Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions
Questions # 31:

Which type of attack is social engineering?

Options:

A.

trojan


B.

phishing


C.

malware


D.

MITM


Expert Solution
Questions # 32:

Refer to the exhibit.

Question # 32

What are two indications of the Cisco Firepower Services Module configuration?

(Choose two.)

Options:

A.

The module is operating in IDS mode.


B.

Traffic is blocked if the module fails.


C.

The module fails to receive redirected traffic.


D.

The module is operating in IPS mode.


E.

Traffic continues to flow if the module fails.


Expert Solution
Questions # 33:

What is a benefit of using GET VPN over FlexVPN within a VPN deployment?

Options:

A.

GET VPN supports Remote Access VPNs


B.

GET VPN natively supports MPLS and private IP networks


C.

GET VPN uses multiple security associations for connections


D.

GET VPN interoperates with non-Cisco devices


Expert Solution
Questions # 34:

What is the purpose of the Cisco Endpoint IoC feature?

Options:

A.

It is an incident response tool.


B.

It provides stealth threat prevention.


C.

It is a signature-based engine.


D.

It provides precompromise detection.


Expert Solution
Questions # 35:

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

Options:

A.

NetFlow


B.

desktop client


C.

ASDM


D.

API


Expert Solution
Questions # 36:

Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?

Options:

A.

Cisco AMP for Endpoints


B.

Cisco AnyConnect


C.

Cisco Umbrella


D.

Cisco Duo


Expert Solution
Questions # 37:

Drag and drop the common security threats from the left onto the definitions on the right.

Question # 37


Expert Solution
Questions # 38:

What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?

Options:

A.

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.


B.

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL


C.

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1


D.

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.


Expert Solution
Questions # 39:

Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments?

Options:

A.

Cisco Umbrella


B.

Cisco Stealthwatch Cloud


C.

Cisco Appdynamics


D.

Cisco CloudLock


Expert Solution
Questions # 40:

Question # 40

Refer to the exhibit. What does this Python script accomplish?

Options:

A.

It allows authentication with TLSv1 SSL protocol


B.

It authenticates to a Cisco ISE with an SSH connection.


C.

lt authenticates to a Cisco ISE server using the username of ersad


D.

It lists the LDAP users from the external identity store configured on Cisco ISE


Expert Solution
Questions # 41:

How is DNS tunneling used to exfiltrate data out of a corporate network?

Options:

A.

It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks.


B.

It encodes the payload with random characters that are broken into short strings and the DNS serverrebuilds the exfiltrated data.


C.

It redirects DNS requests to a malicious server used to steal user credentials, which allows further damageand theft on the network.


D.

It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers.


Expert Solution
Questions # 42:

When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?

Options:

A.

CDP


B.

NTP


C.

syslog


D.

DNS


Expert Solution
Questions # 43:

Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion

events that are flagged as possible active breaches?

Options:

A.

retrospective detection


B.

indication of compromise


C.

file trajectory


D.

elastic search


Expert Solution
Questions # 44:

What is a prerequisite when integrating a Cisco ISE server and an AD domain?

Options:

A.

Place the Cisco ISE server and the AD server in the same subnet


B.

Configure a common administrator account


C.

Configure a common DNS server


D.

Synchronize the clocks of the Cisco ISE server and the AD server


Expert Solution
Questions # 45:

A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?

Options:

A.

B.

C.

D.

Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions