Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

300-735 Automating and Programming Cisco Security Solutions (300-735 SAUTO) Questions and Answers

Questions 4

Which two API capabilities are available on Cisco Identity Services Engine? (Choose two.)

Options:

A.

Platform Configuration APIs

B.

Monitoring REST APIs

C.

Performance Management REST APIs

D.

External RESTful Services APIs

E.

Internal RESTful Services APIs

Buy Now
Questions 5

Drag and drop the items to complete the curl request to the ThreatGRID API. The API call should request the first 10 IP addresses that ThreatGRID saw samples communicate with during analysis, in the first two hours of January 18th (UTC time), where those communications triggered a Behavior Indicator that had a confidence equal to or higher than 75 and a severity equal to or higher than 95.

Options:

Buy Now
Questions 6

Which two APIs are available from Cisco ThreatGRID? (Choose two.)

Options:

A.

Access

B.

User Scope

C.

Data

D.

Domains

E.

Curated Feeds

Buy Now
Questions 7

What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)

Options:

A.

eStreamer is used to get sources for intelligence services.

B.

eStreamer is used to send malware event data.

C.

eStreamer is used to get a list of access control policies.

D.

eStreamer is used to send policy data.

E.

eStreamer is used to send intrusion event data.

Buy Now
Questions 8

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

Options:

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Buy Now
Questions 9

Refer to the exhibit.

A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information.

Which two actions enable the operator to limit returned data? (Choose two.)

Options:

A.

Add recordLimit. followed by an integer (key:value) to the flow_data.

B.

Add a for loop at the end of the script, and print each key value pair separately.

C.

Add flowLimit, followed by an integer (key:value) to the flow_data.

D.

Change the startDateTime and endDateTime values to include smaller time intervals.

E.

Change the startDate and endDate values to include smaller date intervals.

Buy Now
Exam Code: 300-735
Exam Name: Automating and Programming Cisco Security Solutions (300-735 SAUTO)
Last Update: May 5, 2024
Questions: 60

PDF + Testing Engine

$140

Testing Engine

$105

PDF (Q&A)

$90