Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions
Questions # 31:

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

Options:

A.

SDP


B.

LDAP


C.

subordinate CA


D.

SCP


E.

HTTP


Expert Solution
Questions # 32:

Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two.)

Options:

A.

Cisco Umbrella


B.

Cisco ISE


C.

Cisco DNA Center


D.

Cisco TrustSec


E.

Cisco Duo Security


Expert Solution
Questions # 33:

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)

Options:

A.

If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.


B.

PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.


C.

The WSA hosts PAC files on port 9001 by default.


D.

The WSA hosts PAC files on port 6001 by default.


E.

By default, they direct traffic through a proxy when the PC and the host are on the same subnet.


Expert Solution
Questions # 34:

What are two benefits of using an MDM solution? (Choose two.)

Options:

A.

grants administrators a way to remotely wipe a lost or stolen device


B.

provides simple and streamlined login experience for multiple applications and users


C.

native integration that helps secure applications across multiple cloud platforms or on-premises environments


D.

encrypts data that is stored on endpoints


E.

allows for centralized management of endpoint device applications and configurations


Expert Solution
Questions # 35:

What is a characteristic of a bridge group in ASA Firewall transparent mode?

Options:

A.

It includes multiple interfaces and access rules between interfaces are customizable


B.

It is a Layer 3 segment and includes one port and customizable access rules


C.

It allows ARP traffic with a single access rule


D.

It has an IP address on its BVI interface and is used for management traffic


Expert Solution
Questions # 36:

An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?

Options:

A.

Create advanced custom detection list.


B.

Configure application control blocked applications list.


C.

Implement simple custom detection list.


D.

Enable scheduled scans to detect and block the executable files.


Expert Solution
Questions # 37:

Which Cisco security solution protects remote users against phishing attacks when they are not connected to

the VPN?

Options:

A.

Cisco Stealthwatch


B.

Cisco Umbrella


C.

Cisco Firepower


D.

NGIPS


Expert Solution
Questions # 38:

Which system performs compliance checks and remote wiping?

Options:

A.

MDM


B.

ISE


C.

AMP


D.

OTP


Expert Solution
Questions # 39:

An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?

Options:

A.

Cisco CloudLock


B.

Cisco AppDynamics Cloud Monitoring


C.

Cisco Umbrella


D.

Cisco Stealthwatch


Expert Solution
Questions # 40:

What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)

Options:

A.

REST uses methods such as GET, PUT, POST, and DELETE.


B.

REST codes can be compiled with any programming language.


C.

REST is a Linux platform-based architecture.


D.

The POST action replaces existing data at the URL path.


E.

REST uses HTTP to send a request to a web service.


Expert Solution
Questions # 41:

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services

Engine? (Choose two)

Options:

A.

RADIUS


B.

TACACS+


C.

DHCP


D.

sFlow


E.

SMTP


Expert Solution
Questions # 42:

What features does Cisco FTDv provide over ASAv?

Options:

A.

Cisco FTDv runs on VMWare while ASAv does not


B.

Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not


C.

Cisco FTDv runs on AWS while ASAv does not


D.

Cisco FTDv supports URL filtering while ASAv does not


Expert Solution
Questions # 43:

Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.

Question # 43


Expert Solution
Questions # 44:

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Options:

A.

The attack is fragmented into groups of 16 octets before transmission.


B.

The attack is fragmented into groups of 8 octets before transmission.


C.

Short synchronized bursts of traffic are used to disrupt TCP connections.


D.

Malformed packets are used to crash systems.


E.

Publicly accessible DNS servers are typically used to execute the attack.


Expert Solution
Questions # 45:

Which Cisco network security device supports contextual awareness?

Options:

A.

Firepower


B.

CISCO ASA


C.

Cisco IOS


D.

ISE


Expert Solution
Viewing page 3 out of 15 pages
Viewing questions 31-45 out of questions