Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions
Questions # 106:

An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization

needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of

172.19.20.24. Which command on the hub will allow the administrator to accomplish this?

Options:

A.

crypto ca identity 172.19.20.24


B.

crypto isakmp key Cisco0123456789 172.19.20.24


C.

crypto enrollment peer address 172.19.20.24


D.

crypto isakmp identity address 172.19.20.24


Expert Solution
Questions # 107:

Where are individual sites specified to be block listed in Cisco Umbrella?

Options:

A.

Application settings


B.

Security settings


C.

Destination lists


D.

Content categories


Expert Solution
Questions # 108:

Drag and drop the descriptions from the left onto the encryption algorithms on the right.

Question # 108


Expert Solution
Questions # 109:

What is the intent of a basic SYN flood attack?

Options:

A.

to solicit DNS responses


B.

to exceed the threshold limit of the connection queue


C.

to flush the register stack to re-initiate the buffers


D.

to cause the buffer to overflow


Expert Solution
Questions # 110:

A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?

Options:

A.

Use MAB with profiling


B.

Use MAB with posture assessment.


C.

Use 802.1X with posture assessment.


D.

Use 802.1X with profiling.


Expert Solution
Questions # 111:

What is a function of the Layer 4 Traffic Monitor on a Cisco WSA?

Options:

A.

blocks traffic from URL categories that are known to contain malicious content


B.

decrypts SSL traffic to monitor for malicious content


C.

monitors suspicious traffic across all the TCP/UDP ports


D.

prevents data exfiltration by searching all the network traffic for specified sensitive information


Expert Solution
Questions # 112:

What are two benefits of Flexible NetFlow records? (Choose two)

Options:

A.

They allow the user to configure flow information to perform customized traffic identification


B.

They provide attack prevention by dropping the traffic


C.

They provide accounting and billing enhancements


D.

They converge multiple accounting technologies into one accounting mechanism


E.

They provide monitoring of a wider range of IP packet information from Layer 2 to 4


Expert Solution
Questions # 113:

What is the primary role of the Cisco Email Security Appliance?

Options:

A.

Mail Submission Agent


B.

Mail Transfer Agent


C.

Mail Delivery Agent


D.

Mail User Agent


Expert Solution
Questions # 114:

Which technology reduces data loss by identifying sensitive information stored in public computing

environments?

Options:

A.

Cisco SDA


B.

Cisco Firepower


C.

Cisco HyperFlex


D.

Cisco Cloudlock


Expert Solution
Questions # 115:

What is the most common type of data exfiltration that organizations currently experience?

Options:

A.

HTTPS file upload site


B.

Microsoft Windows network shares


C.

SQL database injections


D.

encrypted SMTP


Expert Solution
Questions # 116:

Which compliance status is shown when a configured posture policy requirement is not met?

Options:

A.

compliant


B.

unknown


C.

authorized


D.

noncompliant


Expert Solution
Questions # 117:

Drag and drop the VPN functions from the left onto the description on the right.Question # 117


Expert Solution
Questions # 118:

Which IETF attribute is supported for the RADIUS CoA feature?

Options:

A.

24 State


B.

30 Calling-Station-ID


C.

42 Acct-Session-ID


D.

81 Message-Authenticator


Expert Solution
Questions # 119:

Why should organizations migrate to a multifactor authentication strategy?

Options:

A.

Multifactor authentication methods of authentication are never compromised


B.

Biometrics authentication leads to the need for multifactor authentication due to its ability to be hacked easily


C.

Multifactor authentication does not require any piece of evidence for an authentication mechanism


D.

Single methods of authentication can be compromised more easily than multifactor authentication


Expert Solution
Questions # 120:

An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?

Options:

A.

File Analysis


B.

IP Reputation Filtering


C.

Intelligent Multi-Scan


D.

Anti-Virus Filtering


Expert Solution
Viewing page 8 out of 15 pages
Viewing questions 106-120 out of questions