Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions
Questions # 46:

Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline

posture node?

Options:

A.

RADIUS Change of Authorization


B.

device tracking


C.

DHCP snooping


D.

VLAN hopping


Expert Solution
Questions # 47:

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

Options:

A.

authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX


B.

authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX


C.

authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX


D.

secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX


Expert Solution
Questions # 48:

An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?

Options:

A.

NAT exemption


B.

encryption domain


C.

routing table


D.

group policy


Expert Solution
Questions # 49:

A customer has various external HTTP resources available including Intranet. Extranet, and Internet, with a proxy configuration running in explicit mode Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?

Options:

A.

Transparent mode


B.

Forward file


C.

PAC file


D.

Bridge mode


Expert Solution
Questions # 50:

What does endpoint isolation in Cisco AMP for Endpoints security protect from?

Options:

A.

an infection spreading across the network E


B.

a malware spreading across the user device


C.

an infection spreading across the LDAP or Active Directory domain from a user account


D.

a malware spreading across the LDAP or Active Directory domain from a user account


Expert Solution
Questions # 51:

A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?

Options:

A.

The file has a reputation score that is below the threshold.


B.

The file has a reputation score that is above the threshold.


C.

The policy was created to disable file analysis.


D.

The policy was created to send a message to quarantine instead of drop.


Expert Solution
Questions # 52:

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

Options:

A.

Application Control


B.

Security Category Blocking


C.

Content Category Blocking


D.

File Analysis


Expert Solution
Questions # 53:

Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?

Options:

A.

api/v1/fie/config


B.

api/v1/onboarding/pnp-device/import


C.

api/v1/onboarding/pnp-device


D.

api/v1/onboarding/workflow


Expert Solution
Questions # 54:

What are two characteristics of Cisco Catalyst Center APIs? (Choose two.)

Options:

A.

Postman is required to utilize Cisco Catalyst Center API calls.


B.

They are Cisco proprietary.


C.

They do not support Python scripts.


D.

They view the overall health of the network.


E.

They quickly provision new devices.


Expert Solution
Questions # 55:

Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

Options:

A.

GET VPN


B.

IPsec DVTI


C.

DMVPN


D.

FlexVPN


Expert Solution
Questions # 56:

Which functions of an SDN architecture require southbound APIs to enable communication?

Options:

A.

SDN controller and the network elements


B.

management console and the SDN controller


C.

management console and the cloud


D.

SDN controller and the cloud


Expert Solution
Questions # 57:

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

Options:

A.

transparent mode


B.

routed mode


C.

inline mode


D.

active mode


E.

passive monitor-only mode


Expert Solution
Questions # 58:

Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?

Options:

A.

hybrid cloud


B.

private cloud


C.

public cloud


D.

community cloud


Expert Solution
Questions # 59:

Which Cisco Firewall solution requires zone definition?

Options:

A.

CBAC


B.

Cisco AMP


C.

ZBFW


D.

Cisco ASA


Expert Solution
Questions # 60:

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which

vulnerability allows the attacker to see the passwords being transmitted in clear text?

Options:

A.

weak passwords for authentication


B.

unencrypted links for traffic


C.

software bugs on applications


D.

improper file security


Expert Solution
Viewing page 4 out of 15 pages
Viewing questions 46-60 out of questions