Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions
Questions # 76:

An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?

Options:

A.

CNAME


B.

MX


C.

SPF


D.

DKIM


Expert Solution
Questions # 77:

Which IPS engine detects ARP spoofing?

Options:

A.

Atomic ARP Engine


B.

Service Generic Engine


C.

ARP Inspection Engine


D.

AIC Engine


Expert Solution
Questions # 78:

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

Options:

A.

GET


B.

CONNECT


C.

PUSH


D.

OPTIONS


E.

PUT


Expert Solution
Questions # 79:

A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?

Options:

A.

need to be reestablished with stateful failover and preserved with stateless failover


B.

preserved with stateful failover and need to be reestablished with stateless failover


C.

preserved with both stateful and stateless failover


D.

need to be reestablished with both stateful and stateless failover


Expert Solution
Questions # 80:

Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

Options:

A.

Orchestration


B.

CI/CD pipeline


C.

Container


D.

Security


Expert Solution
Questions # 81:

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Options:

A.

To view bandwidth usage for NetFlow records, the QoS feature must be enabled.


B.

A sysopt command can be used to enable NSEL on a specific interface.


C.

NSEL can be used without a collector configured.


D.

A flow-export event type must be defined under a policy


Expert Solution
Questions # 82:

Which solution stops unauthorized access to the system if a user's password is compromised?

Options:

A.

VPN


B.

MFA


C.

AMP


D.

SSL


Expert Solution
Questions # 83:

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Options:

A.

to prevent theft of the endpoints


B.

because defense-in-depth stops at the network


C.

to expose the endpoint to more threats


D.

because human error or insider threats will still exist


Expert Solution
Questions # 84:

An organization has a Cisco ESA set up with policies and would like to customize the action assigned for

violations. The organization wants a copy of the message to be delivered with a message added to flag it as a

DLP violation. Which actions must be performed in order to provide this capability?

Options:

A.

deliver and send copies to other recipients


B.

quarantine and send a DLP violation notification


C.

quarantine and alter the subject header with a DLP violation


D.

deliver and add disclaimer text


Expert Solution
Questions # 85:

Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?

Options:

A.

cluster


B.

transparent


C.

routed


D.

multiple context


Expert Solution
Questions # 86:

Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is

authenticated?

Options:

A.

Authorization


B.

Accounting


C.

Authentication


D.

CoA


Expert Solution
Questions # 87:

Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?

Options:

A.

westbound AP


B.

southbound API


C.

northbound API


D.

eastbound API


Expert Solution
Questions # 88:

How does Cisco Advanced Phishing Protection protect users?

Options:

A.

It validates the sender by using DKIM.


B.

It determines which identities are perceived by the sender


C.

It utilizes sensors that send messages securely.


D.

It uses machine learning and real-time behavior analytics.


Expert Solution
Questions # 89:

An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?

Options:

A.

NAT exemption


B.

encryption domain


C.

routing table


D.

group policy


Expert Solution
Questions # 90:

Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?

Options:

A.

Retrospective security


B.

Endpoint isolation


C.

Advanced investigation


D.

Advanced search


Expert Solution
Viewing page 6 out of 15 pages
Viewing questions 76-90 out of questions