Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions
Questions # 91:

What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?

Options:

A.

To protect the endpoint against malicious file transfers


B.

To ensure that assets are secure from malicious links on and off the corporate network


C.

To establish secure VPN connectivity to the corporate network


D.

To enforce posture compliance and mandatory software


Expert Solution
Questions # 92:

What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?

Options:

A.

The Umbrella Roaming client stops and tracks malicious activity on hosts, and AMP for Endpoints tracks only URL-based threats.


B.

The Umbrella Roaming Client authenticates users and provides segmentation, and AMP for Endpoints allows only for VPN connectivity


C.

AMP for Endpoints authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.


D.

AMP for Endpoints stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.


Expert Solution
Questions # 93:

An organization wants to secure data in a cloud environment. Its security model requires that all users be

authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?

Options:

A.

Virtual routing and forwarding


B.

Microsegmentation


C.

Access control policy


D.

Virtual LAN


Expert Solution
Questions # 94:

A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?

Options:

A.

disable STP on the network devices


B.

dedicated VLAN ID for all trunk ports


C.

DHCP snooping on all the switches


D.

enable port-based network access control


Expert Solution
Questions # 95:

Refer to the exhibit.

Question # 95

An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?

Options:

A.

authentication open


B.

dotlx reauthentication


C.

cisp enable


D.

dot1x pae authenticator


Expert Solution
Questions # 96:

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

Options:

A.

Create an IP block list for the website from which the file was downloaded


B.

Block the application that the file was using to open


C.

Upload the hash for the file into the policy


D.

Send the file to Cisco Threat Grid for dynamic analysis


Expert Solution
Questions # 97:

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

Options:

A.

interpacket variation


B.

software package variation


C.

flow insight variation


D.

process details variation


Expert Solution
Questions # 98:

An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites

but other sites are not accessible due to an error. Why is the error occurring?

Options:

A.

Client computers do not have the Cisco Umbrella Root CA certificate installed.


B.

IP-Layer Enforcement is not configured.


C.

Client computers do not have an SSL certificate deployed from an internal CA server.


D.

Intelligent proxy and SSL decryption is disabled in the policy


Expert Solution
Questions # 99:

Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?

Options:

A.

IaC


B.

SaaS


C.

IaaS


D.

PaaS


Expert Solution
Questions # 100:

An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)

Options:

A.

Configure Cisco ACI to ingest AWS information.


B.

Configure Cisco Thousand Eyes to ingest AWS information.


C.

Send syslog from AWS to Cisco Stealthwatch Cloud.


D.

Send VPC Flow Logs to Cisco Stealthwatch Cloud.


E.

Configure Cisco Stealthwatch Cloud to ingest AWS information


Expert Solution
Questions # 101:

A security engineer must create a policy based on the reputation verdict of a file from a Cisco Secure Email Gateway. The file with an undetermined verdict must be dropped. Which action must the security engineer take to meet the requirement?

Options:

A.

Configure threshold settings for files with no score to be allowed.


B.

Set up a policy to automatically drop files with no reputation score.


C.

Implement a policy to disable file analysis.


D.

Create a policy to send a file to quarantine.


Expert Solution
Questions # 102:

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention

System?

Options:

A.

Security Intelligence


B.

Impact Flags


C.

Health Monitoring


D.

URL Filtering


Expert Solution
Questions # 103:

A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.

How does the switch behave in this situation?

Options:

A.

It forwards the packet after validation by using the MAC Binding Table.


B.

It drops the packet after validation by using the IP & MAC Binding Table.


C.

It forwards the packet without validation.


D.

It drops the packet without validation.


Expert Solution
Questions # 104:

Refer to the exhibit.

Question # 104

What does the API do when connected to a Cisco security appliance?

Options:

A.

get the process and PID information from the computers in the network


B.

create an SNMP pull mechanism for managing AMP


C.

gather network telemetry information from AMP for endpoints


D.

gather the network interface information about the computers AMP sees


Expert Solution
Questions # 105:

An engineer is configuring cloud logging on Cisco ASA and needs events to compress. Which component must be configured to accomplish this goal?

Options:

A.

CDO event viewer


B.

SWC service


C.

Cisco analytics


D.

SDC VM


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions