Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions
Questions # 1:

Which Cisco security solution provides patch management in the cloud?

Options:

A.

Cisco Umbrella


B.

Cisco ISE


C.

Cisco CloudLock


D.

Cisco Tetration


Expert Solution
Questions # 2:

What are two differences between a Cisco Secure Web Appliance that is running in transparent mode and one running in explicit mode? (Choose two.)

Options:

A.

The Cisco Secure Web Appliance responds with its own IP address only if it is running in transparent mode.


B.

When the Cisco Secure Web Appliance is running in transparent mode, it uses the Secure Web Appliance's own IP address as the HTTP request destination.


C.

The Cisco Secure Web Appliance responds with its own IP address only if it is running in explicit mode.


D.

The Cisco Secure Web Appliance is configured in a web browser only if it is running in transparent mode.


E.

The Cisco Secure Web Appliance uses a Layer 3 device to redirect traffic only if it is running in transparent mode.


Expert Solution
Questions # 3:

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this

requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

Options:

A.

Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud


B.

Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud


C.

Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud


D.

Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud


Expert Solution
Questions # 4:

Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.

Question # 4


Expert Solution
Questions # 5:

In which scenario is endpoint-based security the solution?

Options:

A.

inspecting encrypted traffic


B.

device profiling and authorization


C.

performing signature-based application control


D.

inspecting a password-protected archive


Expert Solution
Questions # 6:

Which two parameters are used for device compliance checks? (Choose two.)

Options:

A.

endpoint protection software version


B.

Windows registry values


C.

DHCP snooping checks


D.

DNS integrity checks


E.

device operating system version


Expert Solution
Questions # 7:

What is the process of performing automated static and dynamic analysis of files against preloaded

behavioral indicators for threat analysis?

Options:

A.

deep visibility scan


B.

point-in-time checks


C.

advanced sandboxing


D.

advanced scanning


Expert Solution
Questions # 8:

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

Options:

A.

blocked ports


B.

simple custom detections


C.

command and control


D.

allowed applications


E.

URL


Expert Solution
Questions # 9:

An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

Options:

A.

TCP 6514


B.

UDP 1700


C.

TCP 49


D.

UDP 1812


Expert Solution
Questions # 10:

When a next-generation endpoint security solution is selected for a company, what are two key

deliverables that help justify the implementation? (Choose two.)

Options:

A.

signature-based endpoint protection on company endpoints


B.

macro-based protection to keep connected endpoints safe


C.

continuous monitoring of all files that are located on connected endpoints


D.

email integration to protect endpoints from malicious content that is located in email


E.

real-time feeds from global threat intelligence centers


Expert Solution
Questions # 11:

How does Cisco Stealthwatch Cloud provide security for cloud environments?

Options:

A.

It delivers visibility and threat detection.


B.

It prevents exfiltration of sensitive data.


C.

It assigns Internet-based DNS protection for clients and servers.


D.

It facilitates secure connectivity between public and private networks.


Expert Solution
Questions # 12:

What are two benefits of workload security? (Choose two.)

Options:

A.

Tracked application security


B.

Automated patching


C.

Reduced attack surface


D.

Scalable security policies


E.

Workload modeling


Expert Solution
Questions # 13:

Which type of attack is social engineering?

Options:

A.

trojan


B.

phishing


C.

malware


D.

MITM


Expert Solution
Questions # 14:

How does a Cisco Secure Firewall help to lower the risk of exfiltration techniques that steal customer data?

Options:

A.

Blocking UDP port 53


B.

Blocking TCP port 53


C.

Encrypting the DNS communication


D.

Inspecting the DNS traffic


Expert Solution
Questions # 15:

An administrator has been tasked with configuring the Cisco Secure Email Gateway to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)

Options:

A.

Deploy the Secure Email Gateway in the DMZ.


B.

Use outbreak filters from Cisco Talos.


C.

Configure a recipient access table.


D.

Enable a message tracking service.


E.

Scan quarantined emails using AntiVirus signatures.


Expert Solution
Viewing page 1 out of 15 pages
Viewing questions 1-15 out of questions