Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 14 out of 15 pages
Viewing questions 196-210 out of questions
Questions # 196:

Which two Cisco Umbrella security categories are used to prevent command-and-control callbacks on port 53 and protect users from being tricked into providing confidential information? (Choose two.)

Options:

A.

DNS Tunneling VPN


B.

Dynamic DNS


C.

Newly Seen Domains


D.

Potentially Harmful Domains


E.

Phishing Attacks


Expert Solution
Questions # 197:

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?

Options:

A.

Cisco Umbrella


B.

Cisco AMP


C.

Cisco Stealthwatch


D.

Cisco Tetration


Expert Solution
Questions # 198:

Question # 198

Refer to the exhibit. What does this Python script accomplish?

Options:

A.

It allows authentication with TLSv1 SSL protocol


B.

It authenticates to a Cisco ISE with an SSH connection.


C.

lt authenticates to a Cisco ISE server using the username of ersad


D.

It lists the LDAP users from the external identity store configured on Cisco ISE


Expert Solution
Questions # 199:

Which two devices support WCCP for traffic redirection? (Choose two.)

Options:

A.

Cisco Secure Web Appliance


B.

Cisco IOS


C.

proxy server


D.

Cisco ASA


E.

Cisco IPS


Expert Solution
Questions # 200:

What is a benefit of performing device compliance?

Options:

A.

Verification of the latest OS patches


B.

Device classification and authorization


C.

Providing multi-factor authentication


D.

Providing attribute-driven policies


Expert Solution
Questions # 201:

An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?

Options:

A.

Use DNSSEC between the endpoints and Cisco Umbrella DNS servers.


B.

Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones.


C.

Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional.


D.

Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers.


Expert Solution
Questions # 202:

What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?

Options:

A.

public collection of threat intelligence feeds


B.

threat intelligence sharing organization


C.

language used to represent security information


D.

service used to exchange security information


Expert Solution
Questions # 203:

A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?

Options:

A.

SFTP using the FMCCLI


B.

syslog using the Secure Event Connector


C.

direct connection using SNMP traps


D.

HTTP POST using the Security Analytics FMC plugin


Expert Solution
Questions # 204:

Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?

Options:

A.

filters


B.

group key


C.

company key


D.

connector


Expert Solution
Questions # 205:

What are two functions of secret key cryptography? (Choose two)

Options:

A.

key selection without integer factorization


B.

utilization of different keys for encryption and decryption


C.

utilization of large prime number iterations


D.

provides the capability to only know the key on one side


E.

utilization of less memory


Expert Solution
Questions # 206:

What is the role of an endpoint in protecting a user from a phishing attack?

Options:

A.

Use Cisco Stealthwatch and Cisco ISE Integration.


B.

Utilize 802.1X network security to ensure unauthorized access to resources.


C.

Use machine learning models to help identify anomalies and determine expected sending behavior.


D.

Ensure that antivirus and anti malware software is up to date


Expert Solution
Questions # 207:

A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging” category. Which reputation score should be selected to accomplish this goal?

Options:

A.

1


B.

3


C.

5


D.

10


Expert Solution
Questions # 208:

What are two functionalities of SDN Northbound APIs? (Choose two.)

Options:

A.

Northbound APIs provide a programmable interface for applications to dynamically configure the network.


B.

Northbound APIs form the interface between the SDN controller and business applications.


C.

OpenFlow is a standardized northbound API protocol.


D.

Northbound APIs use the NETCONF protocol to communicate with applications.


E.

Northbound APIs form the interface between the SDN controller and the network switches or routers.


Expert Solution
Questions # 209:

Which action configures the IEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms?

Options:

A.

Add MAB into the switch to allow redirection to a Layer 3 device for authentication.


B.

Identify the devices using this feature and create a policy that allows them to pass Layer 2 authentication.


C.

Modify the Dot1x configuration on the VPN server to send Layer 3 authentications to an external authentication database.


D.

Configure WebAuth so the hosts are redirected to a web page for authentication.


Expert Solution
Questions # 210:

Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data

within a network perimeter?

Options:

A.

cloud web services


B.

network AMP


C.

private cloud


D.

public cloud


Expert Solution
Viewing page 14 out of 15 pages
Viewing questions 196-210 out of questions