Automating and Programming Cisco Security Solutions Demo Questions
Here you can find Automating and Programming Cisco Security Solutions exam sample questions which will help you to prepare for your upcoming certification test. These questions will give you an idea of what to expect on the exam and help you review the 300-735 SAUTO study material. Be sure to go over the Free 300-735 SAUTO questions multiple times so that you are confident and comfortable with the material. You can always go to the full 300-735 SAUTO dumps here.
These Automating and Programming Cisco Security Solutions certification questions are designed to give you a feel for the material you'll be tested on. They cover a wide range of topics, so you can get a sense of what to expect on examination day.
These 300-735 SAUTO dumps are updated regularly, so you can be confident that you're studying with the most up-to-date information available. We also provide answer keys so that students can check their work.
Additionally, going through Automating and Programming Cisco Security Solutions practice questions can help you identify any areas where you need more review. Taking advantage of our 300-735 SAUTO demo questions is a great way to set yourself up for success on the real thing.
These Automating and Programming Cisco Security Solutions questions cover the material that will be on the test, and provide an opportunity for students to practice their skills. The questions are designed to be similar to those that will be on the actual Automating and Programming Cisco Security Solutions exam, so that students can get a feel for what they will be facing. We believe that by providing these demo questions, students will be better prepared and more likely to succeed on their exams.
Good luck for the 300-735 SAUTO exam!
Automating and Programming Cisco Security Solutions Sample Questions:
1. In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which has a GUID of 6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03?
A. https://api.amp.cisco.com/v1/endpoints?group[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
B. https://api.amp.cisco.com/v1/computers?group_guid[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
C. https://api.amp.cisco.com/v1/computers?group_guid-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
D. https://api.amp.cisco.com/v1/endpoints?group-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03
2. Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?
A. curl -X PUT"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/ {tenant_id}/tags
B. curl -X POST -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/ tenants/tags
C. curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/ {tenant_id}/tags
D. curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/ tags
3. When the URI "/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169- 6d9ed49b625f/policy/accesspolicies" is used to make a POST request, what does "e276abec-e0f2-11e3-8169-6d9ed49b625f" represent?
A. API token
B. domain UUID
C. access policy UUID
D. object UUID
4. Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)
A. email
B. Microsoft Word file
C. FTP
D. web
E. csv file
5. Which two URI parameters are needed for the Cisco Stealthwatch Top Alarm Host v1 API? (Choose two.)
A. startAbsolute
B. externalGeos
C. tenantId
D. intervalLength
E. tagID
6. Refer to the exhibit. 4 A security engineer created a script and successfully executed it to retrieve all currently open alerts. Which print command shows the first returned alert?
A. print(response[data][0])
B. print(response[results][0])
C. print(response.json()[data][0])
D. print(response.json()[results][0])
7. Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)
A. user activity events
B. intrusion events
C. file events
D. intrusion event extra data
E. malware events
8. Which API capability is available on Cisco Firepower devices?
A. Firepower Management Center - Sockets API
B. Firepower Management Center - eStreamer API
C. Firepower Management Center - Camera API
D. Firepower Management Center - Host Output API
9. A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API. Which action does the engineer take to achieve the goal?
A. Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/ intrusionpolicies.
B. Make a POST request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.
C. Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.
D. Make a PUT request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.
10. The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/ reporting/mail_incoming_traffic_summary/detected_amp?startDate=2016- 09- 10T19:00:00.000Z&endDate=2018-09-24T23:00:00.000Z&device_type=esa&device_name=esa01. What does this GET call return?
A. values of all counters of a counter group, with the device group name and device type for web
B. value of a specific counter from a counter group, with the device name and type for email
C. value of a specific counter from a counter group, with the device name and type for web
D. values of all counters of a counter group, with the device group name and device type for email