Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions
Questions # 61:

What is a capability of Cisco ASA Netflow?

Options:

A.

It filters NSEL events based on traffic


B.

It generates NSEL events even if the MPF is not configured


C.

It logs all event types only to the same collector


D.

It sends NetFlow data records from active and standby ASAs in an active standby failover pair


Expert Solution
Questions # 62:

What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest

access, and the same guest portal is used as the BYOD portal?

Options:

A.

single-SSID BYOD


B.

multichannel GUI


C.

dual-SSID BYOD


D.

streamlined access


Expert Solution
Questions # 63:

What is a difference between DMVPN and sVTI?

Options:

A.

DMVPN supports tunnel encryption, whereas sVTI does not.


B.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.


C.

DMVPN supports static tunnel establishment, whereas sVTI does not.


D.

DMVPN provides interoperability with other vendors, whereas sVTI does not.


Expert Solution
Questions # 64:

Which two fields are defined in the NetFlow flow? (Choose two)

Options:

A.

type of service byte


B.

class of service bits


C.

Layer 4 protocol type


D.

destination port


E.

output logical interface


Expert Solution
Questions # 65:

Drag and drop the descriptions from the left onto the encryption algorithms on the right.

Question # 65


Expert Solution
Questions # 66:

What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?

Options:

A.

Use the simple custom detection feature and add each detection to the list.


B.

Add a network IP block allowed list to the configuration and add the blocked files.


C.

Create an advanced custom detection and upload the hash of each file


D.

Configure an application control allowed applications list to block the files


Expert Solution
Questions # 67:

A network administrator is configuring SNMPv3 on a new router. The users have already been created;

however, an additional configuration is needed to facilitate access to the SNMP views. What must the

administrator do to accomplish this?

Options:

A.

map SNMPv3 users to SNMP views


B.

set the password to be used for SNMPv3 authentication


C.

define the encryption algorithm to be used by SNMPv3


D.

specify the UDP port used by SNMP


Expert Solution
Questions # 68:

Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?

Options:

A.

big data


B.

storm centers


C.

sandboxing


D.

blocklisting


Expert Solution
Questions # 69:

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.

Options:

A.

Create NTLM or Kerberos authentication realm and enable transparent user identification


B.

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.


C.

Create an LDAP authentication realm and disable transparent user identification.


D.

Deploy a separate eDirectory server: the client IP address is recorded in this server


Expert Solution
Questions # 70:

Which solution detects threats across a private network, public clouds, and encrypted traffic?

Options:

A.

Cisco Stealthwatch


B.

Cisco CTA


C.

Cisco Encrypted Traffic Analytics


D.

Cisco Umbrella


Expert Solution
Questions # 71:

An engineer is implementing DHCP security mechanisms and needs the ability to add additional attributes to profiles that are created within Cisco ISE Which action accomplishes this task?

Options:

A.

Define MAC-to-lP address mappings in the switch to ensure that rogue devices cannot get an IP address


B.

Use DHCP option 82 to ensure that the request is from a legitimate endpoint and send the information to Cisco ISE


C.

Modify the DHCP relay and point the IP address to Cisco ISE.


D.

Configure DHCP snooping on the switch VLANs and trust the necessary interfaces


Expert Solution
Questions # 72:

What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)

Options:

A.

Use intrusion prevention system.


B.

Block all TXT DNS records.


C.

Enforce security over port 53.


D.

Use next generation firewalls.


E.

Use Cisco Umbrella.


Expert Solution
Questions # 73:

An engineer implements Cisco CloudLock to secure a Microsoft Office 365 application in the cloud. The engineer must configure protection for corporate files in case of any incidents. Which two actions must be taken to complete the implementation? (Choose two.)

Options:

A.

Expire the public share URL


B.

Send Cisco Webex message to specified users when an incident is triggered


C.

Transfer ownership of the files to a specified owner and folder


D.

Remove all users as collaborators on the files


E.

Disable the ability for commenters and viewers to download and copy the files


Expert Solution
Questions # 74:

Drag and drop the VPN functions from the left onto the description on the right.Question # 74


Expert Solution
Questions # 75:

When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?

Options:

A.

It blocks the request.


B.

It applies the global policy.


C.

It applies the next identification profile policy.


D.

It applies the advanced policy.


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions