option
My Daypo

CISCO SCOR 350-701 TOPIC 1

COMMENTS STADISTICS RECORDS
TAKE THE TEST
Title of test:
CISCO SCOR 350-701 TOPIC 1

Description:
Cisco CCNP Security 305-701 SCOR Topic 1, Exam Pool A

Author:
AVATAR

Creation Date:
06/09/2021

Category:
Computers

Number of questions: 45
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two) Computer Identity Windows Service User Identity Windows Firewall Default Browser.
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two) Accounting Assurance Automation Authentication Encryption.
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious? AMP AnyConnect DynDNS Talos.
Which two activities can be done using Cisco DNA Center? (Choose two) DHCP Design Accounting DNS Provision.
Which two mechanisms are used to control phishing attacks? (Choose two) Enable browser alerts for fraudulent websites Define security group memberships Revoke expired CRL of the websites Use antispyware software Implement email filtering techniques.
Which two descriptions of AES encryption are true? (Choose two) AES is less secure than 3DES AES is more secure than 3DES AES can use a 168-bit key for encryption AES can use a 256-bit key for encryption AES encrypts and decrypts a key three times in sequence.
What is a characteristic of traffic Storm Control behavior? Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval Traffic storm control cannot determine if the packet is unicast or broadcast Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true? The authentication request contains only a password The authentication request contains only a username The authentication and authorization requests are grouped in a single packet There are separate authentication and authorization request packets.
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options? It decrypts HTTPS application traffic for unauthenticated users It alerts users when the WSA decrypts their traffic It decrypts HTTPS application traffic for authenticated users It provides enhanced HTTPS application detection for AsyncOS.
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries? DNS tunneling DNSCrypt DNS security DNSSEC.
Which VPN technology can support a multivendor environment and secure traffic between sites? SSL VPN GET VPN FlexVPN DMVPN.
Which command enables 802.1X globally on a Cisco switch? dot1x system-auth-control dot1x pae authenticator authentication port-control auto aaa new-model.
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two) Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing access on the network Set up a profiling policy in Cisco Identity Service Engine to check and endpoint patch level before allowing access on the network Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met before allowing access on the network Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities patched in a timely fashion.
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform? Certificate Trust List Endpoint Trust List Enterprise Proxy Service Secured Collaboration Proxy.
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command? Authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX Authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX Authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX Secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX.
When wired 802.1X authentication is implemented, which two components are required? (Choose two) Authentication Server: Cisco Identity Service Engine Supplicant: Cisco AnyConnect ISE Posture Module Authenticator: Cisco Catalyst Switch Authenticator: Cisco Identity Services Engine Authentication Server: Cisco Prime Infrastructure.
What is a characteristic of Dynamic ARP Inspection? DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted DAI associates a trust state with each switch DAI intercepts all ARP requests and responses on trusted ports only.
Which API is used for Content Security? NX-OS API IOS XR API OpenVuln API AsyncOS API.
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true? To view bandwidth usage for NetFlow records, the QoS feature must be enabled A sysopt command can be used to enable NSEL on a specific interface NSEL can be used without a collector configured A flow-export event type must be defined under a policy.
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity? DMVPN FlexVPN IPsec DVTI GET VPN.
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity? SNMP SMTP Syslog Model-Driven Telemetry.
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System? Security Intelligence Impact Flags Health Monitoreing URL Filtering.
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic? IP Blacklist Center File Reputation Center AMP Reputation Center IP and Domain Reputation Center.
Which algorithm provides encryption and authentication for data plane communication? AES-GCM SHA-96 AES-256 SHA-384.
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal? Port Bounce CoA Terminate CoA Reauth CoA Session Query.
Which two kinds of attacks are prevented by multifactor authentication? (Choose two) Phishing Brute Force man-in-the-middle DDOS Tear Drop.
Which statement about IOS Zone-Based Firewalls is true? An unassigned interface can communicate with assigned interfaces Only one interface can be assigned to a zone An interface can be assigned to multiple zones An interface can be assigned only to one zone.
Which two behavioral patterns characterize a ping of death attack? (Choose two) The attack is fragmented into groups of 16 octets before transmission The attack is fragmented into groups of 8 octets before transmission Short synchronized bursts of traffic are used to disrupt TCP connections Malformed packets are used to crash systems Publicly accessible DNS servers are typically used to execute the attack.
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses? SAT BAT HAT RAT.
Which two preventive measures are used to control cross-site scripting? (Choose two) Enable client-side scripts on a per-domain basis Incorporate contextual output encoding/escaping Disable cookie inspection in the HTML inspection engine Run untrusted HTML input through an HTML sanitization engine SameSite cookie attribute should not be used.
Which deployment model is the most secure when considering risks to cloud adoption? Public Cloud Hybrid Cloud Community Cloud Private Cloud.
How is ICMP used an exfiltration technique? By flooding the destination host with unreachable packets By sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address By encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host By overwhelming a targeted host with ICMP echo-request packets.
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are allowed on the network? Cisco Identity Services Engine and AnyConnect Posture module Cisco Stealthwatch and Cisco Identity Services Engine integration Cisco ASA firewall with Dynamic Access Policies configured Cisco Identity Services Engine with PxGrid services enabled.
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two) RADIUS TACACS+ DHCP sFlow SMTP.
Which ASA deployment mode can provide separation of management on a shared appliance? DMZ multiple zone mode Transparent firewall mode Multiple context mode Routed mode.
In a PaaS model, which layer is the tenant responsible for maintaining and patching? hypervisor virtual machine network application.
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements? Cisco Prime Infrastructure Cisco Identity Services Engine Cisco Stealthwatch Cisco AMP for Endpoints.
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic? File Analysis SafeSearch SSL Decryption Destination Lists.
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two) Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device The IPsec configuration that is set up on the active device must be duplicated on the standby device Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Which two key and block sizes are valid for AES? (Choose two) 64-bit block size, 112-bit key length 64-bit block size, 168-bit key length 128-bit block size, 192-bit key length 128-bit block size, 256-bit key length 192-bit block size, 256-bit key length.
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure? PaaS XaaS IaaS SaaS.
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP? transparent redirection forward proxy gateway.
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed? smurf distributed denial of service cross-site scripting rootkit exploit.
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging? It tracks flow-create, flow-teardown, and flow-denied events It provides stateless IP flow tracking that exports all records of a specific flow It tracks the flow continuously and provides updates every 10 seconds Its events match all traffic classes in parallel.
Which SNMPv3 configuration must be used to support the strongest security possible? asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy.
Report abuse Terms of use
HOME
CREATE TEST
COMMENTS
STADISTICS
RECORDS
Author's Tests