Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions
Questions # 16:

Which type of algorithm provides the highest level of protection against brute-force attacks?

Options:

A.

PFS


B.

HMAC


C.

MD5


D.

SHA


Expert Solution
Questions # 17:

Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)

Options:

A.

The latest antivirus updates are applied before access is allowed.


B.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.


C.

Patch management remediation is performed.


D.

A centralized management solution is deployed.


E.

Endpoint supplicant configuration is deployed.


Expert Solution
Questions # 18:

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?

Options:

A.

The administrator must upload the file instead of the hash for Cisco AMP to use.


B.

The MD5 hash uploaded to the simple detection policy is in the incorrect format


C.

The APK must be uploaded for the application that the detection is intended


D.

Detections for MD5 signatures must be configured in the advanced custom detection policies


Expert Solution
Questions # 19:

Which two actions does the Cisco ISE posture module provide that ensures endpoint security? (Choose two.)

Options:

A.

A centralized management solution is deployed.


B.

Patch management remediation is performed.


C.

The latest antivirus updates are applied before access is allowed.


D.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.


E.

Endpoint supplicant configuration is deployed.


Expert Solution
Questions # 20:

Which attack is commonly associated with C and C++ programming languages?

Options:

A.

cross-site scripting


B.

water holing


C.

DDoS


D.

buffer overflow


Expert Solution
Questions # 21:

What is the benefit of installing Cisco AMP for Endpoints on a network?

Options:

A.

It provides operating system patches on the endpoints for security.


B.

It provides flow-based visibility for the endpoints network connections.


C.

It enables behavioral analysis to be used for the endpoints.


D.

It protects endpoint systems through application control and real-time scanning


Expert Solution
Questions # 22:

Which feature requires that network telemetry be enabled?

Options:

A.

per-interface stats


B.

SNMP trap notification


C.

Layer 2 device discovery


D.

central syslog system


Expert Solution
Questions # 23:

A network engineer is configuring a Cisco Catalyst switch. The network engineer must prevent traffic on the network from being interrupted by broadcast packets flooding the network using a predefined threshold. What must be configured on the switch?

Options:

A.

DHCP Snooping


B.

Embedded Event Monitoring


C.

Storm Control


D.

Loop Guard


Expert Solution
Questions # 24:

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?

Options:

A.

1


B.

2


C.

6


D.

31


Expert Solution
Questions # 25:

An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

Options:

A.

Configure Cisco Secure Workload to detect anomalies and vulnerabilities.


B.

Use Cisco ISE to provide application visibility and restrict access to them.


C.

Implement Cisco Umbrella lo control the access each application is granted.


D.

Modify the Cisco Duo configuration to restrict access between applications.


Expert Solution
Questions # 26:

A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)

Options:

A.

using Cisco Umbrella


B.

using Cisco ESA


C.

using Cisco FTD


D.

using an inline IPS/IDS in the network


E.

using Cisco ISE


Expert Solution
Questions # 27:

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed

devices?

Options:

A.

health policy


B.

system policy


C.

correlation policy


D.

access control policy


E.

health awareness policy


Expert Solution
Questions # 28:

Question # 28

Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Secure Firewall Threat Defense appliance. What is causing this issue?

Options:

A.

No split-tunnel policy is defined on the Secure Firewall Threat Defense appliance.


B.

Site-to-site VPN preshared keys are mismatched.


C.

The access control policy is not allowing VPN traffic in.


D.

Site-to-site VPN peers are using different encryption algorithms.


Expert Solution
Questions # 29:

An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?

Options:

A.

Set content settings to High


B.

Configure the intelligent proxy.


C.

Use destination block lists.


D.

Configure application block lists.


Expert Solution
Questions # 30:

An organization plans to upgrade its current email security solutions, and an engineer must deploy Cisco Secure Email. The requirements for the upgrade are:

    Implement Data Loss Prevention

    Implement mail encryption

    Integrate with an existing Cisco IronPort Secure Email Gateway solution

Which Cisco Secure Email license is needed to accomplish this task?

Options:

A.

Cisco Secure Email Outbound Essentials


B.

Cisco Secure Email Phishing Defense


C.

Cisco Secure Email Domain Protection


D.

Cisco Secure Email Inbound Essentials


Expert Solution
Viewing page 2 out of 15 pages
Viewing questions 16-30 out of questions