Weekend Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Implementing and Operating Cisco Security Core Technologies (SCOR) Question and Answers

Implementing and Operating Cisco Security Core Technologies (SCOR)

Last Update Sep 24, 2023
Total Questions : 609

We are offering FREE 350-701 Cisco exam questions. All you do is to just go and sign up. Give your details, prepare 350-701 free exam questions and then go for complete pool of Implementing and Operating Cisco Security Core Technologies (SCOR) test questions that will help you more.

350-701 pdf

350-701 PDF

$38.5  $109.99
350-701 Engine

350-701 Testing Engine

$45.5  $129.99
350-701 PDF + Engine

350-701 PDF + Testing Engine

$59.5  $169.99
Questions 1

Which Cisco security solution stops exfiltration using HTTPS?

Options:

A.  

Cisco FTD

B.  

Cisco AnyConnect

C.  

Cisco CTA

D.  

Cisco ASA

Discussion 0
Questions 2

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Options:

A.  

AMP

B.  

AnyConnect

C.  

DynDNS

D.  

Talos

Discussion 0
Questions 3

An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the

configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?

Options:

A.  

The engineer is attempting to upload a hash created using MD5 instead of SHA-256

B.  

The file being uploaded is incompatible with simple detections and must use advanced detections

C.  

The hash being uploaded is part of a set in an incorrect format

D.  

The engineer is attempting to upload a file instead of a hash

Discussion 0
Questions 4

Refer to the exhibit.

What are two indications of the Cisco Firepower Services Module configuration?

(Choose two.)

Options:

A.  

The module is operating in IDS mode.

B.  

Traffic is blocked if the module fails.

C.  

The module fails to receive redirected traffic.

D.  

The module is operating in IPS mode.

E.  

Traffic continues to flow if the module fails.

Discussion 0
Questions 5

An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?

Options:

A.  

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

B.  

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

C.  

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

D.  

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

Discussion 0
Questions 6

What is a function of the Layer 4 Traffic Monitor on a Cisco WSA?

Options:

A.  

blocks traffic from URL categories that are known to contain malicious content

B.  

decrypts SSL traffic to monitor for malicious content

C.  

monitors suspicious traffic across all the TCP/UDP ports

D.  

prevents data exfiltration by searching all the network traffic for specified sensitive information

Discussion 0
Questions 7

Which two capabilities does an MDM provide? (Choose two.)

Options:

A.  

delivery of network malware reports to an inbox in a schedule

B.  

unified management of mobile devices, Macs, and PCs from a centralized dashboard

C.  

enforcement of device security policies from a centralized dashboard

D.  

manual identification and classification of client devices

E.  

unified management of Android and Apple devices from a centralized dashboard

Discussion 0
Questions 8

What are two benefits of using an MDM solution? (Choose two.)

Options:

A.  

grants administrators a way to remotely wipe a lost or stolen device

B.  

provides simple and streamlined login experience for multiple applications and users

C.  

native integration that helps secure applications across multiple cloud platforms or on-premises environments

D.  

encrypts data that is stored on endpoints

E.  

allows for centralized management of endpoint device applications and configurations

Discussion 0
Questions 9

A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN

and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco

security appliance meets these requirements?

Options:

A.  

Cisco Cloud Orchestrator

B.  

Cisco ASAV

C.  

Cisco WSAV

D.  

Cisco Stealthwatch Cloud

Discussion 0
Questions 10

Why is it important to have a patching strategy for endpoints?

Options:

A.  

to take advantage of new features released with patches

B.  

so that functionality is increased on a faster scale when it is used

C.  

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

D.  

so that patching strategies can assist with disabling nonsecure protocols in applications

Discussion 0
Questions 11

Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other

interoperable security platforms?

Options:

A.  

IEEE

B.  

IETF

C.  

NIST

D.  

ANSI

Discussion 0
Questions 12

II

An engineer musí set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration Which switch port MAC address security setting must be used?

Options:

A.  

sticky

B.  

static

C.  

aging

D.  

maximum

Discussion 0
Questions 13

Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?

Options:

A.  

Cisco Identity Services Engine (ISE)

B.  

Cisco Enterprise Security Appliance (ESA)

C.  

Cisco Web Security Appliance (WSA)

D.  

Cisco Advanced Stealthwatch Appliance (ASA)

Discussion 0
Questions 14

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?

Options:

A.  

Set the sftunnel to go through the Cisco FTD

B.  

Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTD devices

C.  

Set the sftunnel port to 8305.

D.  

Manually change the management port on Cisco FMC and all managed Cisco FTD devices

Discussion 0
Questions 15

Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?

Options:

A.  

AFL

B.  

Fuzzing Framework

C.  

Radamsa

D.  

OWASP

Discussion 0
Questions 16

What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?

Options:

A.  

CD

B.  

EP

C.  

CI

D.  

QA

Discussion 0
Questions 17

An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?

Options:

A.  

EAPOL

B.  

SSH

C.  

RADIUS

D.  

TACACS+

Discussion 0
Questions 18

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?

Options:

A.  

The administrator must upload the file instead of the hash for Cisco AMP to use.

B.  

The MD5 hash uploaded to the simple detection policy is in the incorrect format

C.  

The APK must be uploaded for the application that the detection is intended

D.  

Detections for MD5 signatures must be configured in the advanced custom detection policies

Discussion 0
Questions 19

Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)

Options:

A.  

put

B.  

options

C.  

get

D.  

push

E.  

connect

Discussion 0
Questions 20

Which two descriptions of AES encryption are true? (Choose two)

Options:

A.  

AES is less secure than 3DES.

B.  

AES is more secure than 3DES.

C.  

AES can use a 168-bit key for encryption.

D.  

AES can use a 256-bit key for encryption.

E.  

AES encrypts and decrypts a key three times in sequence.

Discussion 0
Questions 21

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

Options:

A.  

It decrypts HTTPS application traffic for unauthenticated users.

B.  

It alerts users when the WSA decrypts their traffic.

C.  

It decrypts HTTPS application traffic for authenticated users.

D.  

It provides enhanced HTTPS application detection for AsyncOS.

Discussion 0
Questions 22

On which part of the IT environment does DevSecOps focus?

Options:

A.  

application development

B.  

wireless network

C.  

data center

D.  

perimeter network

Discussion 0
Questions 23

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

(Choose two)

Options:

A.  

configure Active Directory Group Policies to push proxy settings

B.  

configure policy-based routing on the network infrastructure

C.  

reference a Proxy Auto Config file

D.  

configure the proxy IP address in the web-browser settings

E.  

use Web Cache Communication Protocol

Discussion 0
Questions 24

What is the function of Cisco Cloudlock for data security?

Options:

A.  

data loss prevention

B.  

controls malicious cloud apps

C.  

detects anomalies

D.  

user and entity behavior analytics

Discussion 0
Questions 25

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

Options:

A.  

hypervisor

B.  

virtual machine

C.  

network

D.  

application

Discussion 0
Questions 26

Which two behavioral patterns characterize a ping of death attack? (Choose two)

Options:

A.  

The attack is fragmented into groups of 16 octets before transmission.

B.  

The attack is fragmented into groups of 8 octets before transmission.

C.  

Short synchronized bursts of traffic are used to disrupt TCP connections.

D.  

Malformed packets are used to crash systems.

E.  

Publicly accessible DNS servers are typically used to execute the attack.

Discussion 0
Questions 27

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

Options:

A.  

sniffing the packets between the two hosts

B.  

sending continuous pings

C.  

overflowing the buffer’s memory

D.  

inserting malicious commands into the database

Discussion 0
Questions 28

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention

System?

Options:

A.  

Security Intelligence

B.  

Impact Flags

C.  

Health Monitoring

D.  

URL Filtering

Discussion 0
Questions 29

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

Options:

A.  

authentication server: Cisco Identity Service Engine

B.  

supplicant: Cisco AnyConnect ISE Posture module

C.  

authenticator: Cisco Catalyst switch

D.  

authenticator: Cisco Identity Services Engine

E.  

authentication server: Cisco Prime Infrastructure

Discussion 0
Questions 30

Which technology must be used to implement secure VPN connectivity among company branches over a

private IP cloud with any-to-any scalable connectivity?

Options:

A.  

DMVPN

B.  

FlexVPN

C.  

IPsec DVTI

D.  

GET VPN

Discussion 0
Questions 31

Which information is required when adding a device to Firepower Management Center?

Options:

A.  

username and password

B.  

encryption method

C.  

device serial number

D.  

registration key

Discussion 0
Questions 32

Which algorithm provides encryption and authentication for data plane communication?

Options:

A.  

AES-GCM

B.  

SHA-96

C.  

AES-256

D.  

SHA-384

Discussion 0
Questions 33

A malicious user gained network access by spoofing printer connections that were authorized using MAB on

four different switch ports at the same time. What two catalyst switch security features will prevent further

violations? (Choose two)

Options:

A.  

DHCP Snooping

B.  

802.1AE MacSec

C.  

Port security

D.  

IP Device track

E.  

Dynamic ARP inspection

F.  

Private VLANs

Discussion 0
Questions 34

Which type of attack is social engineering?

Options:

A.  

trojan

B.  

phishing

C.  

malware

D.  

MITM

Discussion 0
Questions 35

Which VPN technology can support a multivendor environment and secure traffic between sites?

Options:

A.  

SSL VPN

B.  

GET VPN

C.  

FlexVPN

D.  

DMVPN

Discussion 0
Questions 36

Which API is used for Content Security?

Options:

A.  

NX-OS API

B.  

IOS XR API

C.  

OpenVuln API

D.  

AsyncOS API

Discussion 0
Questions 37

Where are individual sites specified to be blacklisted in Cisco Umbrella?

Options:

A.  

application settings

B.  

content categories

C.  

security settings

D.  

destination lists

Discussion 0
Questions 38

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

Options:

A.  

To view bandwidth usage for NetFlow records, the QoS feature must be enabled.

B.  

A sysopt command can be used to enable NSEL on a specific interface.

C.  

NSEL can be used without a collector configured.

D.  

A flow-export event type must be defined under a policy

Discussion 0
Questions 39

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The

company needs to be able to protect sensitive data throughout the full environment. Which tool should be used

to accomplish this goal?

Options:

A.  

Security Manager

B.  

Cloudlock

C.  

Web Security Appliance

D.  

Cisco ISE

Discussion 0
Questions 40

How many interfaces per bridge group does an ASA bridge group deployment support?

Options:

A.  

up to 2

B.  

up to 4

C.  

up to 8

D.  

up to 16

Discussion 0
Questions 41

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?

(Choose two)

Options:

A.  

Sophos engine

B.  

white list

C.  

RAT

D.  

outbreak filters

E.  

DLP

Discussion 0
Questions 42

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a

connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

Options:

A.  

Cisco Firepower

B.  

Cisco Umbrella

C.  

ISE

D.  

AMP

Discussion 0
Questions 43

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Options:

A.  

Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS

B.  

Cisco FTDv with one management interface and two traffic interfaces configured

C.  

Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises

D.  

Cisco FTDv with two management interfaces and one traffic interface configured

E.  

Cisco FTDv configured in routed mode and IPv6 configured

Discussion 0
Questions 44

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

Options:

A.  

asset inventory management

B.  

allowed application management

C.  

Active Directory group policy management

D.  

network device management

E.  

critical device management

Discussion 0
Questions 45

Which SNMPv3 configuration must be used to support the strongest security possible?

Options:

A.  

asa-host(config)#snmp-server group myv3 v3 priv

asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX

asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

B.  

asa-host(config)#snmp-server group myv3 v3 noauth

asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX

asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

C.  

asa-host(config)#snmpserver group myv3 v3 noauth

asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX

asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

D.  

asa-host(config)#snmp-server group myv3 v3 priv

asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX

asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

Discussion 0
Questions 46

Which function is the primary function of Cisco AMP threat Grid?

Options:

A.  

automated email encryption

B.  

applying a real-time URI blacklist

C.  

automated malware analysis

D.  

monitoring network traffic

Discussion 0
Questions 47

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Options:

A.  

TLSv1.2

B.  

TLSv1.1

C.  

BJTLSv1

D.  

DTLSv1

Discussion 0
Questions 48

What is an attribute of the DevSecOps process?

Options:

A.  

mandated security controls and check lists

B.  

security scanning and theoretical vulnerabilities

C.  

development security

D.  

isolated security team

Discussion 0
Questions 49

Refer to the exhibit.

Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

Options:

A.  

No split-tunnel policy is defined on the Firepower Threat Defense appliance.

B.  

The access control policy is not allowing VPN traffic in.

C.  

Site-to-site VPN peers are using different encryption algorithms.

D.  

Site-to-site VPN preshared keys are mismatched.

Discussion 0
Questions 50

What is a benefit of conducting device compliance checks?

Options:

A.  

It indicates what type of operating system is connecting to the network.

B.  

It validates if anti-virus software is installed.

C.  

It scans endpoints to determine if malicious activity is taking place.

D.  

It detects email phishing attacks.

Discussion 0
Questions 51

Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?

Options:

A.  

westbound AP

B.  

southbound API

C.  

northbound API

D.  

eastbound API

Discussion 0
Questions 52

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability

would help an attacker brute force their way into the systems?

Options:

A.  

weak passwords

B.  

lack of input validation

C.  

missing encryption

D.  

lack of file permission

Discussion 0
Questions 53

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen

on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose

two)

Options:

A.  

permit

B.  

trust

C.  

reset

D.  

allow

E.  

monitor

Discussion 0
Questions 54

What are two characteristics of Cisco DNA Center APIs? (Choose two)

Options:

A.  

Postman is required to utilize Cisco DNA Center API calls.

B.  

They do not support Python scripts.

C.  

They are Cisco proprietary.

D.  

They quickly provision new devices.

E.  

They view the overall health of the network

Discussion 0
Questions 55

Which type of algorithm provides the highest level of protection against brute-force attacks?

Options:

A.  

PFS

B.  

HMAC

C.  

MD5

D.  

SHA

Discussion 0
Questions 56

Which Cisco platform ensures that machines that connect to organizational networks have the recommended

antivirus definitions and patches to help prevent an organizational malware outbreak?

Options:

A.  

Cisco WiSM

B.  

Cisco ESA

C.  

Cisco ISE

D.  

Cisco Prime Infrastructure

Discussion 0
Questions 57

An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites

but other sites are not accessible due to an error. Why is the error occurring?

Options:

A.  

Client computers do not have the Cisco Umbrella Root CA certificate installed.

B.  

IP-Layer Enforcement is not configured.

C.  

Client computers do not have an SSL certificate deployed from an internal CA server.

D.  

Intelligent proxy and SSL decryption is disabled in the policy

Discussion 0
Questions 58

Which risk is created when using an Internet browser to access cloud-based service?

Options:

A.  

misconfiguration of infrastructure, which allows unauthorized access

B.  

intermittent connection to the cloud connectors

C.  

vulnerabilities within protocol

D.  

insecure implementation of API

Discussion 0
Questions 59

A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.

How does the switch behave in this situation?

Options:

A.  

It forwards the packet after validation by using the MAC Binding Table.

B.  

It drops the packet after validation by using the IP & MAC Binding Table.

C.  

It forwards the packet without validation.

D.  

It drops the packet without validation.

Discussion 0
Questions 60

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

Options:

A.  

to prevent theft of the endpoints

B.  

because defense-in-depth stops at the network

C.  

to expose the endpoint to more threats

D.  

because human error or insider threats will still exist

Discussion 0
Questions 61

Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain

aware of the ongoing and most prevalent threats?

Options:

A.  

PSIRT

B.  

Talos

C.  

CSIRT

D.  

DEVNET

Discussion 0
Questions 62

Refer to the exhibit.

When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine

certificates. Which configuration item must be modified to allow this?

Options:

A.  

Group Policy

B.  

Method

C.  

SAML Server

D.  

DHCP Servers

Discussion 0
Questions 63

Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.

Options:

Discussion 0
Questions 64

What are two benefits of Flexible NetFlow records? (Choose two)

Options:

A.  

They allow the user to configure flow information to perform customized traffic identification

B.  

They provide attack prevention by dropping the traffic

C.  

They provide accounting and billing enhancements

D.  

They converge multiple accounting technologies into one accounting mechanism

E.  

They provide monitoring of a wider range of IP packet information from Layer 2 to 4

Discussion 0
Questions 65

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

Options:

A.  

SDP

B.  

LDAP

C.  

subordinate CA

D.  

SCP

E.  

HTTP

Discussion 0
Questions 66

A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two)

Options:

A.  

Use outbreak filters from SenderBase

B.  

Enable a message tracking service

C.  

Configure a recipient access table

D.  

Deploy the Cisco ESA in the DMZ

E.  

Scan quarantined emails using AntiVirus signatures

Discussion 0
Questions 67

What are two Trojan malware attacks? (Choose two)

Options:

A.  

Frontdoor

B.  

Rootkit

C.  

Smurf

D.  

Backdoor

E.  

Sync

Discussion 0
Questions 68

A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?

Options:

A.  

Use MAB with profiling

B.  

Use MAB with posture assessment.

C.  

Use 802.1X with posture assessment.

D.  

Use 802.1X with profiling.

Discussion 0
Questions 69

Why is it important to implement MFA inside of an organization?

Options:

A.  

To prevent man-the-middle attacks from being successful.

B.  

To prevent DoS attacks from being successful.

C.  

To prevent brute force attacks from being successful.

D.  

To prevent phishing attacks from being successful.

Discussion 0
Questions 70

Drag and drop the solutions from the left onto the solution's benefits on the right.

Options:

Discussion 0
Questions 71

An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the

organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which

mechanism should the engineer configure to accomplish this goal?

Options:

A.  

mirror port

B.  

Flow

C.  

NetFlow

D.  

VPC flow logs

Discussion 0
Questions 72

What is the difference between Cross-site Scripting and SQL Injection, attacks?

Options:

A.  

Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.

B.  

Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social

engineering attack.

C.  

Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a

database is manipulated.

D.  

Cross-site Scripting is an attack where code is executed from the server side, whereas SQL Injection is an attack where code is executed from the client side.

Discussion 0
Questions 73

An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?

Options:

A.  

Set content settings to High

B.  

Configure the intelligent proxy.

C.  

Use destination block lists.

D.  

Configure application block lists.

Discussion 0
Questions 74

Drag and drop the descriptions from the left onto the encryption algorithms on the right.

Options:

Discussion 0
Questions 75

An organization has a Cisco ESA set up with policies and would like to customize the action assigned for

violations. The organization wants a copy of the message to be delivered with a message added to flag it as a

DLP violation. Which actions must be performed in order to provide this capability?

Options:

A.  

deliver and send copies to other recipients

B.  

quarantine and send a DLP violation notification

C.  

quarantine and alter the subject header with a DLP violation

D.  

deliver and add disclaimer text

Discussion 0
Questions 76

An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and

operate as a cloud-native CASB. Which solution must be used for this implementation?

Options:

A.  

Cisco Cloudlock

B.  

Cisco Cloud Email Security

C.  

Cisco Firepower Next-Generation Firewall

D.  

Cisco Umbrella

Discussion 0
Questions 77

What is the benefit of installing Cisco AMP for Endpoints on a network?

Options:

A.  

It provides operating system patches on the endpoints for security.

B.  

It provides flow-based visibility for the endpoints network connections.

C.  

It enables behavioral analysis to be used for the endpoints.

D.  

It protects endpoint systems through application control and real-time scanning

Discussion 0
Questions 78

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.

Options:

A.  

Create NTLM or Kerberos authentication realm and enable transparent user identification

B.  

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

C.  

Create an LDAP authentication realm and disable transparent user identification.

D.  

Deploy a separate eDirectory server: the client IP address is recorded in this server

Discussion 0
Questions 79

Which Cisco WSA feature supports access control using URL categories?

Options:

A.  

transparent user identification

B.  

SOCKS proxy services

C.  

web usage controls

D.  

user session restrictions

Discussion 0
Questions 80

Which solution stops unauthorized access to the system if a user's password is compromised?

Options:

A.  

VPN

B.  

MFA

C.  

AMP

D.  

SSL

Discussion 0
Questions 81

What limits communication between applications or containers on the same node?

Options:

A.  

microsegmentation

B.  

container orchestration

C.  

microservicing

D.  

Software-Defined Access

Discussion 0
Questions 82

Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?

Options:

A.  

Link Aggregation

B.  

Reverse ARP

C.  

private VLANs

D.  

Dynamic ARP Inspection

Discussion 0
Questions 83

When a next-generation endpoint security solution is selected for a company, what are two key

deliverables that help justify the implementation? (Choose two.)

Options:

A.  

signature-based endpoint protection on company endpoints

B.  

macro-based protection to keep connected endpoints safe

C.  

continuous monitoring of all files that are located on connected endpoints

D.  

email integration to protect endpoints from malicious content that is located in email

E.  

real-time feeds from global threat intelligence centers

Discussion 0
Questions 84

Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?

Options:

A.  

Only URLs for botnets with reputation scores of 1-3 will be blocked.

B.  

Only URLs for botnets with a reputation score of 3 will be blocked.

C.  

Only URLs for botnets with reputation scores of 3-5 will be blocked.

D.  

Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked.

Discussion 0
Questions 85

Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the

network?

Options:

A.  

Posture

B.  

Profiling

C.  

pxGrid

D.  

MAB

Discussion 0
Questions 86

What is an advantage of the Cisco Umbrella roaming client?

Options:

A.  

the ability to see all traffic without requiring TLS decryption

B.  

visibility into IP-based threats by tunneling suspicious IP connections

C.  

the ability to dynamically categorize traffic to previously uncategorized sites

D.  

visibility into traffic that is destined to sites within the office environment

Discussion 0
Questions 87

What must be enabled to secure SaaS-based applications?

Options:

A.  

modular policy framework

B.  

two-factor authentication

C.  

application security gateway

D.  

end-to-end encryption

Discussion 0
Questions 88

Which solution supports high availability in routed or transparent mode as well as in northbound and

southbound deployments?

Options:

A.  

Cisco FTD with Cisco ASDM

B.  

Cisco FTD with Cisco FMC

C.  

Cisco Firepower NGFW physical appliance with Cisco. FMC

D.  

Cisco Firepower NGFW Virtual appliance with Cisco FMC

Discussion 0
Questions 89

Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?

Options:

A.  

deployment

B.  

consumption

C.  

authoring

D.  

sharing

Discussion 0