Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions
Questions # 61:

Which two cryptographic algorithms are used with IPsec? (Choose two)

Options:

A.

AES-BAC


B.

AES-ABC


C.

HMAC-SHA1/SHA2


D.

Triple AMC-CBC


E.

AES-CBC


Expert Solution
Questions # 62:

An organization wants to provide visibility and to identify active threats in its network using a VM. The

organization wants to extract metadata from network packet flow while ensuring that payloads are not retained

or transferred outside the network. Which solution meets these requirements?

Options:

A.

Cisco Umbrella Cloud


B.

Cisco Stealthwatch Cloud PNM


C.

Cisco Stealthwatch Cloud PCM


D.

Cisco Umbrella On-Premises


Expert Solution
Questions # 63:

Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?

Options:

A.

buffer overflow


B.

browser WGET


C.

SQL injection


D.

cross-site scripting


Expert Solution
Questions # 64:

Which two descriptions of AES encryption are true? (Choose two)

Options:

A.

AES is less secure than 3DES.


B.

AES is more secure than 3DES.


C.

AES can use a 168-bit key for encryption.


D.

AES can use a 256-bit key for encryption.


E.

AES encrypts and decrypts a key three times in sequence.


Expert Solution
Questions # 65:

What is the function of the Context Directory Agent?

Options:

A.

maintains users’ group memberships


B.

relays user authentication requests from Web Security Appliance to Active Directory


C.

reads the Active Directory logs to map IP addresses to usernames


D.

accepts user authentication requests on behalf of Web Security Appliance for user identification


Expert Solution
Questions # 66:

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https:// /capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?

Options:

A.

Disable the proxy setting on the browser


B.

Disable the HTTPS server and use HTTP instead


C.

Use the Cisco FTD IP address as the proxy server setting on the browser


D.

Enable the HTTPS server for the device platform policy


Expert Solution
Questions # 67:

Which Cisco security solution secures public, private, hybrid, and community clouds?

Options:

A.

Cisco ISE


B.

Cisco ASAv


C.

Cisco Cloudlock


D.

Cisco pxGrid


Expert Solution
Questions # 68:

An engineer implements Cisco CloudLock to secure a Microsoft Office 365 application in the cloud. The engineer must configure protection for corporate files in case of any incidents. Which two actions must be taken to complete the implementation? (Choose two.)

Options:

A.

Expire the public share URL


B.

Send Cisco Webex message to specified users when an incident is triggered


C.

Transfer ownership of the files to a specified owner and folder


D.

Remove all users as collaborators on the files


E.

Disable the ability for commenters and viewers to download and copy the files


Expert Solution
Questions # 69:

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

Options:

A.

asset inventory management


B.

allowed application management


C.

Active Directory group policy management


D.

network device management


E.

critical device management


Expert Solution
Questions # 70:

Which encryption algorithm provides highly secure VPN communications?

Options:

A.

3DES


B.

AES 256


C.

AES 128


D.

DES


Expert Solution
Questions # 71:

How does a WCCP-configured router identify if the Cisco WSA is functional?

Options:

A.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router.


B.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longertransmitted to the WSA.


C.

The WSA sends a Here-l-Am message every 10 seconds, and the router acknowledges with an ISee-You message.


D.

The router sends a Here-l-Am message every 10 seconds, and the WSA acknowledges with an ISee-You message.


Expert Solution
Questions # 72:

An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?

Options:

A.

Set a trusted interface for the DHCP server


B.

Set the DHCP snooping bit to 1


C.

Add entries in the DHCP snooping database


D.

Enable ARP inspection for the required VLAN


Expert Solution
Questions # 73:

Which two fields are defined in the NetFlow flow? (Choose two)

Options:

A.

type of service byte


B.

class of service bits


C.

Layer 4 protocol type


D.

destination port


E.

output logical interface


Expert Solution
Questions # 74:

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social

engineering attacks? (Choose two)

Options:

A.

Patch for cross-site scripting.


B.

Perform backups to the private cloud.


C.

Protect against input validation and character escapes in the endpoint.


D.

Install a spam and virus email filter.


E.

Protect systems with an up-to-date antimalware program


Expert Solution
Questions # 75:

Refer to the exhibit.

Question # 75

Which statement about the authentication protocol used in the configuration is true?

Options:

A.

The authentication request contains only a password


B.

The authentication request contains only a username


C.

The authentication and authorization requests are grouped in a single packet


D.

There are separate authentication and authorization request packets


Expert Solution
Viewing page 5 out of 15 pages
Viewing questions 61-75 out of questions