Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions
Questions # 166:

An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

Options:

A.

Use security services to configure the traffic monitor, .


B.

Use URL categorization to prevent the application traffic.


C.

Use an access policy group to configure application control settings.


D.

Use web security reporting to validate engine functionality


Expert Solution
Questions # 167:

What is an advantage of network telemetry over SNMP pulls?

Options:

A.

accuracy


B.

encapsulation


C.

security


D.

scalability


Expert Solution
Questions # 168:

A network engineer must configure a Cisco Secure Email Gateway to prompt users to enter two forms of information before gaining access. The Secure Email Gateway must also join a cluster machine using preshared keys. What must be configured to meet these requirements?

Options:

A.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Secure Email Gateway CLI.


B.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Secure Email Gateway CLI.


C.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Secure Email Gateway GUI.


D.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Secure Email Gateway GUI.


Expert Solution
Questions # 169:

What Cisco command shows you the status of an 802.1X connection on interface gi0/1?

Options:

A.

show authorization status


B.

show authen sess int gi0/1


C.

show connection status gi0/1


D.

show ver gi0/1


Expert Solution
Questions # 170:

For which type of attack is multifactor authentication an effective deterrent?

Options:

A.

Ping of death


B.

Teardrop


C.

SYN flood


D.

Phishing


Expert Solution
Questions # 171:

Which attack is preventable by Cisco ESA but not by the Cisco WSA?

Options:

A.

buffer overflow


B.

DoS


C.

SQL injection


D.

phishing


Expert Solution
Questions # 172:

Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?

Options:

A.

Cisco Threat Indication Database


B.

Cisco Advanced Malware Investigate


C.

Cisco Umbrella Investigate


D.

Cisco Secure Workload Cloud


Expert Solution
Questions # 173:

A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)

Options:

A.

Segment different departments to different IP blocks and enable Dynamic ARp inspection on all VLANs


B.

Ensure that noncompliant endpoints are segmented off to contain any potential damage.


C.

Ensure that a user cannot enter the network of another department.


D.

Perform a posture check to allow only network access to (hose Windows devices that are already patched.


E.

Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW. ni


Expert Solution
Questions # 174:

An engineer is configuring cloud logging on Cisco ASA and needs events to compress. Which component must be configured to accomplish this goal?

Options:

A.

CDO event viewer


B.

SWC service


C.

Cisco analytics


D.

SDC VM


Expert Solution
Questions # 175:

Which ESA implementation method segregates inbound and outbound email?

Options:

A.

one listener on a single physical Interface


B.

pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address


C.

pair of logical IPv4 listeners and a pair Of IPv6 listeners on two physically separate interfaces


D.

one listener on one logical IPv4 address on a single logical interface


Expert Solution
Questions # 176:

An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,

data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity

platform. What should be used to meet these requirements?

Options:

A.

Cisco Umbrella


B.

Cisco Cloud Email Security


C.

Cisco NGFW


D.

Cisco Cloudlock


Expert Solution
Questions # 177:

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?

(Choose two)

Options:

A.

Sophos engine


B.

white list


C.

RAT


D.

outbreak filters


E.

DLP


Expert Solution
Questions # 178:

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

Options:

A.

It can handle explicit HTTP requests.


B.

It requires a PAC file for the client web browser.


C.

It requires a proxy for the client web browser.


D.

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.


E.

Layer 4 switches can automatically redirect traffic destined to port 80.


Expert Solution
Questions # 179:

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?

Options:

A.

Google Cloud Platform


B.

Red Hat Enterprise Visualization


C.

VMware ESXi


D.

Amazon Web Services


Expert Solution
Questions # 180:

What are two workloaded security models? (Choose two)

Options:

A.

SaaS


B.

IaaS


C.

on-premises


D.

off-premises


E.

PaaS


Expert Solution
Viewing page 12 out of 15 pages
Viewing questions 166-180 out of questions