Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions
Questions # 151:

Which Cisco security solution stops exfiltration using HTTPS?

Options:

A.

Cisco FTD


B.

Cisco AnyConnect


C.

Cisco CTA


D.

Cisco ASA


Expert Solution
Questions # 152:

How is DNS tunneling used to exfiltrate data out of a corporate network?

Options:

A.

It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks.


B.

It encodes the payload with random characters that are broken into short strings and the DNS serverrebuilds the exfiltrated data.


C.

It redirects DNS requests to a malicious server used to steal user credentials, which allows further damageand theft on the network.


D.

It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers.


Expert Solution
Questions # 153:

An administrator needs to configure the Cisco ASA via ASDM such that the network management system

can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?

(Choose two.)

Options:

A.

Specify the SNMP manager and UDP port.


B.

Specify an SNMP user group


C.

Specify a community string.


D.

Add an SNMP USM entry


E.

Add an SNMP host access entry


Expert Solution
Questions # 154:

Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?

Options:

A.

Cisco CTA


B.

Cisco Encrypted Traffic Analytics


C.

Cisco Umbrella


D.

Cisco Secure Network Analytics


Expert Solution
Questions # 155:

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to

network resources?

Options:

A.

BYOD on boarding


B.

Simple Certificate Enrollment Protocol


C.

Client provisioning


D.

MAC authentication bypass


Expert Solution
Questions # 156:

While using Cisco Secure Firewall's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)

Options:

A.

URLs


B.

MAC addresses


C.

Port numbers


D.

IP addresses


E.

Protocol IDs


Expert Solution
Questions # 157:

Which type of protection encrypts RSA keys when they are exported and imported?

Options:

A.

file


B.

passphrase


C.

NGE


D.

nonexportable


Expert Solution
Questions # 158:

Which type of API is being used when a controller within a software-defined network architecture dynamically

makes configuration changes on switches within the network?

Options:

A.

westbound AP


B.

southbound API


C.

northbound API


D.

eastbound API


Expert Solution
Questions # 159:

Question # 159

Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Secure Firewall Threat Defense appliance. What is causing this issue?

Options:

A.

No split-tunnel policy is defined on the Secure Firewall Threat Defense appliance.


B.

Site-to-site VPN preshared keys are mismatched.


C.

The access control policy is not allowing VPN traffic in.


D.

Site-to-site VPN peers are using different encryption algorithms.


Expert Solution
Questions # 160:

An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?

Options:

A.

client


B.

server


C.

controller


D.

publisher


Expert Solution
Questions # 161:

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

Options:

A.

When there is a need to have more advanced detection capabilities


B.

When there is a need for traditional anti-malware detection


C.

When there is no need to have the solution centrally managed


D.

When there is no firewall on the network


Expert Solution
Questions # 162:

What is the difference between deceptive phishing and spear phishing?

Options:

A.

Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.


B.

A spear phishing campaign is aimed at a specific person versus a group of people.


C.

Spear phishing is when the attack is aimed at the C-level executives of an organization.


D.

Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.


Expert Solution
Questions # 163:

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

Options:

A.

Time-based one-time passwords


B.

Data loss prevention


C.

Heuristic-based filtering


D.

Geolocation-based filtering


E.

NetFlow


Expert Solution
Questions # 164:

Which category includes DoS Attacks?

Options:

A.

Virus attacks


B.

Trojan attacks


C.

Flood attacks


D.

Phishing attacks


Expert Solution
Questions # 165:

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

Options:

A.

Multiple NetFlow collectors are supported


B.

Advanced NetFlow v9 templates and legacy v5 formatting are supported


C.

Secure NetFlow connections are optimized for Cisco Prime Infrastructure


D.

Flow-create events are delayed


Expert Solution
Viewing page 11 out of 15 pages
Viewing questions 151-165 out of questions