Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions
Questions # 121:

A user has a device in the network that is receiving too many connection requests from multiple machines.

Which type of attack is the device undergoing?

Options:

A.

phishing


B.

slowloris


C.

pharming


D.

SYN flood


Expert Solution
Questions # 122:

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is

deleted from an identity group?

Options:

A.

posture assessment


B.

CoA


C.

external identity source


D.

SNMP probe


Expert Solution
Questions # 123:

How many interfaces per bridge group does an ASA bridge group deployment support?

Options:

A.

up to 2


B.

up to 4


C.

up to 8


D.

up to 16


Expert Solution
Questions # 124:

An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly

identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?

Options:

A.

Configure incoming content filters


B.

Use Bounce Verification


C.

Configure Directory Harvest Attack Prevention


D.

Bypass LDAP access queries in the recipient access table


Expert Solution
Questions # 125:

Which option is the main function of Cisco Firepower impact flags?

Options:

A.

They alert administrators when critical events occur.


B.

They highlight known and suspected malicious IP addresses in reports.


C.

They correlate data about intrusions and vulnerability.


D.

They identify data that the ASA sends to the Firepower module.


Expert Solution
Questions # 126:

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)

Options:

A.

The Cisco WSA responds with its own IP address only if it is running in explicit mode.


B.

The Cisco WSA is configured in a web browser only if it is running in transparent mode.


C.

The Cisco WSA responds with its own IP address only if it is running in transparent mode.


D.

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.


E.

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.


Expert Solution
Questions # 127:

Which Cisco Firewall solution requires zone definition?

Options:

A.

CBAC


B.

Cisco AMP


C.

ZBFW


D.

Cisco ASA


Expert Solution
Questions # 128:

Which VPN provides scalability for organizations with many remote sites?

Options:

A.

DMVPN


B.

site-to-site iPsec


C.

SSL VPN


D.

GRE over IPsec


Expert Solution
Questions # 129:

A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?

Options:

A.

Cisco NGFW


B.

Cisco AnyConnect


C.

Cisco AMP for Endpoints


D.

Cisco Duo


Expert Solution
Questions # 130:

What is a feature of NetFlow Secure Event Logging?

Options:

A.

It exports only records that indicate significant events in a flow.


B.

It filters NSEL events based on the traffic and event type through RSVP.


C.

It delivers data records to NSEL collectors through NetFlow over TCP only.


D.

It supports v5 and v8 templates.


Expert Solution
Questions # 131:

What is a benefit of using a multifactor authentication strategy?

Options:

A.

It provides visibility into devices to establish device trust.


B.

It provides secure remote access for applications.


C.

It provides an easy, single sign-on experience against multiple applications


D.

lt protects data by enabling the use of a second validation of identity.


Expert Solution
Questions # 132:

What are two characteristics of Cisco DNA Center APIs? (Choose two)

Options:

A.

Postman is required to utilize Cisco DNA Center API calls.


B.

They do not support Python scripts.


C.

They are Cisco proprietary.


D.

They quickly provision new devices.


E.

They view the overall health of the network


Expert Solution
Questions # 133:

An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users.

Options:

A.

Upload the organization root CA to the Umbrella admin portal


B.

Modify the user's browser settings to suppress errors from Umbrella.


C.

Restrict access to only websites with trusted third-party signed certificates.


D.

Import the Umbrella root CA into the trusted root store on the user's device.


Expert Solution
Questions # 134:

A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.

They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?

Options:

A.

DMVPN because it supports IKEv2 and FlexVPN does not


B.

FlexVPN because it supports IKEv2 and DMVPN does not


C.

FlexVPN because it uses multiple SAs and DMVPN does not


D.

DMVPN because it uses multiple SAs and FlexVPN does not


Expert Solution
Questions # 135:

How does DNS Tunneling exfiltrate data?

Options:

A.

An attacker registers a domain that a client connects to based on DNS records and sends malware throughthat connection.


B.

An attacker opens a reverse DNS shell to get into the client’s system and install malware on it.


C.

An attacker uses a non-standard DNS port to gain access to the organization’s DNS servers in order topoison the resolutions.


D.

An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a maliciousdomain.


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions