Free 500-445 Exam Braindumps (page: 3)

Page 2 of 15

Which LDAP URL allows configuration in the properties pane under SSO configuration?

  1. Ldap://idap_server:3269
  2. Ldap://idap_server:80
  3. Ldap://idap_server:443
  4. Ldap://idap_server:3268

Answer(s): D

Explanation:

It is the URL used to connect to the LDAP server for authentication during the Single Sign-On (SSO) process. It is a standard URL format that specifies the protocol (ldap), the server name (idap_server) and the port number (3268) used to connect to the LDAP server.



Which CLI command verifies the authenticity and integrity of a downloaded ISO?

  1. Openssl dgst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature> <ISO Image>
  2. Openssl dst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature> <ISO Image>
  3. Openssl dst -sha512 -keyform der -verify <public key.der> -signature <ISO image.iso.signature> <|SO Image>
  4. Openssl dgst -sha256 -keyform der -verify <public key.der> -signature <ISO image.iso.signature> <ISO Image>

Answer(s): D

Explanation:

This command uses the OpenSSL tool to verify the authenticity and integrity of an ISO file by checking the signature against a public key. The -sha256 option specifies to use the SHA-256 algorithm, -keyform der specifies the key format is DER, -verify option is used to specify the public key file that is used to verify the signature and the -signature option is used to specify the signature file. It uses the SHA-256 algorithm to generate a digest of the ISO image, and then compares it to the digest that is stored in the signature file. If the digests match, it means the ISO file is authentic and has not been tampered with.
It's important to note that, the actual command may vary depending on the specific operating system and version of OpenSSL being used. Also, it's recommended to consult the Cisco documentation and your Cisco support team for further assistance.



Which process scans content and applies regular expressions to mask the sensitive information?

  1. Data leak prevention
  2. Data masking
  3. Data filtering
  4. Data scanning

Answer(s): B

Explanation:

Data masking is the process of replacing sensitive data with realistic but not real data to protect it from unauthorized access or exposure. It is typically used to protect sensitive data such as personal identification numbers, credit card numbers, and other confidential information. The process scans content and applies regular expressions to mask the sensitive information by replacing the sensitive data with a set of predetermined characters or values, such as asterisks or random characters. This makes it difficult for unauthorized users to access the sensitive data, while still allowing the data to be used for testing, development, and other purposes.



Which two types of data does a file server store? (Choose two.)

  1. application files
  2. application log files
  3. error log files
  4. system files
  5. report templates

Answer(s): A,D


Reference:

[1] https://docs.microsoft.com/en-us/windows-server/storage/file-servers/file- servers [2] https://www.lifewire.com/what-is-a-file-server- 817385 [3] https://www.webopedia.com/TERM/F/file_server.html [4] https://www.server- essentials.com/faq/what-is-file-server
A file server is a computer or device that stores and manages files, allowing multiple users and devices to access the files over a network.
1. Application files: file servers typically store application files, which are files that are used by software programs. These files can include executable files, DLLs, configuration files, and other types of files that are needed to run the software.
2. System files: file servers also store system files, which are files that are used by the operating system. These files include system libraries, drivers, and other types of files that are required for the operating system to function properly.


Microsoft: What is a File Server?
Oracle: File Server
Cisco: File Server
File servers can also store other types of files such as user documents, media files, and other types of files, but the above mentioned files are some of the examples that are commonly stored in file servers.






Post your Comments and Discuss Cisco® 500-445 exam with other Community members:

500-445 Discussions & Posts