Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 300-735 - Automating and Programming Cisco Security Solutions (300-735 SAUTO)

Page: 1 / 2
Total 60 questions

A developer has just completed the configuration of an API that connects sensitive internal systems. Based on company policies, the security of the data is a high priority.

Which approach must be taken to secure API keys and passwords?

A.

Embed them directly in the code.

B.

Store them in a hidden file.

C.

Store them inside the source tree of the application.

D.

Change them periodically.

Refer to the exhibit.

A Python function named "query" has been developed, and will be used to query the service "com.cisco.ise.session" via Cisco pxGrid 2.0 APIs.

Drag and drop the code to construct a Python call to the "query" function to identify the user groups that are associated with the user "fred". Not all options are used.

Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

A.

/tenants/{tenantId}/policy/system/host-policy

B.

/tenants/{tenantId}/policy/system/role-policy

C.

/tenants/{tenantId}/policy/system

D.

/tenants/{tenantId}/policy/system/{policyId}

In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which

has a GUID of 6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03?

A.

https://api.amp.cisco.com/v1/endpoints?group[]=6c3c2005-4c74-4ba7-8dbb- c4d5b6bafe03

B.

https://api.amp.cisco.com/v1/computers?group_guid[]=6c3c2005-4c74-4ba7-8dbb- c4d5b6bafe03

C.

https://api.amp.cisco.com/v1/computers?group_guid-6c3c2005-4c74-4ba7-8dbb- c4d5b6bafe03

D.

https://api.amp.cisco.com/v1/endpoints?group-6c3c2005-4c74-4ba7-8dbb- c4d5b6bafe03

Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?

A.

curl -X PUT"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/

{tenant_id}/tags

B.

curl -X POST -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/ tenants/tags

C.

curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/

{tenant_id}/tags

D.

curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/ tags

Refer to the exhibit.

What is the purpose of the API represented by this URL?

A.

Getting or setting intrusion policies in FMC

B.

Creating an intrusion policy in FDM

C.

Updating access policies

D.

Getting the list of intrusion policies configured in FDM

Drag and drop the code to complete the script to search Cisco ThreatGRID and return all public submission records associated with cisco.com. Not all options are used.

What are two advantages of Python virtual environments? (Choose two.)

A.

Virtual environments can move compiled modules between different platforms.

B.

Virtual environments permit non-administrative users to install packages.

C.

The application code is run in an environment that is destroyed upon exit.

D.

Virtual environments allow for stateful high availability.

E.

Virtual environments prevent packaging conflicts between multiple Python projects.

Which two APIs are available from Cisco ThreatGRID? (Choose two.)

A.

Access

B.

User Scope

C.

Data

D.

Domains

E.

Curated Feeds

Refer to the exhibit. A network operator wrote a Python script to retrieve events from Cisco AMP.

Against which API gateway must the operator make the request?

A.

BASE_URL = “https://api.amp.cisco.com”

B.

BASE_URL = “https://amp.cisco.com/api”

C.

BASE_URL = “https://amp.cisco.com/api/”

D.

BASE_URL = “https://api.amp.cisco.com/”