Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions
Questions # 46:

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?

Options:

A.

Set the sftunnel to go through the Cisco FTD


B.

Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTD devices


C.

Set the sftunnel port to 8305.


D.

Manually change the management port on Cisco FMC and all managed Cisco FTD devices


Expert Solution
Questions # 47:

An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?

Options:

A.

Change the IP address of the new Cisco ISE node to the same network as the others.


B.

Make the new Cisco ISE node a secondary PAN before registering it with the primary.


C.

Open port 8905 on the firewall between the Cisco ISE nodes


D.

Add the DNS entry for the new Cisco ISE node into the DNS server


Expert Solution
Questions # 48:

An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.

The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?

Options:

A.

Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not


B.

Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not.


C.

Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not


D.

Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not.


Expert Solution
Questions # 49:

Which command is used to log all events to a destination colector 209.165.201.107?

Options:

A.

CiscoASA(config-pmap-c)#flow-export event-type flow-update destination 209.165.201.10


B.

CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.


C.

CiscoASA(config-pmap-c)#flow-export event-type all destination 209.165.201.10


D.

CiscoASA(config-cmap)#flow-export event-type flow-update destination 209.165.201.10


Expert Solution
Questions # 50:

What does Cisco ISE use to collect endpoint attributes that are used in profiling?

Options:

A.

probes


B.

posture assessment


C.

Cisco AnyConnect Secure Mobility Client


D.

Cisco pxGrid


Expert Solution
Questions # 51:

What is the purpose of the certificate signing request when adding a new certificate for a server?

Options:

A.

It is the password for the certificate that is needed to install it with.


B.

It provides the server information so a certificate can be created and signed


C.

It provides the certificate client information so the server can authenticate against it when installing


D.

It is the certificate that will be loaded onto the server


Expert Solution
Questions # 52:

Which two parameters are used to prevent a data breach in the cloud? (Choose two.)

Options:

A.

DLP solutions


B.

strong user authentication


C.

encryption


D.

complex cloud-based web proxies


E.

antispoofing programs


Expert Solution
Questions # 53:

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

Options:

A.

hypervisor


B.

virtual machine


C.

network


D.

application


Expert Solution
Questions # 54:

A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to

ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the

network?

Options:

A.

Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.


B.

Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,


C.

Configure VPN load balancing to send non-corporate traffic straight to the internet.


D.

Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.


Expert Solution
Questions # 55:

Which Cisco Secure Client module is integrated with Splunk Enterprise to provide monitoring capabilities to administrators to allow them to view endpoint application usage?

Options:

A.

Umbrella Roaming Security


B.

Network Visibility


C.

AMP Enabler


D.

ISE Posture


Expert Solution
Questions # 56:

A mall provides security services to customers with a shared appliance. The mall wants separation of

management on the shared appliance. Which ASA deployment mode meets these needs?

Options:

A.

routed mode


B.

transparent mode


C.

multiple context mode


D.

multiple zone mode


Expert Solution
Questions # 57:

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

Options:

A.

Cisco Cloudlock


B.

Cisco Umbrella


C.

Cisco AMP


D.

Cisco App Dynamics


Expert Solution
Questions # 58:

What is a benefit of flexible NetFlow records?

Options:

A.

They are used for security


B.

They are used for accounting


C.

They monitor a packet from Layer 2 to Layer 5


D.

They have customized traffic identification


Expert Solution
Questions # 59:

Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?

Options:

A.

hybrid cloud


B.

private cloud


C.

public cloud


D.

community cloud


Expert Solution
Questions # 60:

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

Options:

A.

blocked ports


B.

simple custom detections


C.

command and control


D.

allowed applications


E.

URL


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions