CLC CCIE Sec Real Lab1 M1 Lab1.2.0 Demo
CLC CCIE Sec Real Lab1 M1 Lab1.2.0 Demo
CLC
CCIE Security
Real Lab1: Design
Workbook Description
Design 1.2.0
1 of 34
Welcome!
Please read all the available resources before starting the scenario by clicking ‘Next item’
x of 34
Which four statements correctly represents Sales and Finance organization traffic flows? (Choose four).
Resource(s):-
Email: Design Recommendation
Mario: Based on the business requirements to protect the traffic flows, my recommendations are as
follows for the remote access VPN solution:
Take a look at it and let me know if you have any question or concerns. I will set up a kickoff meeting
with your operations team to formally start the project.
John: Thanks for the recommendations. They seem like a good starting point and will definitely server
well to scope the future conversations. I will look for the meeting invite
x of 34
Architecture 3 Architecture 4
x of 34
Which technology components map to the design categories to realize the initial logical solution?
(Choose all that apply)
Technology Components
Active- Centralized
Design Active Posture DNS https://ccielabcenter.com
User
Categories NTP DHCP Segmentation ISE Failover Assessment Protection OSPF Database DNS
Identity
☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐
Management
Network
☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐
Security
Network
☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐
Reachability
Network
☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐
Availability
Endpoint
☐ ☐ ☐ ☐ ☐ ☐
https://ccielabcenter.com ☐ ☐ ☐ ☐
Security
Network
☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐ ☐
Management
x of 34
Which type of flow and design functional control defines Sales and Finance traffic flows?
https://ccielabcenter.com
A. External business flow that provides secure remote access with single point of failure
B. External business flow that provides secure local access with single point of failure
C. Internal business flow that provides secure remote access with high availability
D. Internal business flow that provides secure local access with single point of failure
E. Internal business flow thathttps://ccielabcenter.com
provides secure local access with high availability
F. External business flow that provides secure remote access with high availability
G. External business flow that provides secure local access with high availability
H. Internal business flow that provides secure remote access with single point of failure
x of 34
Drag and drop the security capabilities from the left onto the corresponding attack surfaces on the right.
Client-Based
Label 2 Label 2 Label 2
Security
Posture Label 3
Label 3
Assessment
Firewall Label 4
Intrusion
Label 5
Detection
TrustSec
https://ccielabcenter.com
Web Security
Email Security
Malware Sandbox
Application
Visibility Control
Server-Based
Security
x of 34
aaa-server ccie protocol radius ISE receives Sales and Finance session
accounting updates every 60 minutes.
aaa-server ccie (mgmt) host 150.1.7.218 Use the management interface for
https://ccielabcenter.com Communication with ISE.
Resource(s)
Email: Email Progress update 3
John: Just so you know. We have completed the current phase of design. The new phase will be the last
in which we will design, implement and validation technical consists of Identity management and
information exchange components of the solution. I have attached the outcome of the current phase.
Let me know if you have any questions. I will keep you posted on the final phase.
Mario: Thanks for keeping us I the loop and sending the document. I am very pleased that we have
made significant process and