Pass the Cisco CCNP Security 350-701 Questions and answers with CertsForce

Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions
Questions # 121:

An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?

Options:

A.

transport udp 2055


B.

match ipv4 ttl


C.

cache timeout active 60


D.

destination 1.1.1.1


Expert Solution
Questions # 122:

What are two rootkit types? (Choose two)

Options:

A.

registry


B.

virtual


C.

bootloader


D.

user mode


E.

buffer mode


Expert Solution
Questions # 123:

What are two features of NetFlow flow monitoring? (Choose two)

Options:

A.

Can track ingress and egress information


B.

Include the flow record and the flow importer


C.

Copies all ingress flow information to an interface


D.

Does not required packet sampling on interfaces


E.

Can be used to track multicast, MPLS, or bridged traffic


Expert Solution
Questions # 124:

Which file type is supported when performing a bulk upload of destinations into a destination list on Cisco Umbrella?

Options:

A.

TXT


B.

RTF


C.

XLS


D.

CSV


Expert Solution
Questions # 125:

What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

Options:

A.

Telemetry uses a pull mehod, which makes it more reliable than SNMP


B.

Telemetry uses push and pull, which makes it more scalable than SNMP


C.

Telemetry uses push and pull which makes it more secure than SNMP


D.

Telemetry uses a push method which makes it faster than SNMP


Expert Solution
Questions # 126:

What is a difference between a zone-based firewall and a Cisco Adaptive Security Appliance firewall?

Options:

A.

Zone-based firewalls provide static routing based on interfaces, and Cisco Adaptive Security Appliance firewalls provide dynamic routing.


B.

Zone-based firewalls support virtual tunnel interfaces across different locations, and Cisco Adaptive Security Appliance firewalls support DMVPN.


C.

Zone-based firewalls have a default allow-all policy between interfaces in the same zone, and Cisco Adaptive Security Appliance firewalls have a deny-all policy.


D.

Zone-based firewalls are used in large deployments with multiple areas, and Cisco Adaptive Security Appliance firewalls are used in small deployments.


Expert Solution
Questions # 127:

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Options:

A.

AMP


B.

AnyConnect


C.

DynDNS


D.

Talos


Expert Solution
Questions # 128:

Which baseline form of telemetry is recommended for network infrastructure devices?

Options:

A.

SDNS


B.

NetFlow


C.

passive taps


D.

SNMP


Expert Solution
Questions # 129:

Which standard is used to automate exchanging cyber threat information?

Options:

A.

TAXII


B.

MITRE


C.

IoC


D.

STIX


Expert Solution
Questions # 130:

Which Dos attack uses fragmented packets to crash a target machine?

Options:

A.

smurf


B.

MITM


C.

teardrop


D.

LAND


Expert Solution
Questions # 131:

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

Options:

A.

server farm


B.

perimeter


C.

core


D.

East-West gateways


Expert Solution
Questions # 132:

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from

Cisco and other vendors to share data and interoperate with each other?

Options:

A.

Advanced Malware Protection


B.

Platform Exchange Grid


C.

Multifactor Platform Integration


D.

Firepower Threat Defense


Expert Solution
Questions # 133:

Email security has become a high priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which action will the system perform to disable any links in messages that match the filter?

Options:

A.

Defang


B.

Quarantine


C.

FilterAction


D.

ScreenAction


Expert Solution
Questions # 134:

What is a difference between DMVPN and sVTI?

Options:

A.

DMVPN supports tunnel encryption, whereas sVTI does not.


B.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.


C.

DMVPN supports static tunnel establishment, whereas sVTI does not.


D.

DMVPN provides interoperability with other vendors, whereas sVTI does not.


Expert Solution
Questions # 135:

Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?

Options:

A.

SIG Advantage


B.

DNS Security Essentials


C.

SIG Essentials


D.

DNS Security Advantage


Expert Solution
Viewing page 9 out of 15 pages
Viewing questions 121-135 out of questions