Tuesday, 19 July 2016

600-511 NPDESACI Designing with Cisco Network Programmability for ACI

Exam Number 600-511 NPDESACI
Last day to test: November 20, 2016
Associated Certifications Cisco Network Programmability Design Specialist
Duration 90 Minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE

This exam tests a candidate's ability to use network applications expertise to translate customer requirements into a policy-based, application centric network infrastructure.

The Designing with Cisco ACI Network Programmability (600-511) exam is a 90- minute (1.5 hours) exam with 55-65 questions. This exam tests a candidate's ability to use network applications expertise to translate customer requirements into a policy-based, application-centric network infrastructure.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Understanding Business Requirements 24%

1.1 Gathering business requirements

1.1.a Understand business requirements
1.1.b Understand current infrastructure
1.1.c Understand who the vested parties are and how they define policy and application
1.1.d Document existing application interaction

1.2 Risk and Impact Analysis

1.2.a Take the requirements and perform a risk assessment and impact analysis to narrow down the possible design choices

1.3 Ongoing communications to finalize the business requirements

1.3.a Identify the design choice that meets the business, risk, and customer requirements

2.0 Translating Business Requirements Into Technical Requirements 19%

2.1 Mapping of business requirements

2.1.a Map existing applications to Cisco ACI constructs
2.1.b Map existing network services to Cisco ACI Fabric
2.1.c Create application network profiles that map to the business requirements
2.1.d Identify which applications can expect to see improvements in the areas of performance, security/compliance, visibility, and speed of service delivery
2.1.e Determine methods of representing the improvements expected – quantitative metrics and qualitative metrics

2.2 Perform software modeling and analysis

2.2.a Identify tools that can be used to build application network profiles
2.2.b Identify best practices for building application network profiles for legacy applications
2.2.c Identify best practices for building application network profiles for greenfield applications

2.3 Perform network modeling and analysis (capacity and performance)

2.3.a Analyze the current infrastructure inventory and capacity to meet the requirements
2.3.b Assess the delta between the requirements and the current infrastructure to implement the application

2.4 Translating service level agreements (SLAs) and operational level agreements (OLAs) into technical requirements

2.4.a Plan or design to account for business interruption of various lengths or scopes

3.0 Positioning Application Centric Infrastructure Value Proposition 29%

3.1 Policy based infrastructure management

3.1.a Identify opportunities to automate tasks that are manual today
3.1.b Identify architectural bottlenecks in the current infrastructure that are roadblocks in introducing programmability and automation
3.1.c Is there uniformity in policy across the entire infrastructure or are there policy silos and policy gaps?
3.1.d Describe programming model and APIs available to automate network functions required to deploy applications

3.2 Enhance visibility and control

3.2.a Identify lack of comprehensive visibility and control over resource allocation for applications today and highlight how Cisco ACI can address this limitation
3.2.b Identify number of points of management to see if Cisco ACI can reduce the number to dramatically bring in value addition
3.2.c Identify application performance features that increase scalability or provide optimal traffic steering
3.2.d Describe available tools to provide comprehensive application-level visibility

3.3 Security and compliance

3.3.a Identify any compliance and auditing requirements and highlight key security features of Cisco Application Centric Infrastructure (policy-based forwarding, auditing, forensics across physical and virtual devices)

4.0 Define High-Level System Architecture 28%

4.1 Software architecture and design

4.1.a Take a set of software requirements or details about a solution and generate (identify, pick, choose) a design document (class hierarchy, object model, Entity Relationship (ER) diagram)

4.2 Infrastructure architecture and design (physical and virtual)

4.2.a Take a set of infrastructure requirements or details about a solution and generate (identify, pick, choose) a design document (configuration or design change)

4.3 Identify different integration/interoperability points between different systems

4.3.a Understand the differences (compare and contrast) between different integration interfaces (knows what to use when and why)

4.4 Migrate existing network to Cisco ACI


QUESTION 1
Which two benefits are achieved through database sharding within the Cisco APIC cluster?
(Choose two.)

A. active-standby high availability
B. scalability
C. compression
D. reliability
E. load balancing

Answer: B,D

Explanation:


QUESTION 2
Which overlay protocol does Cisco AVS for vSphere use to allow the ACI fabric to extend over an
existing network infrastructure?

A. GRE
B. IPsec
C. NVGRE
D. VXLAN
E. OTV

Answer: D

Explanation:


QUESTION 3
Which three main problems was a host overlay system designed to address? (Choose three.)

A. workload mobility
B. simplified and automated workload provisioning
C. multitenancy at scale
D. integrate physical and virtual networking
E. increase visibility to traffic flows
F. better root cause analysis capabilities
G. consolidate IT infrastructure teams

Answer: A,B,C

Explanation:


QUESTION 4
Which two benefits of ACI help improve the time required to deploy an application? (Choose two.)

A. enabling software developers to create development environments similar to production
B. eliminating the need for expensive Layer 4 to Layer 7 service appliances
C. eliminating IP addressing from software stacks
D. evolving the IT model from manual workflows to an application model that automates
deployment, operations, and visibility

Answer: A,D

Explanation:

Monday, 11 July 2016

600-509 Integrating Business Applications with Network Programmability

Exam Number 600-509 NPIBA
Associated Certifications Cisco Business Application Engineer Specialist
Duration 75 Minutes (55 - 65 questions)
Available Languages English
Register Pearson VUE

This exam tests a candidate's ability to use the programmability of an open infrastructure to develop and deploy business applications. It also tests how well the candidate can build an application with API capabilities to collect information from the network when needed.

The Integrating Business Applications with Network Programmability (NPIBA) exam (600-509) is a 75-minute assessment with 55-65 questions. This exam tests a candidate's ability to use the programmability of an open infrastructure to develop and deploy business applications. It also tests how well the candidate can build an application with API capabilities to collect information from the network when needed.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific version of the exam. In order to better reflect the contents of the exam, the guidelines below may change at any time without notice.

1.0 Fundamentals of Networking 35%

1.1 Describe the operation of IP data networks

1.1.a Describe the purpose and functions of network devices
1.1.b Identify common applications and their impact on the network

1.2 Identify basic LAN switching technologies

1.2.a VLANs
1.2.b Network segmentation and basic traffic management

1.3 Describe IP addressing (IPv4 / IPv6)

1.3.a Basic principles of IP address
1.3.b Subnets and prefixes

1.4 Describe IP routing

1.4.a Understands the basic routing concepts
1.4.a [i] Differentiate between routing and routing protocols
1.4.a [ii] Static vs. Dynamic routing
1.4.a [iii] IP routing table
1.4.b Understands the difference between routing and switching

1.5 Describe network data security

1.5.a TLS basics
1.5.b Certificates
1.5.c User/host authentication

1.6 Troubleshoot host IP configuration

1.7 Describe network virtualization

1.8 Describe network assurance technologies

1.8.a Quality of service
1.8.b Load balancing
1.8.c Network proximity
1.8.d Network availability

1.9 Describe application-aware networks

2.0 Business Goals 20%

2.1 Define the business outcome for the application

2.2 Document requirements in terms of deployment, lifecycle management, level of service

2.3 Describe application consumption models

2.3.a Understanding and describing clients for the application from the business perspective
2.3.b Understanding the multiple service level requirements
2.3.c Multitenant environment and implications on application deployment (gold or silver)
2.3.d Security considerations in different consumption models (firewall or certificates)

2.4 Describe the business benefits of making applications network

2.4.a Describe the actions that can be taken based on the information from the network

2.5 Identify challenges with making an application network aware

3.0 Network Programmability Concepts 22%

3.1 Describe the function of a controller

3.2 Compare and contrast controllers

3.2.a APIC
3.2.b APIC-EM
3.2.c Open SDN controller

4.0 API Services 27%

4.1 Identify how APIs can be used to achieve business goals

4.2 Leverage APIs in a business application

Friday, 8 July 2016

600-504 NPENG Implementing Cisco Network Programmability

Exam Number 600-504 NPENG
Associated Job Role Network Programmability Engineer Specialist
Network Programmability; Support Specialist Certification
Duration 90 minutes (55 – 65 questions)
Available Languages English
This exam tests the ability of network engineers to deploy network applications in the programmable environment and make sure that they work. The exam also tests the ability to implement an open network infrastructure designed by network designers and architects. Successful candidates will demonstrate that they can deploy, install, and troubleshoot network infrastructures and applications.
The Implementing Cisco Network Programmability (600-504) (NPENG) exam is a 90-minute (1.5 hour) exam with 55‒65 questions. This exam tests the ability of network engineers to deploy network applications into the programmable environment and ensure that they work successfully. The exam also tests the ability to implement an open network infrastructure designed by the network designers and architects. Successful candidates will demonstrate that they can deploy, install, and troubleshoot network infrastructures and applications. Candidates can prepare for this exam by taking the Implementing Cisco Network Programmability course.
The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.
1.0 Requirements Collection and Analysis 16%

1.1 Understand the architecture of the application being deployed
1.2 Understand the external interfaces for the application (N&S bound API, GUI interface, CLI)
1.3 Understand relevant standards bodies for network programmability
1.4 Understands open source concepts and engagement models
1.5 Understand the environment in which the application is being deployed
2.0 Deployment Design Development 19%

2.1 Understand the pros and cons of different deployment models and configurations
2.2 Document in detail how the application is deployed and configured
2.3 Understand the best practices to deploy the end product
2.4 Understand the lab validation and testing
3.0 Configuration and Implementation 29%

3.1 Fluent in the installation and configuration of the application being deployed
3.2 Fluent in the configuration of the network and other dependent services the application is using
3.3 Understanding the base lining process
3.4 Staging and verification
4.0 Troubleshooting 20%

4.1 Troubleshoot the functionality and performance of the application
4.2 Interface with developers on improving application serviceability and quality
4.3 Network troubleshooting
4.4 Network virtualization
4.5 Automation/orchestration
4.6 Application and operating system
4.7 Storage
4.8 Be able to determine the real-time impact of the deployed application on the IT infrastructure
4.0 Operation and Optimization 16%

5.1 Tuning
5.2 Ability to optimize and tune the application specific to the environment
5.3 Monitoring and instrumentation
5.4 Change management

QUESTION 1
Which two statements about RFC6020 are true? (Choose two.)
A. YANG is a data modeling language.
B. YANG is a protocol to configure network devices.
C. YANG is used by OF-CONFIG.
D. YANG is used by BGP-LS.
E. YANG is an object-oriented programming language.
Answer: A,C
Explanation:

QUESTION 2
Applications compiled by Java are better adaptive to different operating systems like Windows and
Linux than applications compiled by C compiler.
Which option describes why Java applications are more independent from the OS than C applications?
A. Java has a DLL to abstract the difference of OS.
B. Java compiler is smarter than C compiler.
C. Java compiler creates byte code that is run on Java VM, and Java VM is prepared for each OS.
D. This is an urban legend. No difference between Java and C.
Answer: A
Explanation:


Tuesday, 28 June 2016

600-212 SPLTE Implementing Cisco Service Provider Mobility LTE Networks (SPLTE)

Exam Number 600-212 SPLTE
Associated Certifications Cisco Service Provider Mobility CDMA to LTE Specialist
Cisco Service Provider Mobility UMTS to LTE Specialist
Duration 90 Minutes (55-65 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

This exam tests a candidate's knowledge of the skills required to understand and implement technologies, components, architecture fundamentals and products that are found in common LTE networks. The exam includes information on the evolved packet core components and their role in the LTE Evolved Packet System (EPS) to include the Evolved Packet Core network as well as the Radio Access Network (RAN). The exam also includes information on standardized technologies that are implemented on the Mobile Management Entity (MME) Serving Gateway (SGW) and the Packet Data Network Gateway (PGW), and their interaction with authentication, charging, and billing components in the network of the mobile operator, as well as, configuration details of how these components are implemented on the Cisco ASR 5000 Series system.

The 600-212 SPLTE Implementing Cisco LTE Packet Core Networks exam tests a candidate's knowledge of the skills required to understand and implement technologies, components, architecture fundamentals, and products that are found in common Long-Term Evolution (LTE) networks.

Recommended Training

Implementing Cisco Service Provider Mobility LTE Networks – (SPLTE)

Courses listed are offered by Cisco Learning Partners—the authorized source for Cisco IT training delivered exclusively by Certified Cisco Instructors. For a list of Cisco Learning Partners, use the Learning Partner Locator.

The Implementing Cisco LTE Packet Core Networks (600-212 SPLTE) exam is a 90-minute, 65–75 question assessment within Cisco's Service Provider Specialist certification. This exam tests a candidate's knowledge of the skills required to understand and implement technologies, components, architecture fundamentals and products that are found in common LTE networks. The exam includes information on the evolved packet core components and their role in the LTE Evolved Packet System (EPS) to include the Evolved Packet Core network as well as the Radio Access Network (RAN). The exam also includes information on standardized technologies that are implemented on the Mobile Management Entity (MME) Serving Gateway (SGW) and the Packet Data Network Gateway (PGW), and their interaction with authentication, charging, and billing components in the network of the mobile operator, as well as, configuration details of how these components are implemented on the Cisco ASR 5000 Series system. This exam is a requirement in order to attain either the Cisco Service Provider Mobility UMTS to LTE Specialist certification or the Cisco Service Provider Mobility CDMA to LTE Specialist certification. Candidates can prepare for this exam by taking the Implementing Cisco Service Provider Mobility LTE Networks (SPLTE) v1.0 training course.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 LTE 5%

1.1 Describe and differentiate LTE / SAE architecture

1.2 Explain attach procedure and call flow

2.0 MME (4G LTE) 16%

2.1 Network functions LTE –MME

2.1.a Identify key functions of the MME and basic understanding of architecture and interfaces
2.1.b Describe MME states of MM and CM management
2.1.c Describe protocol stacks and procedures
2.1.d Describe mobility management signaling and call flows
2.1.e Describe session management signaling and call flows
2.1.f Describe location management signaling and call flows
2.1.g Describe SGS procedures and signaling call flows
2.1.h Describe intra-MME handovers procedure
2.1.i Describe intra-RAT handovers procedure
2.1.j Describe inter-MME handover procedures

2.2 QOS architecture

2.2.a Describe the overall QOS functionality in LTE for single and multi pdn
2.2.b Describe the QOS mapping from UMTS to LTE

2.3 Configurations

2.3.a Configure S1 interface with corresponding services and system parameters
2.3.b Configure S6a interface with corresponding services and system parameters
2.3.c Configure S11 interface with corresponding services and system parameters
2.3.d Configure S13 interface with corresponding services and system parameters
2.3.e Identify and implement gateway selection mechanisms
2.3.f Identify and implement MME operator policy and feature sets
2.3.g Troubleshoot configurations

2.4 Network sharing


2.4.a Describe MOCN architecture
2.4.b Describe GWCN architecture

2.5 Security

2.5.a Describe LTE security principles for MME network node
2.5.b Explain security functions for mobility management procedures

2.6 Idle mode signaling reduction

2.6.a Identify IDLE mode signaling reduction in an LTE network
2.6.b Describe IDLE mode signaling establishment
2.6.c Describe IDLE mode signaling reduction deactivation

2.7 CSFB

2.7.a Describe CSFB architecture in LTE network
2.7.b Describe CSFB call flow and signaling

2.8 IPv6 support

2.8.a Configure IPV6 and dual stack EPS bearer scenarios
2.8.b Configure and implement transport plane IPV6 support for MME

3.0 SGW (4G LTE) 10%

3.1 Network functions LTE-SGW

3.1.a Identify key functions of the SGW and basic understanding of architecture and interfaces
3.1.b Describe SGW attach procedures and call flows
3.1.c Configure S1-U interface with corresponding services and system parameters
3.1.d Configure S5/S8 using PMIP/GTP interface with corresponding services and system parameters
3.1.e Configure S11 interface with corresponding services and system parameters

3.2 Feature functionality and extended application

3.2.a Describe multi-PDN support for SGW
3.2.b Describe downlink delay notification for SGW
3.2.c Describe idle mode signaling reduction support for SGW
3.2.d Configure and implement IPV6 support for SGW

3.3 Internetworking between LTE and other technologies

3.3.a Describe interaction with CDMA/eHRPD internetworking
3.3.b Describe interaction with GSM/UMTS internetworking
3.3.c Configure S4 interface with corresponding services and system parameters
3.3.d Configure S12 interface with corresponding services and system parameters
3.3.e Configure S103 interface with corresponding services and system parameters

3.4 Charging

3.4.a Configure Gx interface with corresponding services and system parameters

3.5 QoS

3.5.a Describe QoS bearer management and marking for SGW
3.5.b Configuring DSCP marking for SGW

4.0 PGW (4G LTE/EHRPD) 15%

4.1 Architecture overview

4.1.a Identify key functions of the PGW and basic understanding of architecture and interfaces

4.2 Implement S5/S8 and Gn/Gp interface

4.2.a Describe GTP protocol
4.2.b Describe mobility management/session management call flows
4.2.c Describe QoS in EPC
4.2.d Configure S5/S8 interface with corresponding services and system parameters
4.2.e Troubleshoot S5/S8 and Gn/Gp

4.3 APN

4.3.a Describe the various IP address allocation mechanisms
4.3.b Describe the concept of virtual APNs
4.3.c Configure APNs and virtual APNs with corresponding service and system parameters
4.3.d Configure IP source address validation and access control list
4.3.e Troubleshoot APN

4.4 Implement Gx interface

4.4.a Describe the important diameter AVPs needed for Gx
4.4.b Describe basic Gx call flows
4.4.c Configure Gx interface with corresponding services and system parameters
4.4.d Troubleshoot Gx interface
4.4.e Describe the common policy use cases
4.4.f Configure failure handling modes
4.4.g Configure usage monitoring over Gx

4.5 Implement Gy interface

4.5.a Describe the important diameter AVPs needed for Gy
4.5.b Describe the basic Gy call flows
4.5.c Configure Gy interface with corresponding services and system parameters
4.5.d Troubleshoot Gy interface
4.5.e Configure failure handling modes
4.5.f Describe OCS selection based on static configuration
4.5.g Describe RADIUS attributes and PCRF out-of-quota redirection handling

4.6 Implement AAA Interface

4.6.a Describe the basic AAA authentication and accounting call flows
4.6.b Describe the important RADIUS attributes for authentication and accounting
4.6.c Configure RADIUS interface with corresponding services and system parameters
4.6.d Troubleshoot RADIUS interface

4.7 Implement S6b interface

4.7.a Describe the important diameter AVPs needed for S6b
4.7.b Describe the basic S6b call flows
4.7.c Configure S6b interface with corresponding services and system parameters
4.7.d Troubleshoot S6b interface

4.8 Interworking with non-3GPP access networks

4.8.a Configure S2a interface with corresponding services and system parameters
4.8.b Configure S2b interface with corresponding services and system parameters
4.8.c Configure S2c interface with corresponding services and system parameters
4.8.d Configure LMA functionality on a PGW
4.8.e Configure non-3GPP IRAT handovers
4.8.f Troubleshoot S2b and S2c interfaces

4.9 SGi Interface

4.9.a Configure and implement various IP transport types
4.9.b Configure and implement static and dynamic routing protocols

5.0 Voice Over LTE 20%

5.1 VoLTE application messages/protocols

5.1.a Describe VoLTE specific diameter interface
5.1.b Describe XCAP, LDAP, SPML
5.1.c Describe CAMEL, CAP, INAP, SOAP, MSML

5.2 Voice over LTE architecture

5.2.a Describe voice evolution in mobile network
5.2.b Identify VoLTE system architecture and functions of network elements

5.3 Network elements in voice over LTE

5.3.a Describe CSCF
5.3.b Describe ENUM
5.3.c Describe MNP — mobile number portability/database
5.3.d Describe telephony application server
5.3.e Describe DRA/DEA
5.3.f Describe HSS
5.3.g Describe PCRF
5.3.h Describe ATCF,ATGW
5.3.i Describe MRF
5.3.j Describe understand OSS and BSS

5.4 QoS

5.4.a Describe QoS in EPS
5.4.b Describe end-to-end QoS in VoLTE

5.5 Interfaces and signaling messages

5.5.a Configure Gx interface and signaling
5.5.b Design Rx interface and signaling
5.5.c Implement Cx interface and signaling
5.5.d Describe ISC interface and signaling
5.5.e Describe Ut interface

5.6 End-to-end call flow

5.6.a Describe IMS client attach to EPC
5.6.b Describe P-CSCF discovery
5.6.c Describe IMS registration, re-registration and de-registration
5.6.d Describe mobile-originated VoLTE call
5.6.e Describe mobile-terminated VoLTE call
5.6.f Describe emergency VoLTE call

5.7 Supplementary services

5.7.a Describe IR.92 supplementary service overview
5.7.b Describe IR.94 supplementary service overview
5.7.c Describe Important services call flows

5.8 VoLTE Interworking

5.8.a Describe PSTN interworking
5.8.b Describe IMS/SIP interworking
5.8.c Describe e-SRVCC

6.0 Other Interfaces 5%

6.1 AAA/diameter related interfaces

6.1.a Describe SWx interface
6.1.b Describe S9 interface
6.1.c Describe Sp interface

6.2 HRPD related interfaces

6.2.a Describe S101
6.2.b Describe S103

7.0 Charging 13%

7.1 Offline charging service

7.1.a Describe offline charging architecture
7.1.b Explain the GTPP protocol header and messages
7.1.c Explain charging data record transport through GTP'
7.1.d Compare and contrast GTPP transfer scenarios
7.1.e Describe and differentiate mobility records generated by MPC nodes
7.1.f Identify and list conditions for record closure and generation
7.1.g Explain Rf offline charging scenarios
7.1.h Identify and list offline charging error cases
7.1.i Configure for offline billing
7.1.j Troubleshoot for offline billing

8.0 Lawful Intercept 5%

8.1 Describe lawful intercept architecture and events

8.2 Configure lawful interception

8.3 Describe lawful intercept trigger element

9.0 Management Protocols 11%

9.1 TACACS

9.1.a Describe admin authentication and command authorization methods
9.1.b Configure Local administration levels
9.1.c Configure external authentication TACACS servers

9.2 Performance counters/statistics

9.2.a Describe the various performance counters
9.2.b Describe the collection and processing of performance counters
9.2.c Describe the common KPIs for various MPC nodes
9.2.d Configure counters and KPIs

9.3 Fault management

9.3.a Describe SNMP protocols, alarms, notification and MIBs
9.3.b Configure SNMP traps, filters and thresholds

9.4 syslog/events Log

9.4.a Describe system log formats and filters
9.4.b Configure syslog servers and event logs

9.5 Security

9.5.a Describe user access control

9.6 NTP

9.6.a Describe system timing
9.6.b Configure NTP servers, system clock, time zone and timestamps

QUESTION 1
Which three options are valid functions performed by Mobility Management Entity? (Choose
three.)

A. Header compression and user plane ciphering
B. PDN GW and Serving GW selection
C. Tracking area list management
D. User plane packet forwarding and routing
E. UE IP address allocation
F. NAS signaling

Answer: B,C,F

Explanation:


QUESTION 2
Which two radio technologies are used in LTE? (Choose two.)

A. OFDMA
B. MIMO
C. TDMA
D. EV-DO
E. VOR
F. DME

Answer: A,B

Explanation:


QUESTION 3
Which parameter provides support of radio resource management by the MME across the S1
interface?

A. RFSP index
B. relative MME capacity
C. GUTI
D. OLD-GUTI

Answer: A

Explanation:


QUESTION 4
Which two Transport protocols can be used for the S6a interface? (Choose two.)

A. SCTP
B. TCP
C. UDP
D. FCP
E. RDP

Answer: A,B

Explanation:


QUESTION 5
Which two statements apply during the attach procedure on an MME? (Choose two.)

A. The attach procedure provides an always-on IP connectivity to the subscriber.
B. Multiple default bearers can be established during the attach procedure.
C. A dedicated bearer can also be established during the attach procedure.
D. The additional guti value in the attach request is derived from a PTMSI.
E. The attach request is always integrity protected.

Answer: A,C

Explanation:

Friday, 17 June 2016

600-199 SCYBER Securing Cisco Networks with Threat Detection and Analysis

Exam Number 600-199 SCYBER
Associated Certifications Cisco Cybersecurity Specialist
Duration 60 minutes (50 - 60 questions)
Available Languages English
Register Pearson VUE
Exam Policies Read current policies and requirements
Exam Tutorial Review type of exam questions

This exam is aimed at testing the knowledge and skills required to proactively detect and mitigate network security threats by leveraging features that exist in Cisco and other industry network security products today. Designed for professional security analysts, the exam covers essential areas of competency, including event monitoring, security event/alarm/traffic analysis, and incident response.

The following course is the recommended training for this exam.

Securing Cisco Networks with Threat Detection and Analysis
Courses listed are offered by Cisco Learning Partners-the only authorized source for Cisco IT training delivered exclusively by Certified Cisco Instructors. Check the List of Learning Partners for a Cisco Learning Partner nearest you.

Exam Description
The Securing Cisco Networks with Threat Detection and Analysis (SCYBER) exam is the exam associated with the Cisco Cybersecurity Specialist certification. This exam is aimed at testing the knowledge and skills required to proactively detect and mitigate network security threats by leveraging features that exist in Cisco and other industry network security products today. Designed for professional security analysts, the exam covers essential areas of competency including event monitoring, security event/alarm/traffic analysis, and incident response.

Recommended Training
The following course is the recommended training for this exam:

Securing Cisco Networks with Threat Detection and Analysis – (SCYBER)

1.0 Information Gathering and Security Foundations 13%
1.1 Describe basic network topologies, application architecture, and host configuration standards
1.2 Identify the services a network and security operations center offers to an organization
1.3 Describe traditional hacking techniques
1.4 Describe basic operational procedures and incident response processes of a security operations center
1.5 Describe basic network security events
1.6 Describe mission-critical network traffic and functions, applications, services, and device behaviors
1.7 Describe corporate security policies
1.8 Describe the role of a network security analyst
1.9 Describe the primary sources of data on vendor vulnerabilities, current threats, exploits, and active attacks
1.10 Describe how vulnerability, attack, and threat data impact operations
1.11 Describe the baseline of a network profile
1.12 Describe correlation baselines (use NetFlow output to validate normal traffic vs. non-normal)
1.13 Describe security around local business process and infrastructure and applications
1.14 Describe risk analysis mitigation

2.0 Event Monitoring 16%
2.1 Describe the various sources of data and how they relate to network security issues
2.2 Monitor the collection of network data as it relates to network security issues
2.3 Monitor and validate health state and availability of devices
2. Monitor DNS query log output (monitor telemetry data to validate devices)
2.5 Identify a security incident (single or recurrent)
2.6 Describe the best practices for evidence collection and forensic analysis
2.7 Describe the different types and severity of alarms and events

3.0 Security Events and Alarms 16%
3.1 Identify and dismiss false positive indicators correctly
3.2 Describe event correlation within the context of the various alarms and corporate infrastructure architecture
3.3 Assess traffic and events in relation to stated policies
3.4 Identify actionable events
3.5 Identify basic incident types
3.6 Describe event metrics and diagnostic procedures

4.0 Traffic Analysis, Collection, and Correlation 24%
4.1 Describe IP packet structures
4.2 Describe TCP and UDP header information
4.3 Analyze network traces or TCP dumps and trace back to actual activities
4.4 Describe packet analysis in IOS
4.5 Describe access packets in IOS
4.6 Acquire network traces
4.7 Configure packet capture

5.0 Incident Response 16%
5.1 Describe standard corporate incident response procedure and escalation policies
5.2 Identify necessary changes to enhance the existing procedure, policy, and decision tree
5.3 Describe the basic emergency mitigation of high-level threats, exploits, and vulnerabilities
5.4 Evaluate and recommend responses to vulnerabilities to ensure adequate monitoring response and mitigation
5.5 Assist level 2 incident response team to mitigate issues
5.6 Describe best practices for post-event investigation
5.7 Describe common legal and compliance issues in security event handling

6.0 Operational Communications 15%
6.1 Describe the communication vehicles related to post-threat remediation
6.2 Generate incident reports and interpret the information to determine the direction of the escalation
6.3 Describe the different types of available metrics and channel to appropriate personnel
6.4 Process incident handling communications and provide context awareness for stakeholders
6.5 Articulate details of problems to remediating teams (constituent-based groups)
6.6 Maintain awareness regarding vulnerabilities and the recommended critical security patches as a result from incident handling
6.7 Communicate recurring issues based on incident handling and provide recommendations for architectural changes or modifications and articulate
6.8 Describe the post-mortem process

QUESTION 1
Which network management protocol relies on multiple connections between a managed device
and the management station where such connections can be independently initiated by either
side?

A. SSH
B. SNMP
C. Telnet
D. NetFlow

Answer: B

Explanation:


QUESTION 2
When an IDS generates an alert for a correctly detected network attack, what is this event called?

A. false positive
B. true negative
C. true positive
D. false negative

Answer: C

Explanation:


QUESTION 3
When is it recommended to establish a traffic profile baseline for your network?

A. outside of normal production hours
B. during a DDoS attack
C. during normal production hours
D. during monthly file server backup

Answer: C

Explanation:


QUESTION 4
Which two activities would you typically be expected to perform as a Network Security Analyst?
(Choose two.)

A. Verify user login credentials.
B. Troubleshoot firewall performance.
C. Monitor database applications.
D. Create security policies on routers.

Answer: B,D

Explanation:


QUESTION 5
Which protocol is typically considered critical for LAN operation?

A. BGP
B. ARP
C. SMTP
D. GRE

Answer: B

Explanation:

Thursday, 9 June 2016

Exam 70-475 Designing and Implementing Big Data Analytics Solutions

Published: October 27, 2015
Languages: English
Audiences: IT Professionals
Technology: Microsoft Azure
Credit toward certification: Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Design big data batch processing and interactive solutions (20-25%)
Ingest data for batch and interactive processing, design and provision compute clusters, design for data security, design for batch processing, design interactive queries for big data

Design big data real-time processing solutions (25-30%)
Ingest data for real-time processing, design and provision compute resources, design for lambda architecture, design for real-time processing

Design machine-learning solutions (25-30%)
Create and manage experiments, determine when to pre-process or train inside Machine Learning Studio, select input/output types, apply custom processing steps with R and Python, publish web services

Operationalize end-to-end cloud analytics solutions (25-30%)
Create a data factory, orchestrate data processing activities in a data-driven workflow, monitor and manage the data factory, move, transform, and analyze data

Friday, 3 June 2016

7 reasons to gamify your cybersecurity strategy

Gamification relies on the competitive nature of people to help harden the company’s security.

Game on
Data breaches continue to grow in number, size, severity and cost. With the increase in new security holes, vulnerabilities and attack vectors that need to be fixed, many businesses are turning to gamification to help employees adhere to cybersecurity best practices.

Gamification is the process of engaging people and changing behavior using game mechanics in a non-game context. Essentially, it’s taking what’s fun about games and applying it to situations that maybe aren’t so fun.

By using gamification, organizations are finding new ways to educate employees on the importance of cybersecurity, through gaming elements like one-on-one competitions, rewards programs and more. Mark Stevens, senior vice president of Global Services at Digital Guardian, provided seven reasons to use gamification to address data security.

Reward good cybersecurity behavior
Reward employees when they abide by the rules, which will encourage continued good behavior. With gamification for instance, users could receive printable badges upon sending their first, 10th and 100th email without triggering a policy – leading to continued positive behavior.

Incentivize continued good behavior
Once an employee has an impressive digital badge collection, incentivize them to continue the good behavior, such as with e-store gift cards or company perks. On the contrary, if an employee continues to exhibit poor behavior in gamification, it may raise a red flag within the organization or warrant a need for further cybersecurity training.

Encourage an open data protection dialogue
Through gamification, an organization can establish a new data protection language, which encourages open dialogue among employees when discussing how to properly handle sensitive data. Instead of the topic being boring or rogue, workers are encouraged to talk about their achievements, challenges or lessons learned through the gaming system.

Address the lack of awareness
The most effective cybersecurity training is one that occurs on a regular basis throughout the year. However, a majority of businesses often don’t adhere to this training cycle, due to lack of time and resources. Gamification allows employees to acknowledge the lack of awareness and individual employee accountability sensitive data protection/hygiene, and ultimately change long-term behavior.

Increase employee engagement
Staff should be encouraged to print and display their badges in their workspaces and engage managers to recognize the good behavior by publishing a monthly leaderboard. Through leaderboard competitions and badge collections, end users are instantly engaged in the game – or training – at hand. This increases internal communication and creates new relationships, improving employee engagement across the board.

Find cybersecurity talent
Not enough people are entering the cybersecurity workforce, and most firms are faced with vacancies. Organizations like UK-based Cyber Security Challenge have been trying to tackle the talent gap by hosting yearly competitions where players face simulated threat situations they must prevent using their cyber skills. Winners are then offered lucrative job opportunities at large tech firms and government agencies who sponsor the challenge.

Audit to measure effectiveness
Of course, gamification is only effective if employees apply their lessons learned to real-world scenarios. For this reason, it’s critical that businesses measure the effectiveness of gamification at reducing real data risk. Conduct regular audits and cybersecurity assessments within the organization, to determine which employees would still pose as a risk outside of the gaming environment.