Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco Secure Email Gateway?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
A network engineer is configuring a Cisco Catalyst switch. The network engineer must prevent traffic on the network from being interrupted by broadcast packets flooding the network using a predefined threshold. What must be configured on the switch?
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention
System? (Choose two)
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine
certificates. Which configuration item must be modified to allow this?
Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system’s applications. Which
vulnerability allows the attacker to see the passwords being transmitted in clear text?
A customer has various external HTTP resources available including Intranet Extranet and Internet, with a
proxy configuration running in explicit mode. Which method allows the client desktop browsers to be configured
to select when to connect direct or when to use the proxy?
An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?
Which Cisco ISE feature helps to detect missing patches and helps with remediation?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.
Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?
Refer to the exhibit.
What will occur when this device tries to connect to the port?
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring an inline
posture node?
What is the recommendation in a zero-trust model before granting access to corporate applications and
resources?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the
ASA be added on the Cisco UC Manager platform?
Why is it important for the organization to have an endpoint patching strategy?
An organization wants to secure data in a cloud environment. Its security model requires that all users be
authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Which posture assessment requirement provides options to the client for remediation and requires the
remediation within a certain timeframe?
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to
network resources?
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)
A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
Which command is used to log all events to a destination colector 209.165.201.107?
Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network?
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
Which two methods are available in Cisco Secure Web Appliance to process client requests when configured in Transparent mode? (Choose two.)
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)
An engineer must enable Outbreak Filters globally on an AsyncOS for Cisco Secure Email Gateway to protect the network from large-scale malware attacks. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process
activity on an endpoint?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?
An organization has a Cisco ESA set up with policies and would like to customize the action assigned for
violations. The organization wants a copy of the message to be delivered with a message added to flag it as a
DLP violation. Which actions must be performed in order to provide this capability?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Refer to the exhibit.
What is the function of the Python script code snippet for the Cisco ASA REST API?
Refer to the exhibit.
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the switch
interface in order to provide the user with network connectivity?
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the
command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?
Which two preventive measures are used to control cross-site scripting? (Choose two)
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?
Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?
What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?
Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
A web hosting company must upgrade its older, unsupported on-premises servers. The company wants a cloud solution in which the cloud provider is responsible for:
Server patching
Application maintenance
Data center security
Disaster recovery
Which type of cloud meets the requirements?
An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?
Refer to the exhibit. An engineer must configure a new Cisco ISE backend server as a RADIUS server to provide AAA for all access requests from the client to the ISE-Frontend server.
Which Cisco ISE configuration must be used?
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address https://
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?
A customer has various external HTTP resources available including Intranet. Extranet, and Internet, with a proxy configuration running in explicit mode Which method allows the client desktop browsers to be configured to select when to connect direct or when to use the proxy?
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256
cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging” category. Which reputation score should be selected to accomplish this goal?
Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
II
An engineer musí set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration Which switch port MAC address security setting must be used?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized
solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over
to Cisco FTDs. Which solution meets the needs of the organization?
Drag and drop the posture assessment flow actions from the left into a sequence on the right.
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is
authenticated?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
Which type of API is being used when a controller within a software-defined network architecture dynamically
makes configuration changes on switches within the network?
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.
The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from
Cisco and other vendors to share data and interoperate with each other?
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Which baseline form of telemetry is recommended for network infrastructure devices?
A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?
An engineer must implement a file transfer solution between a company's data center and branches. The company has numerous servers hosted in a hybrid cloud implementation. The file transfer protocol must support authentication, protect the data against unauthorized access, and ensure that users cannot list directories or remove files remotely. Which protocol must be used?
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)
An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
A network administrator is configuring a role in an access control policy to block certain URLs and selects the "Chat and instant Messaging" category. which reputation score should be selected to accomplish
this goal?
Refer to the exhibit. What function does the API key perform while working with https://api.amp.cisco.com/v1/computers?
Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
Refer to the exhibit.
A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced What is the cause of this issue?
What is the term for the concept of limiting communication between applications or containers on the same node?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
Which metric is used by the monitoring agent to collect and output packet loss and jitter information?
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak
control method is used to accomplish this task?
A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
Which technology provides a combination of endpoint protection endpoint detection, and response?
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?
Which attack type attempts to shut down a machine or network so that users are not able to access it?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which
probe must be enabled for this type of profiling to work?
Refer to the exhibit.
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?
Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the
endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
Refer to the exhibit.
What does the API do when connected to a Cisco security appliance?
Which compliance status is shown when a configured posture policy requirement is not met?
Refer to the exhibit.
What is the result of this Python script of the Cisco DNA Center API?
An engineer must deploy a Cisco Secure Web Appliance. Antimalware scanning must use the Outbreak Heuristics antimalware category on files identified as malware before performing any other processes. What must be configured on the Secure Web Appliance to meet the requirements?
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the
configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?
CCNP Security | 350-701 Written Exam | 350-701 Questions Answers | 350-701 Test Prep | 350-701 CCNP Security Actual Questions | Implementing and Operating Cisco Security Core Technologies (SCOR) Exam Questions PDF | 350-701 Online Exam | 350-701 Practice Test | 350-701 PDF | 350-701 CCNP Security Dumps | 350-701 Test Questions | 350-701 Study Material | 350-701 Exam Preparation | 350-701 Valid Dumps | 350-701 Real Questions | 350-701 CCNP Security Practice Test | CCNP Security 350-701 Dumps | Implementing and Operating Cisco Security Core Technologies (SCOR) Exam Questions