ping of death a...
Question 12: Which process is used to obtain a certificate from a CA?...
Question 13: What is the Cisco API-based broker that helps reduce comprom...
Question 14: A company identified a phishing vulnerability during a pente...
Question 15: An administrator is adding a new switch onto the network and...
Question 16: Which Cisco network security device supports contextual awar...
Question 17: A Cisco ESA administrator has been tasked with configuring t...
Question 18: What is a benefit of using Cisco AVC (Application Visibility...
Question 19: An administrator is configuring N I P on Cisco ASA via ASDM ...
Question 20: When wired 802.1X authentication is implemented, which two c...
Question 21: Why is it important to have a patching strategy for endpoint...
Question 22: Which technology limits communication between nodes on the s...
Question 23: Which term describes when the Cisco Secure Firewall download...
Question 24: Refer to the exhibit. (Exhibit) An engineer is implementing ...
Question 25: What is the difference between Cross-site Scripting and SQL ...
Question 26: Why is it important to have logical security controls on end...
Question 27: What is a benefit of flexible NetFlow records?...
Question 28: An engineer is configuring device-hardening on a router in o...
Question 29: Which two protocols must be configured to authenticate end u...
Question 30: What is the difference between deceptive phishing and spear ...
Question 31: For a given policy in Cisco Umbrella, how should a customer ...
Question 32: Which DoS attack uses fragmented packets in an attempt to cr...
Question 33: Which Cisco WSA feature supports access control using URL ca...
Question 34: Which function is included when Cisco AMP is added to web se...
Question 35: What are two functions of IKEv1 but not IKEv2? (Choose two)...
Question 36: An engineer enabled SSL decryption for Cisco Umbrella intell...
Question 37: A network engineer is configuring DMVPN and entered the cryp...
Question 38: A network administrator is setting up Cisco FMC to send logs...
Question 39: A customer has various external HTTP resources available inc...
Question 40: Which Cisco ISE feature helps to detect missing patches and ...
Question 41: Which algorithm provides encryption and authentication for d...
Question 42: An organization has a Cisco ESA set up with policies and wou...
Question 43: An administrator configures a new destination list in Cisco ...
Question 44: What must be used to share data between multiple security pr...
Question 45: An MDM provides which two advantages to an organization with...
Question 46: What are two benefits of using Cisco Duo as an MFA solution?...
Question 47: Which statement about IOS zone-based firewalls is true?...
Question 48: Drag and drop the Firepower Next Generation Intrusion Preven...
Question 49: A network engineer is configuring NetFlow top talkers on a C...
Question 50: Which two parameters are used for device compliance checks? ...
Question 51: An engineer is trying to securely connect to a router and wa...
Question 52: Which Cisco AMP feature allows an engineer to look back to t...
Question 53: What is the target in a phishing attack?...
Question 54: Refer to the exhibit. (Exhibit) Traffic is not passing throu...
Question 55: What are two facts about WSA HTTP proxy configuration with a...
Question 56: What provides visibility and awareness into what is currentl...
Question 57: When MAB is configured for use within the 802.1X environment...
Question 58: Refer to the exhibit. A network engineer must configure a Ci...
Question 59: With Cisco AMP for Endpoints, which option shows a list of a...
Question 60: What is the term for the concept of limiting communication b...
Question 61: (Exhibit) Refer to the exhibit. What is the result of the Py...
Question 62: Which industry standard is used to integrate Cisco ISE and p...
Question 63: What provides the ability to program and monitor networks fr...
Question 64: What is a required prerequisite to enable malware file scann...
Question 65: Under which two circumstances is a CoA issued? (Choose two)...
Question 66: Refer to the exhibit. (Exhibit) What will happen when this P...
Question 67: How does Cisco Umbrella protect clients when they operate ou...
Question 68: Which capability is exclusive to a Cisco AMP public cloud in...
Question 69: An engineer is configuring AMP for endpoints and wants to bl...
Question 70: Which encryption algorithm provides highly secure VPN commun...
Question 71: Which two statements about a Cisco WSA configured in Transpa...
Question 72: Which group within Cisco writes and publishes a weekly newsl...
Question 73: Which policy does a Cisco Secure Web Appliance use to block ...
Question 74: Which two cryptographic algorithms are used with IPsec? (Cho...
Question 75: What is a benefit of using GET VPN over FlexVPN within a VPN...
Question 76: An engineer needs to add protection for data in transit and ...
Question 77: Which technology is used to improve web traffic performance ...
Question 78: An organization is implementing URL blocking using Cisco Umb...
Question 79: What are two characteristics of Cisco DNA Center APIs? (Choo...
Question 80: Which Talos reputation center allows you to track the reputa...
Question 81: An administrator needs to configure the Cisco ASA via ASDM s...
Question 82: What features does Cisco FTDv provide over ASAv?...
Question 83: Which two tasks allow NetFlow on a Cisco ASA 5500 Series fir...
Question 84: Refer to the exhibit. (Exhibit) Which command was used to ge...
Question 85: With regard to RFC 5176 compliance, how many IETF attributes...
Question 86: Which feature is supported when deploying Cisco ASAv within ...
Question 87: What is the result of running the crypto isakmp key ciscXXXX...
Question 88: What are two ways a network administrator transparently iden...
Question 89: What is a key difference between Cisco Firepower and Cisco A...
Question 90: What are two DDoS attack categories? (Choose two)...
Question 91: Refer to the exhibit. (Exhibit) An engineer configured wired...
Question 92: Which command is used to log all events to a destination col...
Question 93: Which SNMPv3 configuration must be used to support the stron...
Question 94: An engineer needs to detect and quarantine a file named abc4...
Question 95: An organization configures Cisco Umbrella to be used for its...
Question 96: Which cloud model is a collaborative effort where infrastruc...
Question 97: An engineer must configure Cisco AMP for Endpoints so that i...
Question 98: What is a capability of Cisco ASA Netflow?...
Question 99: When NetFlow is applied to an interface, which component cre...
Question 100: Which Cisco ASA Platform mode disables the threat detection ...
Question 101: An engineer must deploy Cisco Secure Email with Cloud URL An...
Question 102: An organization has two systems in their DMZ that have an un...
Question 103: In which type of attack does the attacker insert their machi...
Question 104: Which system performs compliance checks and remote wiping?...
Question 105: An administrator configures a Cisco WSA to receive redirecte...
Question 106: An engineer enabled SSL decryption for Cisco Umbrella intell...
Question 107: An organization wants to reduce their attach surface for clo...
Question 108: What is a feature of container orchestration?...
Question 109: Which feature of Cisco ASA allows VPN users to be postured a...
Question 110: Which CLI command is used to enable URL filtering support fo...
Question 111: Which ID store requires that a shadow user be created on Cis...
Question 112: What is the purpose of the certificate signing request when ...
Question 113: Which IPS engine detects ARP spoofing?...
Question 114: What is a characteristic of a bridge group in ASA Firewall t...
Question 115: A network administrator has configured TACACS on a network d...
Question 116: An engineer configured a new network identity in Cisco Umbre...
Question 117: What is a benefit of using Cisco FMC over Cisco ASDM?...
Question 118: Refer to the exhibit, (Exhibit) which command results in the...
Question 119: An organization is using DNS services for their network and ...
Question 120: What is a function of 3DES in reference to cryptography?...
Question 121: What is a benefit of a Cisco Secure Email Gateway Virtual as...
Question 122: An engineer is configuring Cisco Secure Endpoint to enhance ...
Question 123: Which solution should be leveraged for secure access of a CI...
Question 124: An engineer wants to automatically assign endpoints that hav...
Question 125: Which posture assessment requirement provides options to the...
Question 126: Which system facilitates deploying microsegmentation and mul...
Question 127: Which PKI enrollment method allows the user to separate auth...
Question 128: What must be enabled to secure SaaS-based applications?...
Question 129: An engineer must modify a policy to block specific addresses...
Question 130: Which telemetry data captures variations seen within the flo...
Question 131: Which two types of connectors are used to generate telemetry...
Question 132: While using Cisco Secure Firewall's Security Intelligence po...
Question 133: Which solution is more secure than the traditional use of a ...
Question 134: (Exhibit) Refer to the exhibit. Which configuration item mak...
Question 135: A small organization needs to reduce the VPN bandwidth load ...
Question 136: Which method must be used to connect Cisco Secure Workload t...
Question 137: Which technology must De used to Implement secure VPN connec...
Question 138: An administrator is adding a new Cisco ISE node to an existi...
Question 139: An administrator is establishing a new site-to-site VPN conn...
Question 140: What is a benefit of performing device compliance?...
Question 141: Which endpoint solution protects a user from a phishing atta...
Question 142: A university policy must allow open access to resources on t...
Question 143: Which two endpoint measures are used to minimize the chances...
Question 144: Which Cisco security solution gives the most complete view o...
Question 145: When a Cisco Secure Web Appliance checks a web request, what...
Question 146: What are two list types within AMP for Endpoints Outbreak Co...
Question 147: Which baseline form of telemetry is recommended for network ...
Question 148: Which exfiltration method does an attacker use to hide and e...
Question 149: Which Cisco platform processes behavior baselines, monitors ...
Question 150: Which security solution uses NetFlow to provide visibility a...
Question 151: An administrator is configuring a DHCP server to better secu...
Question 152: Which feature requires that network telemetry be enabled?...
Question 153: An engineer is configuring a Cisco ESA and wants to control ...
Question 154: In which situation should an Endpoint Detection and Response...
Question 155: Which solution combines Cisco IOS and IOS XE components to e...
Question 156: Which two aspects of the cloud PaaS model are managed by the...
Question 157: What is a characteristic of traffic storm control behavior?...
Question 158: What does Cisco AMP for Endpoints use to help an organizatio...
Question 159: A network engineer must configure a Cisco Secure Email Gatew...
Question 160: Cisco SensorBase gaihers threat information from a variety o...
Question 161: An engineer configures new features within the Cisco Umbrell...
Question 162: What are two functionalities of northbound and southbound AP...
Question 163: What is provided by the Secure Hash Algorithm in a VPN?...
Question 164: When a next-generation endpoint security solution is selecte...
Question 165: Which term describes when the Cisco Firepower downloads thre...
Question 166: Which statement describes a traffic profile on a Cisco Next ...
Question 167: An organization uses Cisco FMC to centrally manage multiple ...
Question 168: Which attack is commonly associated with C and C++ programmi...
Question 169: A network engineer is trying to figure out whether FlexVPN o...
Question 170: A network administrator is modifying a remote access VPN on ...
Question 171: With which components does a southbound API within a softwar...
Question 172: Which Cisco security solution provides patch management in t...
Question 173: What is the process In DevSecOps where all changes In the ce...
Question 174: What is the most common type of data exfiltration that organ...
Question 175: A security test performed on one of the applications shows t...
Question 176: Which two components do southbound APIs use to communicate w...
Question 177: Which feature is configured for managed devices in the devic...
Question 178: How does Cisco Stealthwatch Cloud provide security for cloud...
Question 179: A network administrator is configuring a switch to use Cisco...
Question 180: What is a language format designed to exchange threat intell...
Question 181: A user has a device in the network that is receiving too man...
Question 182: Which two configurations must be made on Cisco ISE and on Ci...
Question 183: Which threat intelligence standard contains malware hashes?...
Question 184: Refer to the exhibit. (Exhibit) A network engineer is testin...
Question 185: Which attack type attempts to shut down a machine or network...
Question 186: Drag and drop the suspicious patterns for the Cisco Tetratio...
Question 187: Drag and drop the common security threats from the left onto...
Question 188: Drag and drop the security solutions from the left onto the ...
Question 189: Using Cisco Firepower's Security Intelligence policies, upon...
Question 190: Using Cisco Cognitive Threat Analytics, which platform autom...
Question 191: Which Cisco solution provides a comprehensive view of Intern...
Question 192: What is a characteristic of an EDR solution and not of an EP...
Question 193: Which cloud service model offers an environment for cloud co...
Question 194: Refer to the exhibit. When creating an access rule for URL f...
Question 195: Refer to the exhibit. (Exhibit) What does the number 15 repr...
Question 196: A malicious user gained network access by spoofing printer c...
Question 197: Drag and drop the deployment models from the left onto the e...
Question 198: What is a benefit of using Cisco CWS compared to an on-premi...
Question 199: Which Cisco solution does Cisco Umbrella integrate with to d...
Question 200: Which two mechanisms are used to control phishing attacks? (...
Question 201: Which problem Is solved by deploying a multicontext firewall...
Question 202: Which type of algorithm provides the highest level of protec...
Question 203: What is a difference between a DoS attack and a DDoS attack?...
Question 204: When a Cisco WSA checks a web request, what occurs if it is ...
Question 205: Which feature within Cisco Umbrella allows for the ability t...
Question 206: Which Dos attack uses fragmented packets to crash a target m...
Question 207: Which feature must be configured before implementing NetFlow...
Question 208: Based on the NIST 800-145 guide, which cloud architecture ma...
Question 209: An engineer is configuring cloud logging using a company-man...
Question 210: A company recently discovered an attack propagating througho...
Question 211: What is the primary difference between an Endpoint Protectio...
Question 212: Which cloud service offering allows customers to access a we...
Question 213: Refer to the exhibit. (Exhibit) What is a result of the conf...
Question 214: What is the difference between EPP and EDR?...
Question 215: Which technology must be used to implement secure VPN connec...
Question 216: Which form of attack is launched using botnets?...
Question 217: What is the primary role of the Cisco Email Security Applian...
Question 218: An organization is receiving SPAM emails from a known malici...
Question 219: Which Talos reputation center allows for tracking the reputa...
Question 220: (Exhibit) Refer to the exhibit. When configuring this access...
Question 221: Drag and drop the descriptions from the left onto the encryp...
Question 222: Which two capabilities does TAXII support? (Choose two)...
Question 223: A Cisco ESA network administrator has been tasked to use a n...
Question 224: What does the Cloudlock Apps Firewall do to mitigate securit...
Question 225: Which Cisco security solution integrates with cloud applicat...
Question 226: An organization is trying to implement micro-segmentation on...
Question 227: Which two functions does the Cisco Advanced Phishing Protect...
Question 228: What is a commonality between DMVPN and FlexVPN technologies...
Question 229: A hacker initiated a social engineering attack and stole use...
Question 230: What are two ways a network administrator transparently iden...
Question 231: An organization wants to secure data in a cloud environment....
Question 232: Which security solution protects users leveraging DNS-layer ...
Question 233: An engineer has been tasked with implementing a solution tha...
Question 234: A network engineer has configured a NTP server on a Cisco AS...
Question 235: Which two risks is a company vulnerable to if it does not ha...
Question 236: What is the purpose of the Decrypt for Application Detection...
Question 237: What is a characteristic of Firepower NGIPS inline deploymen...
Question 238: Which solution protects hybrid cloud deployment workloads wi...
Question 239: An engineer is adding a Cisco router to an existing environm...
Question 240: A company is experiencing exfiltration of credit card number...
Question 241: Which two capabilities does an MDM provide? (Choose two.)...
Question 242: What are two reasons for implementing a multifactor authenti...
Question 243: Which statement about the configuration of Cisco ASA NetFlow...
Question 244: Which Cisco DNA Center RESTful PNP API adds and claims a dev...
Question 245: Which attack gives unauthorized access to files on the web s...
Question 246: Which functions of an SDN architecture require southbound AP...
Question 247: Refer to the exhibit. (Exhibit) Consider that any feature of...
Question 248: Which open standard creates a framework for sharing threat i...
Question 249: Drag and drop the concepts from the left onto the correct de...
Question 250: A network administrator is configuring SNMPv3 on a new route...
Question 251: An engineer integrates Cisco FMC and Cisco ISE using pxGrid ...
Question 252: An engineer must modify an existing remote access VPN using ...
Question 253: During a recent security audit a Cisco IOS router with a wor...
Question 254: A network administrator needs to find out what assets curren...
Question 255: What are two security benefits of an MDM deployment? (Choose...
Question 256: Which VPN technology supports a multivendor environment and ...
Question 257: An organization wants to use Cisco FTD or Cisco ASA devices....
Question 258: Refer to the exhibit. (Exhibit) A network administrator conf...
Question 259: How does Cisco Workload Optimization portion of the network ...
Question 260: What is the purpose of joining Cisco WSAs to an appliance gr...
Question 261: Which ASA deployment mode can provide separation of manageme...
Question 262: A network engineer must configure a Cisco ESA to prompt user...
Question 263: What is a function of the Layer 4 Traffic Monitor on a Cisco...
Question 264: Which two features of Cisco Email Security can protect your ...
Question 265: (Exhibit) Refer to the exhibit. What is the result of using ...
Question 266: The main function of northbound APIs in the SDN architecture...
Question 267: An engineer is configuring cloud logging on Cisco ASA and ne...
Question 268: What is an attribute of the DevSecOps process?...
Question 269: What is the purpose of the Cisco Endpoint IoC feature?...
Question 270: Which action configures the IEEE 802.1X Flexible Authenticat...
Question 271: Drag and drop the capabilities of Cisco Firepower versus Cis...
Question 272: Which Cisco platform ensures that machines that connect to o...
Question 273: What are two advantages of using Cisco Any connect over DMVP...
Question 274: Which API is used for Content Security?...
Question 275: Which feature is leveraged by advanced antimalware capabilit...
Question 276: Elliptic curve cryptography is a stronger more efficient cry...
Question 277: In which situation should an Endpoint Detection and Response...
Question 278: Which two preventive measures are used to control cross-site...
Question 279: v (Exhibit) Refer to the exhibit When configuring this acces...
Question 280: Which key feature of Cisco ZFW is unique among other Cisco I...
Question 281: An engineer is implementing Cisco CES in an existing Microso...
Question 282: For which two conditions can an endpoint be checked using IS...
Question 283: What is a prerequisite when integrating a Cisco ISE server a...
Question 284: What are two characteristics of the RESTful architecture use...
Question 285: Which two capabilities of Integration APIs are utilized with...
Question 286: Which attack is preventable by Cisco ESA but not by the Cisc...
Question 287: How does Cisco Advanced Phishing Protection protect users?...
Question 288: What must be configured on Cisco Secure Endpoint to create a...
Question 289: In which form of attack is alternate encoding, such as hexad...
Question 290: Which type of API is being used when a security application ...
Question 291: A mall provides security services to customers with a shared...
Question 292: (Exhibit) Refer to the exhibit. A network engineer must retr...
Question 293: What is the benefit of installing Cisco AMP for Endpoints on...
Question 294: Which two methods must be used to add switches into the fabr...
Question 295: Which VMware platform does Cisco ACI integrate with to provi...
Question 296: A company discovered an attack propagating through their net...
Question 297: Refer to the exhibit. (Exhibit) An administrator is adding a...
Question 298: Which benefit is provided by ensuring that an endpoint is co...
Question 299: Refer to the exhibit. (Exhibit) Which configuration item mak...
Question 300: In which two ways does the Cisco Advanced Phishing Protectio...
Question 301: Which technology provides the benefit of Layer 3 through Lay...
Question 302: Why would a user choose an on-premises ESA versus the CES so...
Question 303: Which Cisco ISE service checks the compliance of endpoints b...
Question 304: Which two devices support WCCP for traffic redirection? (Cho...
Question 305: Which method of attack is used by a hacker to send malicious...
Question 306: An engineer is deploying Cisco Advanced Malware Protection (...
Question 307: Which Cisco solution extends network visibility, threat dete...
Question 308: Which solution stops unauthorized access to the system if a ...
Question 309: What is a benefit of using a multifactor authentication stra...