Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 500-430 Topic 8 Question 8 Discussion

Actual exam question for Cisco's 500-430 exam
Question #: 8
Topic #: 8
[All 500-430 Questions]

Which two AppDynamics user permissions should an administrator configure in order to protect private data such as credit card numbers? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A

According to the Cisco AppDynamics Professional Implementer (CAPI) documents, the method to import an existing keypair to manage the Controller SSL certificate without using the Enterprise Console UI is to add the keypair to the keystore.jks using a third-party tool (A). The keystore.jks file is the default keystore for the Controller that contains the private keys and certificates for the secure communication on port 8181. If the administrator already has a custom keypair that is signed by a third-party Certificate Authority (CA) or an internal CA, they can use a third-party tool, such as KeyStore Explorer or OpenSSL, to import the keypair into the keystore.jks file. The administrator should also import the root or intermediate certificates of the CA into the cacerts.jks file, which is the default truststore for the Controller. The administrator should use the keytool utility, which is bundled with the Controller installation, to import the certificates into the cacerts.jks file.The administrator should also update the password for the keystore.jks and cacerts.jks files, and restart the Controller to apply the changes12.

The incorrect options are:

Re-run the Controller installer and specify the new keypair. (B) This is not a valid method because the Controller installer does not allow the administrator to specify a custom keypair for the Controller SSL certificate. The Controller installer only allows the administrator to specify the Controller host name, port, account name, access key, and database settings.The Controller installer does not modify the keystore.jks or cacerts.jks files, and does not import any custom keypair or certificate into the Controller keystore or truststore3.

Upload a new keystore.jks file through the Controller UI. This is not a valid method because the Controller UI does not provide any feature to upload a new keystore.jks file for the Controller SSL certificate. The Controller UI only allows the administrator to view and edit the Controller settings, such as the license, the security, the email, the analytics, and the EUM.The Controller UI does not access or modify the keystore.jks or cacerts.jks files, and does not import any custom keypair or certificate into the Controller keystore or truststore4.

Upload the keypair from within the Controller UI. (D) This is not a valid method because the Controller UI does not provide any feature to upload a custom keypair for the Controller SSL certificate. The Controller UI only allows the administrator to view and edit the Controller settings, such as the license, the security, the email, the analytics, and the EUM.The Controller UI does not access or modify the keystore.jks or cacerts.jks files, and does not import any custom keypair or certificate into the Controller keystore or truststore4.


1: Controller SSL and Certificates - AppDynamics

2: How do I resolve SSL certificate validation errors in the .NET Agent? - AppDynamics

3: Install the Controller - AppDynamics

4: Controller Settings - AppDynamics

Contribute your Thoughts:

Craig
22 days ago
I just hope the real answer isn't 'All of the Above' because then I'd have to start questioning my entire career choice.
upvoted 0 times
...
Galen
24 days ago
I don't know, but I'm pretty sure the answer involves a secret handshake and a tin foil hat.
upvoted 0 times
Francesco
8 days ago
A) Memory Monitoring
upvoted 0 times
...
...
Sherman
1 months ago
C and D? Hmm, let me guess - the correct answer is 'None of the Above' and the exam writer is just messing with us.
upvoted 0 times
Margot
3 days ago
User3: I agree, C and E are the correct options.
upvoted 0 times
...
Christa
7 days ago
User2: No, it's actually C and E.
upvoted 0 times
...
Leslie
12 days ago
User1: I think it's C and D.
upvoted 0 times
...
...
Ryan
1 months ago
A and B? Are you kidding me? That's like putting a megaphone in front of a hacker and telling them 'Go for it!'
upvoted 0 times
Ona
4 days ago
E) Diagnostic Data Collectors
upvoted 0 times
...
Jacqueline
13 days ago
C) SQL Bind Variables
upvoted 0 times
...
...
Wayne
1 months ago
E and F seem like the obvious choices to protect sensitive data like credit card numbers. I mean, who wants their financial info exposed to the world?
upvoted 0 times
...
Rashida
2 months ago
I believe Diagnostic Data Collectors and Monitoring Level are also important for ensuring data security.
upvoted 0 times
...
Justine
2 months ago
I agree with Corazon. SQL Bind Variables can prevent SQL injection attacks and Policies can restrict access to sensitive data.
upvoted 0 times
...
Corazon
2 months ago
I think SQL Bind Variables and Policies should be configured for protecting private data.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77
a