Pass the Cisco CCNP Security 300-740 Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

An administrator must deploy an endpoint posture policy for all users. The organization wants to have all endpoints checked against antimalware definitions and operating system updates and ensure that the correct Secure Client modules are installed properly. How must the administrator meet the requirements?

Options:

A.

Configure the WLC to provide local posture services, and configure Cisco ISE to receive the compliance verification from the WLC to be used in an authorization policy.


B.

Create an ASA Firewall posture policy, upload the Secure Client images to the NAD, and create a local client provisioning portal.


C.

Create the required posture policy within Cisco ISE, configure redirection on the NAD, and ensure that the client provisioning policy is correct.


D.

Identify the antimalware being used, create an endpoint script to ensure that it is updated, and send the update log to Cisco ISE for processing.


Expert Solution
Questions # 12:

Drag and drop the five core functions from the left into the order defined by the NIST Cyber security Framework on the right.

Question # 12


Expert Solution
Questions # 13:

Question # 13

Refer to the exhibit. An engineer must create a policy in Cisco Secure Firewall Management Center to prevent restricted users from being able to browse any business or mobile phone shopping websites. The indicated policy was applied; however, the restricted users still can browse on the mobile phone shopping websites during business hours. What should be done to meet the requirement?

Options:

A.

Set Dest Zones to Business Mobile Phones Shopping.


B.

Set Dest Networks to Business Mobile Phones Shopping.


C.

Set Time Range for rule 4 of Access Controlled Groups to All.


D.

Move rule 4 Access Controlled Groups to the top.


Expert Solution
Questions # 14:

Question # 14

Refer to the exhibit. An engineer must configure multifactor authentication using the Duo Mobile app to provide admin access to a Cisco Meraki switch. The engineer already configured Duo Mobile and received an activation code. Drag and drop the steps from left to right to complete the configuration.

Question # 14


Expert Solution
Questions # 15:

Question # 15

Refer to the exhibit. An engineer must provide RDP access to the AWS virtual machines and HTTPS access to the Google Cloud Platform virtual machines. All other connectivity must be blocked. The indicated rules were applied to the firewall; however, none of the virtual machines in AWS and Google Cloud Platform are accessible. What should be done to meet the requirement?

Options:

A.

Move rule 2 to the first position.


B.

Configure a NAT overload rule


C.

Configure a virtual private cloud firewall rule


D.

Move rule 1 to the last position


Expert Solution
Questions # 16:

Question # 16

Refer to the exhibit. An engineer must configure a remote access IPsec/IKEv2 VPN that will use SHA-512 on a Cisco ASA firewall. The indicated configuration was applied to the firewall; however, the tunnel fails to establish. Which command must be run to meet the requirement?

Options:

A.

integrity sha512


B.

protocol esp encryption sha512


C.

ipsec-proposal sha512


D.

encryption sha512


Expert Solution
Questions # 17:

According to Cisco Security Reference Architecture, which solution provides threat intelligence and malware analytics?

Options:

A.

Cisco pxGrid


B.

Cisco XDR


C.

Cisco Talos


D.

Cisco Umbrella


Expert Solution
Questions # 18:

What does the MITRE ATT&CK framework catalog?

Options:

A.

Techniques utilized in cyber attacks


B.

Patterns of system vulnerabilities


C.

Models of threat intelligence sharing


D.

Standards for information security management


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions