GOOD NEWS:Flydumps has published the new version with all the new added questions and answers.By training the Cisco https://www.pass4itsure.com/642-513.html VCE dumps, you can pass the exam easily and quickly.
QUESTION 31
What happens if the Agent UI control rule is not present in any active rule modules?
A. The Agent UI becomes present on the system.
B. The Agent UI is not present on the system.
C. The Agent UI is visible on the system.
D. The Agent UI is not visible on the system.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 32
What are the three options that can be given to a user when a Query User window appears? (Choose three.)
A. allow
B. accept
C. deny
D. kill E. terminate
Correct Answer: ACE Section: (none) Explanation
Explanation/Reference:
QUESTION 33
Which view within the CSA MC allows users to see a view of event records based on filtering criteria such as time and severity?
A. Event Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Event Alerts
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 34
When a rule is cloned, which part of the rule is not cloned?
A. sets
B. rule modules
C. hosts
D. variables
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 35
What is the purpose of the network interface control rule?
A. to prevent applications from opening devices and acting as a sniffer
B. to provide protocol stack hardening rules
C. to prevent users from opening devices that can act as a sniffer
D. to provide filtering of undesired traffic at the network interface level
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 36
What action must happen before a system that has CSA can download policies configured for it?
A. The system must be rebooted.
B. The system must install Agent kits.
C. The system must be polled by the CSA MC.
D. The system must register with the CSA MC.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 37
Which rules will not be enforced if you fail to reboot a Windows system following installation of the CSA?
A. network access control rules
B. buffer overflow rules
C. COM component access control rules
D. network shield rules
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 38
Which view within the CSA MC allows users to see overall system status information, including a summary of recorded events, agent configuration, and activity?
A. Status Summary
B. Event Log
C. Event Monitor
D. Event Sets
E. Alerts
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 39
Which operating system does not allow Query User options?
A. OS2
B. Windows
C. Linux
D. Solaris
E. HPUX
Correct Answer: B Section: (none) Explanation
Explanation/Reference: QUESTION 40
For which layers of the OSI reference model does CSA enforce security?
A. Layer 1 through Layer 4
B. Layer 1 through Layer 7
C. Layer 2 through Layer 4
D. Layer 3 through Layer 7
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 41
Which view within the CSA MC allows users to see a continuously refreshed view of the most recently logged event records?
A. Event Log
B. Event Monitor
C. Event Sets
D. Event Alerts
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 42
What are the three CSA MC administrator roles? (Choose three.)
A. access
B. configure
C. deploy
D. view
E. monitor
F. administer
Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 43
What can you optionally install when you choose the Quiet Install option when creating a new Windows Agent kit?
A. the Agent kit shim
B. the protocol shim
C. the network shim
D. the policy shim
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 44
When you choose the Log All Deny Actions option within a group, how are deny actions logged?
A. Deny actions are logged every 5 minutes.
B. Deny actions are logged every 10 minutes.
C. Every deny action is logged regardless of the specific rule settings.
D. Only those deny actions that are configured within specific rules are logged.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 45
For which operating system is the system API control rule available?
A. OS2
B. Windows
C. Linux
D. Solaris
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 46
How can you configure a host to poll in to the CSA MC before its scheduled polling interval using the CSA MC?
A. Click the Poll button on the Agent UI.
B. Choose the Poll Now button on the CSA MC.
C. Choose the Send Polling Hint option in the CSA MC.
D. Enter a polling interval in the appropriate box on the CSA MC.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 47
In which type of rules are file sets used?
A. COM component access control rules
B. resource access control rules
C. file version control rules
D. file access control rules
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 48
What status is shown when an Agent kit is prepared for downloading to hosts?
A. prepared
B. ready
C. needs rule generation
D. complete
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 49
Drag Drop question
A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
Answer: Check certifyme eEngine, Download from Member Center
QUESTION 50
Which protocol is required for the administrative workstation to communicate with the CSA MC?
A. SSH
B. Telnet
C. SSL
D. IPSec
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 51
How can the Agent kit be sent out to host machines?
A. via a URL that is e-mailed to clients
B. via a TFTP server
C. via an FTP server
D. via a Telnet server
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 52
What is the purpose of the sniffer and protocol detection rule?
A. to stop sniffers from running on a network
B. to allow sniffers to run on a network
C. to cause an event to be logged when non-IP protocols and sniffer programs are detected running on systems
D. to deny non-IP protocols and sniffer programs from running on systems
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What are three types of variables used for CSA? (Choose three.)
A. global sets
B. file sets
C. API sets
D. data sets
E. network address sets
Correct Answer: BDE Section: (none) Explanation Explanation/Reference:
QUESTION 54
What is the purpose of connection rate limit rules?
A. to limit the number of connections to an application
B. to limit the number of calls to the kernel in a specified time frame
C. to limit the number of network connections within a specified time frame
D. to limit the number of malformed connection requests to a web server
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which port is used to access the CSA MC from the administrative workstation?
A. 21
B. 23
C. 1741
D. 1802
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which two of the following file access rule criteria can you use to allow or deny the operations that the selected applications can perform on files? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
E. the address with which a system is attempting to communicate
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 57
What action is taken on user query windows when the Agent UI is not present on a system?
A. The default action is always taken.
B. All actions are denied.
C. All actions are allowed.
D. All actions are allowed and logged.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 58
Which three make up the CSA architecture model? (Choose three.)
A. Cisco Trust Agent
B. Cisco Security Agent
C. Cisco Security Agent Management Center
D. Cisco Intrusion Prevention System
E. an administrative workstation
F. a syslog server
Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Which two of the following network access rules can you use to control access to specified network services? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
We provide thoroughly reviewed Cisco 642-513 using the training resources which are the best for Cisco https://www.pass4itsure.com/642-513.html,and to get certified by Microsoft Windows Store apps.It is a best choice to accelerate your career as a professional in the Information Technology industry. Now we add the latest Cisco 642-513 content and to print and share content.