Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions
Questions # 136:

What is the function of Cisco Cloudlock for data security?

Options:

A.

data loss prevention


B.

controls malicious cloud apps


C.

detects anomalies


D.

user and entity behavior analytics


Expert Solution
Questions # 137:

Refer to the exhibit.

Question # 137

An engineer is implementing a certificate based VPN. What is the result of the existing configuration?

Options:

A.

The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.


B.

Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully


C.

The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER


D.

The OU of the IKEv2 peer certificate is set to MANGLER


Expert Solution
Questions # 138:

What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Options:

A.

Ethos Engine to perform fuzzy fingerprinting


B.

Tetra Engine to detect malware when me endpoint is connected to the cloud


C.

Clam AV Engine to perform email scanning


D.

Spero Engine with machine learning to perform dynamic analysis


Expert Solution
Questions # 139:

Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?

Options:

A.

analysis


B.

sharing


C.

authoring


D.

consumption


Expert Solution
Questions # 140:

Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)

Options:

A.

no service password-recovery


B.

no cdp run


C.

service tcp-keepalives-in


D.

no ip http server


E.

ip ssh version 2


Expert Solution
Questions # 141:

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen

on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose

two)

Options:

A.

permit


B.

trust


C.

reset


D.

allow


E.

monitor


Expert Solution
Questions # 142:

How does Cisco Advanced Phishing Protection protect users?

Options:

A.

It validates the sender by using DKIM.


B.

It determines which identities are perceived by the sender


C.

It utilizes sensors that send messages securely.


D.

It uses machine learning and real-time behavior analytics.


Expert Solution
Questions # 143:

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.

However, the connection is failing. Which action should be taken to accomplish this goal?

Options:

A.

Disable telnet using the no ip telnet command.


B.

Enable the SSH server using the ip ssh server command.


C.

Configure the port using the ip ssh port 22 command.


D.

Generate the RSA key using the crypto key generate rsa command.


Expert Solution
Questions # 144:

Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments?

Options:

A.

Cisco Umbrella


B.

Cisco Stealthwatch Cloud


C.

Cisco Appdynamics


D.

Cisco CloudLock


Expert Solution
Questions # 145:

Why should organizations migrate to an MFA strategy for authentication?

Options:

A.

Single methods of authentication can be compromised more easily than MFA.


B.

Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.


C.

MFA methods of authentication are never compromised.


D.

MFA does not require any piece of evidence for an authentication mechanism.


Expert Solution
Questions # 146:

A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?

Options:

A.

dynamic split tunneling


B.

local LAN access


C.

dynamic access policies


D.

reverse route injection


Expert Solution
Questions # 147:

How many interfaces per bridge group does an ASA bridge group deployment support?

Options:

A.

up to 2


B.

up to 4


C.

up to 8


D.

up to 16


Expert Solution
Questions # 148:

What is a difference between FlexVPN and DMVPN?

Options:

A.

DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1


B.

DMVPN uses only IKEv1 FlexVPN uses only IKEv2


C.

FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2


D.

FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2


Expert Solution
Questions # 149:

An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?

Options:

A.

Platform as a Service because the customer manages the operating system


B.

Infrastructure as a Service because the customer manages the operating system


C.

Platform as a Service because the service provider manages the operating system


D.

Infrastructure as a Service because the service provider manages the operating system


Expert Solution
Questions # 150:

An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?

Options:

A.

Set content settings to High


B.

Configure the intelligent proxy.


C.

Use destination block lists.


D.

Configure application block lists.


Expert Solution
Viewing page 10 out of 15 pages
Viewing questions 136-150 out of questions