Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions
Questions # 91:

Which two actions does the Cisco identity Services Engine posture module provide that ensures endpoint security?(Choose two.)

Options:

A.

The latest antivirus updates are applied before access is allowed.


B.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.


C.

Patch management remediation is performed.


D.

A centralized management solution is deployed.


E.

Endpoint supplicant configuration is deployed.


Expert Solution
Questions # 92:

Which Secure Email Gateway implementation method segregates inbound and outbound email?

Options:

A.

Pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address


B.

One listener on one logical IPv4 address on a single logical interface


C.

Pair of logical IPv4 listeners and a pair of IPv6 listeners on two physically separate interfaces


D.

One listener on a single physical interface


Expert Solution
Questions # 93:

What is a language format designed to exchange threat intelligence that can be transported over the TAXII

protocol?

Options:

A.

STIX


B.

XMPP


C.

pxGrid


D.

SMTP


Expert Solution
Questions # 94:

How does Cisco Umbrella archive logs to an enterprise owned storage?

Options:

A.

by using the Application Programming Interface to fetch the logs


B.

by sending logs via syslog to an on-premises or cloud-based syslog server


C.

by the system administrator downloading the logs from the Cisco Umbrella web portal


D.

by being configured to send logs to a self-managed AWS S3 bucket


Expert Solution
Questions # 95:

When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?

Options:

A.

CDP


B.

NTP


C.

syslog


D.

DNS


Expert Solution
Questions # 96:

Which two capabilities does an MDM provide? (Choose two.)

Options:

A.

delivery of network malware reports to an inbox in a schedule


B.

unified management of mobile devices, Macs, and PCs from a centralized dashboard


C.

enforcement of device security policies from a centralized dashboard


D.

manual identification and classification of client devices


E.

unified management of Android and Apple devices from a centralized dashboard


Expert Solution
Questions # 97:

Which attack is commonly associated with C and C++ programming languages?

Options:

A.

cross-site scripting


B.

water holing


C.

DDoS


D.

buffer overflow


Expert Solution
Questions # 98:

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management

port conflicts with other communications on the network and must be changed. What must be done to ensure

that all devices can communicate together?

Options:

A.

Manually change the management port on Cisco FMC and all managed Cisco FTD devices


B.

Set the tunnel to go through the Cisco FTD


C.

Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTDdevices


D.

Set the tunnel port to 8305


Expert Solution
Questions # 99:

Question # 99

Refer to the exhibit. An engineer must configure an incoming mail policy so that each email sent from usera1@example.com to a domain of @cisco.com is scanned for antispam and advanced malware protection. All other settings will use the default behavior. What must be configured in the incoming mail policy to meet the requirements?

Options:

A.

Policy Name: Default Policy

  Sender: usera1@example.com

  Recipient: @cisco.com


B.

Policy Name: usera1 policy

  Sender: usera1@example.com

  Recipient: @cisco.com


C.

Policy Name: Anti-Malware policy

  Sender: usera1@example.com

  Recipient: @cisco.com


D.

Policy Name: cisco.com policy

  Sender: usera1@example.com

  Recipient: @cisco.com


Expert Solution
Questions # 100:

In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)

Options:

A.

It allows multiple security products to share information and work together to enhance security posture in the network.


B.

It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.


C.

It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.


D.

It integrates with third-party products to provide better visibility throughout the network.


E.

It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID).


Expert Solution
Questions # 101:

An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?

Options:

A.

MDA on the router


B.

PBR on Cisco WSA


C.

WCCP on switch


D.

DNS resolution on Cisco WSA


Expert Solution
Questions # 102:

In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)

Options:

A.

It prevents use of compromised accounts and social engineering.


B.

It prevents all zero-day attacks coming from the Internet.


C.

It automatically removes malicious emails from users' inbox.


D.

It prevents trojan horse malware using sensors.


E.

It secures all passwords that are shared in video conferences.


Expert Solution
Questions # 103:

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a

recipient address. Which list contains the allowed recipient addresses?

Options:

A.

SAT


B.

BAT


C.

HAT


D.

RAT


Expert Solution
Questions # 104:

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

Options:

A.

consumption


B.

sharing


C.

analysis


D.

authoring


Expert Solution
Questions # 105:

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

Options:

A.

SDN controller and the cloud


B.

management console and the SDN controller


C.

management console and the cloud


D.

SDN controller and the management solution


Expert Solution
Viewing page 7 out of 15 pages
Viewing questions 91-105 out of questions