CCNP Scor Final
CCNP Scor Final
Number: 350-701
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
350-701
Version 1.0
Exam A
QUESTION 1
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion
Prevention System?
A. security intelligence
B. impact flags
C. health monitoring
D. URL filtering
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
A. correlation
B. intrusion
C. access control
D. network discovery
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Refer to the exhibit. Which command was used to generate this output and to show which ports are
authenticating with dot1x or mab?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a
recipient address.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which two capabilities does TAXII support? (Choose two.)
A. exchange
B. pull messaging
C. binding
D. correlation
E. mitigating
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which policy represents a shared set of features or parameters that define the aspects of a managed device
that are likely to be similar to other managed devices in a deployment?
A. group policy
B. access control policy
C. device management policy
D. platform service policy
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-
guide-v622/platform_settings_policies_for_managed_devices.pdf
QUESTION 9
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/
administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
QUESTION 10
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
A. data exfiltration
B. command and control communication
C. intelligent proxy
D. snort
E. URL categorization
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-
glance-c45-736555.pdf
QUESTION 11
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the
IPsec configuration is copied automatically.
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same
type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device;
the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the
same type of device.
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-
availability-15-mt-book/sec-state-fail-ipsec.html
QUESTION 13
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are
blocked when they host malware, command and control, phishing, and more threats?
A. Application Control
B. Security Category Blocking
C. Content Category Blocking
D. File Analysis
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://support.umbrella.com/hc/en-us/articles/115004563666-Understanding-Security-Categories
QUESTION 14
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?
(Choose two.)
A. TACACS+
B. central web auth
C. single sign-on
D. multiple factor auth
E. local web auth
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/
b_ise_admin_guide_22_chapter_01110.html
QUESTION 15
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://tools.cisco.com/security/center/resources/sql_injection
QUESTION 16
Which deployment model is the most secure when considering risks to cloud adoption?
A. public cloud
B. hybrid cloud
C. community cloud
D. private cloud
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
A. It allows the administrator to quarantine malicious files so that the application can function, just not
maliciously.
B. It discovers and controls cloud apps that are connected to a company’s corporate environment.
C. It deletes any application that does not belong in the network.
D. It sends the application information to an administrator to act on.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/security/cloudlock/index.html#~features
QUESTION 18
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
A. DNS tunneling
B. DNSCrypt
C. DNS security
D. DNSSEC
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling
QUESTION 19
Which algorithm provides encryption and authentication for data plane communication?
A. AES-GCM
B. SHA-96
C. AES-256
D. SHA-384
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which technology reduces data loss by identifying sensitive information stored in public computing
environments?
A. Cisco SDA
B. Cisco Firepower
C. Cisco HyperFlex
D. Cisco Cloudlock
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock-cloud-
data-security-datasheet.pdf
QUESTION 21
Refer to the exhibit. What does the number 15 represent in this configuration?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view
of activity?
A. SNMP
B. SMTP
C. syslog
D. model-driven telemetry
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
QUESTION 23
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-cr-
c4.html#wp6039879000
QUESTION 24
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services
Engine? (Choose two.)
A. RADIUS
B. TACACS+
C. DHCP
D. sFlow
E. SMTP
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
QUESTION 25
DRAG DROP
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the
correct definitions on the right.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-
guide-v64/detecting_specific_threats.html
QUESTION 26
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
A. Nexus
B. Stealthwatch
C. Firepower
D. Tetration
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products
QUESTION 27
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)
A. biometric factor
B. time factor
C. confidentiality factor
D. knowledge factor
E. encryption factor
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
DRAG DROP
Drag and drop the capabilities from the left onto the correct technologies on the right.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which two key and block sizes are valid for AES? (Choose two.)
Correct Answer: CD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
QUESTION 30
How does Cisco Umbrella archive logs to an enterprise-owned storage?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
QUESTION 31
In which cloud services model is the tenant responsible for virtual machine OS patching?
A. IaaS
B. UCaaS
C. PaaS
D. SaaS
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paas-
how-microsoft-office-365-azure-fit-in-021672.php
QUESTION 32
Which two descriptions of AES encryption are true? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html
QUESTION 33
Which technology is used to improve web traffic performance by proxy caching?
A. WSA
B. Firepower
C. FireSIGHT
D. ASA
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
B. A sysopt command can be used to enable NSEL on a specific interface.
C. NSEL can be used without a collector configured.
D. A flow-export event type must be defined under a policy.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Which benefit does endpoint security provide the overall security posture of an organization?
A. It streamlines the incident response process to automatically perform digital forensics on the endpoint.
B. It allows the organization to mitigate web-based attacks as long as the user is active in the domain.
C. It allows the organization to detect and respond to threats at the edge of the network.
D. It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed
through the Cisco Umbrella network.
A. Ensure that the client computers are pointing to the on-premises DNS servers.
B. Enable the Intelligent Proxy to validate that traffic is being routed correctly.
C. Add the public IP address that the client computers are behind to a Core Identity.
D. Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
A. STIX
B. XMPP
C. pxGrid
D. SMTP
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/
b_ScanCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf
QUESTION 38
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
A. blocked ports
B. simple custom detections
C. command and control
D. allowed applications
E. URL
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2
QUESTION 39
Which command enables 802.1X globally on a Cisco switch?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. authentication port-control auto
D. aaa new-model
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/routers/nfvis/switch_command/b-nfvis-switch-command-
reference/802_1x_commands.html
QUESTION 40
What is the function of Cisco Cloudlock for data security?
A. data loss prevention
B. controls malicious cloud apps
C. detects anomalies
D. user and entity behavior analytics
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://umbrella.cisco.com/products/casb
QUESTION 41
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
A. computer identity
B. Windows service
C. user identity
D. Windows firewall
E. default browser
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
What is a characteristic of Dynamic ARP Inspection?
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP
snooping binding database.
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are
untrusted.
C. DAI associates a trust state with each switch.
D. DAI intercepts all ARP requests and responses on trusted ports only.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the
deployment?
A. NGFW
B. AMP
C. WSA
D. ESA
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
DRAG DROP
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. application settings
B. content categories
C. security settings
D. destination lists
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Which statement about IOS zone-based firewalls is true?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-guide.html
QUESTION 47
Which two activities can be done using Cisco DNA Center? (Choose two.)
A. DHCP
B. design
C. accounting
D. DNS
E. provision
Correct Answer: BE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-
management/dna-center/1-2-1/user_guide/b_dnac_ug_1_2_1/b_dnac_ug_1_2_chapter_00.pdf
QUESTION 48
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
A. RSA SecureID
B. Internal Database
C. Active Directory
D. LDAP
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
How is ICMP used as an exfiltration technique?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false
webpage.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The
engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use
802.1X, MAB, or WebAuth.
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.lookingpoint.com/blog/ise-series-802.1x
QUESTION 53
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/special/unified-communications/guide/unified-
comm/unified-comm-tlsproxy.html
QUESTION 54
Which API is used for Content Security?
A. NX-OS API
B. IOS XR API
C. OpenVuln API
D. AsyncOS API
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma12-0/api/
b_SMA_API_12/test_chapter_01.html
QUESTION 55
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/Ping_of_death
QUESTION 56
Which two mechanisms are used to control phishing attacks? (Choose two.)
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 57
Which VPN technology can support a multivendor environment and secure traffic between sites?
A. SSL VPN
B. GET VPN
C. FlexVPN
D. DMVPN
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/routers/asr-1000-series-aggregation-services-
routers/data_sheet_c78-704277.html
QUESTION 58
Which SNMPv3 configuration must be used to support the strongest security possible?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-
aws.html
QUESTION 60
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
A. transparent
B. redirection
C. forward
D. proxy gateway
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-
00.html
QUESTION 61
An MDM provides which two advantages to an organization with regards to device management? (Choose
two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 62
Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?
A. IP Blacklist Center
B. File Reputation Center
C. AMP Reputation Center
D. IP and Domain Reputation Center
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 63
Under which two circumstances is a CoA issued? (Choose two.)
A. A new authentication rule was added to the policy on the Policy Service node.
B. An endpoint is deleted on the Identity Service Engine server.
C. A new Identity Source Sequence is created and referenced in the authentication policy.
D. An endpoint is profiled for the first time.
E. A new Identity Service Engine server is added to the deployment with the Administration persona.
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
QUESTION 64
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize
applications, collect and send network metrics to Cisco Prime and other third-party management tools, and
prioritize application traffic?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two.)
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 66
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch
was not installed, which left the endpoint vulnerable to WannaCry ransomware.
Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
A. Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing
access on the network.
B. Set up a profiling policy in Cisco Identity Services Engine to check an endpoint patch level before allowing
access on the network.
C. Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met
before allowing access on the network.
D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate
throughout the network.
E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities
patched in a timely fashion.
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67
DRAG DROP
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an
EC2 instance in Amazon Web Services.
Correct Answer:
Section: (none)
Explanation
Explanation/Reference:
QUESTION 68
Why would a user choose an on-premises ESA versus the CES solution?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 69
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 70
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
A. AMP
B. AnyConnect
C. DynDNS
D. Talos
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 71
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/
b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
QUESTION 72
What is the primary role of the Cisco Email Security Appliance?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 73
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two.)
A. accounting
B. assurance
C. automation
D. authentication
E. encryption
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/index.html
QUESTION 74
Which cloud service model offers an environment for cloud consumers to develop and deploy applications
without needing to manage or maintain the underlying cloud infrastructure?
A. PaaS
B. XaaS
C. IaaS
D. SaaS
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 76
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two.)
A. Sophos engine
B. white list
C. RAT
D. outbreak filters
E. DLP
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 77
How is Cisco Umbrella configured to log only security events?
A. per policy
B. in the Reporting settings
C. in the Security Settings section
D. per network in the Deployments section
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
QUESTION 78
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and
Response?
A. EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
B. EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.
C. EPP focuses on network security, and EDR focuses on device security.
D. EDR focuses on network security, and EPP focuses on device security.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-
response-edr.html
QUESTION 79
On which part of the IT environment does DevSecOps focus?
A. application development
B. wireless network
C. data center
D. perimeter network
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 80
Which functions of an SDN architecture require southbound APIs to enable communication?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 81
What is a characteristic of traffic storm control behavior?
A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within
the interval.
B. Traffic storm control cannot determine if the packet is unicast or broadcast.
C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.
D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is
unicast or broadcast.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-1E/configuration/guide/storm.html
QUESTION 82
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
A. put
B. options
C. get
D. push
E. connect
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
QUESTION 83
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
A. hypervisor
B. virtual machine
C. network
D. application
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
QUESTION 84
An engineer is configuring AMP for endpoints and wants to block certain files from executing.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 85
Which ASA deployment mode can provide separation of management on a shared appliance?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
A. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B. Cisco FTDv with one management interface and two traffic interfaces configured
C. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D. Cisco FTDv with two management interfaces and one traffic interface configured
E. Cisco FTDv configured in routed mode and IPv6 configured
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-asav/
white-paper-c11-740505.html
QUESTION 87
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats,
which allows the SOC to proactively automate responses to those threats?
A. Cisco Umbrella
B. External Threat Feeds
C. Cisco Threat Grid
D. Cisco Stealthwatch
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 88
What provides visibility and awareness into what is currently occurring on the network?
A. CMX
B. WMI
C. Prime Infrastructure
D. Telemetry
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 89
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B. water holing
C. DDoS
D. buffer overflow
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/Buffer_overflow
QUESTION 90
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the
endpoint to apply a new or updated policy from ISE.
A. Port Bounce
B. CoA Terminate
C. CoA Reauth
D. CoA Session Query
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91
Refer to the exhibit. Which command was used to display this output?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe-3se/3850/sec-
user-8021x-xe-3se-3850-book/config-ieee-802x-pba.html
QUESTION 92
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
Reference: https://en.wikipedia.org/wiki/SQL_injection
QUESTION 93
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cisco/
Cisco-091919-Simple-IT-Whitepaper.pdf
QUESTION 94
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention
System? (Choose two.)
A. SIP
B. inline normalization
C. SSL
D. packet decoder
E. modbus
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-
v60/Application_Layer_Preprocessors.html
QUESTION 95
Which feature is configured for managed devices in the device platform settings of the Firepower Management
Center?
A. quality of service
B. time synchronization
C. network address translations
D. intrusion policy
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
The main function of northbound APIs in the SDN architecture is to enable communication between which two
areas of a network?
Explanation/Reference:
QUESTION 97
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98
Which information is required when adding a device to Firepower Management Center?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-guide-
v60/Device_Management_Basics.html#ID-2242-0000069d
QUESTION 99
Which two services must remain as on-premises equipment when a hybrid email solution is deployed?
(Choose two.)
A. DDoS
B. antispam
C. antivirus
D. encryption
E. DLP
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/
Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf
QUESTION 100
What is a characteristic of Cisco ASA NetFlow v9 Secure Event Logging?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/
monitor-nsel.html
QUESTION 101
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
A. File Analysis
B. SafeSearch
C. SSL Decryption
D. Destination Lists
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
A. phishing
B. brute force
C. man-in-the-middle
D. DDOS
E. tear drop
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in
your environment?
A. vulnerable software
B. file analysis
C. detections
D. prevalence
E. threat root cause
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 104
Which RADIUS attribute can you use to filter MAB requests in an 802.1x deployment?
A. 1
B. 6
C. 31
D. 2
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 105
Which two features of Cisco Email Security can protect your organization against email
threats?(choose two)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 107
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring
an inline posture node?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 108
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their
destinations.
Which task can you perform to determine where each message was lost?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 109
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace
which current encryption technology?
A. 3DES
B. RSA
C. DES
D. AES
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
What is the primary benefit of deploying an ESA in hybrid mode?
A. You can fine-tune its settings to provide the optimum balance between security and performance
for your environment
B. It provides the lowest total cost of ownership by reducing the need for physical appliances
C. It provides maximum protection and control of outbound messages
D. It provides email security while supporting the transition to the cloud
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111
Which option is the main function of Cisco Firepower impact flags?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
Which two deployment modes does the Cisco ASA FirePOWER module support? (Choose two.)
A. transparent mode
B. routed mode
C. inline mode
D. active mode
E. passive monitor-only mode
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 113
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose
two.)
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115
When using Cisco AMP for Networks, which feature copies a file to the Cisco AMP cloud for
analysis?
A. spero analysis
B. dynamic analysis
C. sandbox analysis
D. malware analysis
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
Which IPS engine detects ARP spoofing?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 117
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention
System?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System?
A. Port
B. Rule
C. Source
D. Application
E. Protocol
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation
Intrusion Prevention System?
A. control
B. malware
C. URL filtering
D. protect
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 120
On Cisco Firepower Management Center, which policy is used to collect health modules alerts
from managed devices?
A. health policy
B. system policy
C. correlation policy
D. access control policy
E. health awareness policy
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 121
Which CLI command is used to register a Cisco FirePOWER sensor to Firepower Management
Center?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 122
Which Cisco AMP file disposition valid?
A. pristine
B. malware
C. dirty
D. nonmalicios
A. pristine
B. malware
C. dirty
D. nonmalicious
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 123
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private
cloud instance?
A. RBAC
B. ETHOS detection engine
C. SPERO detection engine
D. TETRA detection engine
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124
Which function is the primary function of Cisco AMP threat Grid?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference: