1. Trang chủ
  2. » Công Nghệ Thông Tin

Bộ đề thi chứng chỉ CCNP Security

54 200 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 54
Dung lượng 1,04 MB
File đính kèm SCOR_350-701_September_2020-v1.0.rar (2 MB)

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Dump ôn thi môn CCNP security của Cisco, mã môn 350701, kèm theo các câu trả lời. Bạn chỉ cần học và hiểu các đáp án của họ là có thể tự tin thi ccnp security phiên bản mới nhất của cisco. Tôi có kèm theo cả file VCE để bạn luyện tập thuận tiện nhất. Mời các bạn tải nó.

Trang 1

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

350-701 Exam Engine is rigorously checked before being put up for sale We make sure there is nothing

irrelevant in 370-401 exam products and you get latest questions We strive to deliver the best 370-401 examproduct for top grades in your first attempt

Developed by: Hussain & Aaron

Dump Vendor: Homer Co., Ltd

Contact us: cciehomer@gmail.com

Website: COMING SOON

© 2020 Homer Co., Ltd

Trang 2

Which two preventive measures are used to control cross-site scripting? (Choose two)

A Disable cookie inspection in the HTML inspection engine.wrong

B Incorporate contextual output encoding/escaping

C Enable client-side scripts on a per-domain basis

D Run untrusted HTML input through an HTML sanitization engine

E Same Site cookie attribute should not be used

Correct Answer: BC

QUESTION 4

Which two mechanisms are used to control phishing attacks? (Choose two)

A Use antispyware software.wrong

B Implement email filtering techniques

C Revoke expired CRL of the websites

Trang 3

D Enable browser alerts for fraudulent websites.

E Define security group memberships

Which two behavioral patterns characterize a ping of death attack? (Choose two)

A Malformed packets are used to crash systems

B The attack is fragmented into groups of 8 octets before transmission

C The attack is fragmented into groups of 16 octets before transmission

D Publicly accessible DNS servers are typically used to execute the attack

E Short synchronized bursts of traffic are used to disrupt TCP connections

Correct Answer: AB

QUESTION 7

What is the difference between deceptive phishing and spear phishing?

A Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage

B A spear phishing campaign is aimed at a specific person versus a group of people

C Spear phishing is when the attack is aimed at the C-level executives of an organization

D Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role

Correct Answer: B

QUESTION 8

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)

Trang 4

A Patch for cross-site scripting.

B Perform backups to the private cloud

C Protect systems with an up-to-date antimalware program

D Protect against input validation and character escapes in the endpoint

E Install a spam and virus email filter

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

A web page images

B database

C Linux and Windows operating systems

D user input validation in a web page or web application

Correct Answer: D

QUESTION 11

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

A Secure the connection between the web and the app tier

B Use prepared statements and parameterized queries

C Check integer, float, or Boolean string parameters to ensure accurate values

D Block SQL code execution in the web application database login

E Write SQL code instead of using object-relational mapping libraries

Trang 7

A AES is more secure than 3DES.

B AES can use a 168-bit key for encryption

C AES can use a 256-bit key for encryption

D AES encrypts and decrypts a key three times in sequence

E AES is less secure than 3DES

Which two key and block sizes are valid for AES? (Choose two)

A 128-bit block size, 192-bit key length

B 128-bit block size, 256-bit key length

C 64-bit block size, 168-bit key length

D 192-bit block size, 256-bit key length

E 64-bit block size, 112-bit key length

Correct Answer: AB

QUESTION 22

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

A authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

B authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX

C authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

D secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX

Correct Answer: B

Trang 8

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

A Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied

automatically

B The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device

C The IPsec configuration that is set up on the active device must be duplicated on the standby device

D Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied

Trang 9

B Enter the command with a different password on hostB.

C Enter the same command on hostB

D Change the password on hostA to the default password

Correct Answer: C

QUESTION 27

Refer to the exhibit

Trang 10

A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites ofVPN The network administrator runs the debug crypto isakmp sa command to track VPN status What is the problem according to this commandoutput?

A hashing algorithm mismatch

B encryption algorithm mismatch

C authentication key mismatch

D interesting traffic was not applied

Correct Answer: C

QUESTION 28

What is a difference between FlexVPN and DMVPN?

A DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1

B DMVPN uses only IKEv1 FlexVPN uses only IKEv2

C FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2

D FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2

What is a commonality between DMVPN and FlexVPN technologies?

A FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes

B FlexVPN and DMVPN use the new key management protocol

C FlexVPN and DMVPN use the same hashing algorithms

D IOS routers run the same NHRP code for DMVPN and FlexVPN

Trang 11

Correct Answer: D

QUESTION 31

Which functions of an SDN architecture require southbound APIs to enable communication?

A management console and the cloud

B management console and the SDN controller

C SDN controller and the cloud

D SDN controller and the network elements

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

A SDN controller and the cloud

B management console and the cloud

C management console and the SDN controller

D SDN controller and the management solution

Trang 12

Refer to the exhibit.

What does the API do when connected to a Cisco security appliance?

A create an SNMP pull mechanism for managing AMP

B gather network telemetry information from AMP for endpoints

C get the process and PID information from the computers in the network

D gather the network interface information about the computers AMP sees

Correct Answer: D

QUESTION 36

Refer to the exhibit

Trang 13

What is the result of this Python script of the Cisco DNA Center API?

A adds a switch to Cisco DNA Center

B adds authentication to a switch

C receives information about a switch

Correct Answer: A

Trang 14

Which option is the main function of Cisco Firepower impact flags?

A They alert administrators when critical events occur

B They identify data that the ASA sends to the Firepower module

C They correlate data about intrusions and vulnerability

D They highlight known and suspected malicious IP addresses in reports

Correct Answer: C

QUESTION 39

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

A Cisco FTDv configured in routed mode and IPv6 configured

B Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises

C Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS

D Cisco FTDv with two management interfaces and one traffic interface configured

E Cisco FTDv with one management interface and two traffic interfaces configured

Correct Answer: BC

QUESTION 40

The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic Where must the ASA be added on the Cisco UC Managerplatform?

A Endpoint Trust List

B Secured Collaboration Proxy

C Certificate Trust List

Trang 15

D Enterprise Proxy Service

B username and password

C device serial number

Trang 16

D health awareness policy

E access control policy

Correct Answer: A

QUESTION 48

Trang 17

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

A Its events match all traffic classes in parallel

B It tracks the flow continuously and provides updates every 10 seconds

C It tracks flow-create, flow-teardown, and flow-denied events

D It provides stateless IP flow tracking that exports all records of a specific flow

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

A user deployment of Layer 3 networks

B multiple context mode

C multiple zone mode

D multiple context mode

Trang 18

Correct Answer: D

QUESTION 52

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

A Define a NetFlow collector by using the flow-export command

B Enable NetFlow Version 9

C Create an ACL to allow UDP traffic on port 9996

D Create a class map to match interesting traffic

E Apply NetFlow Exporter to the outside interface in the inbound direction

Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?

A It inspects hosts that meet the profile with more intrusion rules

B It defines a traffic baseline for traffic anomaly deduction

C It allows traffic if it does not meet the profile

Trang 19

D It blocks traffic if it does not meet the profile.

Correct Answer: B

QUESTION 56

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

A To view bandwidth usage for NetFlow records, the QoS feature must be enabled

B A flow-export event type must be defined under a policy

C NSEL can be used without a collector configured

D A sysopt command can be used to enable NSEL on a specific interface

Correct Answer: B

QUESTION 57

Which ASA deployment mode can provide separation of management on a shared appliance?

A transparent firewall mode

B routed mode

C multiple context mode

D DMZ multiple zone mode

C Platform Service Policy

D Access Control Policy

Correct Answer: C

QUESTION 59

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

A configure manager <key> add host

Trang 20

B configure system add <host><key>

C configure manager add <host><key>

D configure manager delete

Correct Answer: C

QUESTION 60

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA Which Cisco ASA command must be used?

A ip flow monitor input

B flow-export destination inside 1.1.1.1 2055

Trang 21

A Traffic from the inside network is redirected

B Traffic from the inside and DMZ networks is redirected

C All TCP traffic is redirected

D Traffic from the DMZ network is redirected

Correct Answer: B

QUESTION 62

Which statement about IOS zone-based firewalls is true?

A An unassigned interface can communicate with assigned interfaces

B An interface can be assigned to multiple zones

C An interface can be assigned only to one zone

D Only one interface can be assigned to a zone

Correct Answer: C

QUESTION 63

What is a characteristic of Firepower NGIPS inline deployment mode?

A It must have inline interface pairs configured

B ASA with Firepower module cannot be deployed

C It is out-of-band from traffic

D It cannot take actions such as blocking traffic

Trang 22

What is the primary benefit of deploying an ESA in hybrid mode?

A You can fine-tune its settings to provide the optimum balance between security and performance for your environment

B It provides the lowest total cost of ownership by reducing the need for physical appliances

C It provides email security while supporting the transition to the cloud

D It provides maximum protection and control of outbound messages

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

A It alerts users when the WSA decrypts their traffic

B It provides enhanced HTTPS application detection for AsyncOS

C It decrypts HTTPS application traffic for unauthenticated users

D It decrypts HTTPS application traffic for authenticated users

Correct Answer: B

QUESTION 68

What is the primary role of the Cisco Email Security Appliance?

A Mail Submission Agent

B Mail User Agent

C Mail Transfer Agent

D Mail Delivery Agent

Correct Answer: C

Trang 23

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

A Configure the advancedproxyconfig command with the HTTPS subcommand

B Configure a maximum packet size

C Configure a small log-entry size

D Configure the datasecurityconfig command

Correct Answer: A

QUESTION 71

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

A NetFlow

B Data loss prevention

C Time-based one-time passwords

D Heuristic-based filtering

E Geolocation-based filtering

Correct Answer: BE

QUESTION 72

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance? (Choose two)

A reference a Proxy Auto Config file

B configure policy-based routing on the network infrastructure

C use Web Cache Communication Protocol

D configure the proxy IP address in the web-browser settings

Trang 24

E configure Active Directory Group Policies to push proxy settings

B Configure the trackingconfig command to enable message tracking

C Review the log files

D Generate a system report

Correct Answer: B

QUESTION 74

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

A It can handle explicit HTTP requests

B It requires a proxy for the client web browser

C Layer 4 switches can automatically redirect traffic destined to port 80

D It requires a PAC file for the client web browser

E WCCP v2-enabled devices can automatically redirect traffic destined to port 80

Trang 25

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

A AMP Reputation Center

B IP Blacklist Center

C IP and Domain Reputation Center

D File Reputation Center

Correct Answer: C

QUESTION 78

Why would a user choose an on-premises ESA versus the CES solution?

A Demand is unpredictable

B ESA is deployed inline

C Sensitive data must remain onsite

D The server team wants to outsource this service

Trang 26

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Trang 27

What is the function of Cisco Cloudlock for data security?

A user and entity behavior analytics

B controls malicious cloud apps

C detects anomalies

D data loss prevention

Correct Answer: D

QUESTION 87

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

A It sends the application information to an administrator to act on

B It discovers and controls cloud apps that are connected to a company’s corporate environment

C It allows the administrator to quarantine malicious files so that the application can function, just not maliciously

D It deletes any application that does not belong in the network

Ngày đăng: 05/01/2021, 13:17

TỪ KHÓA LIÊN QUAN

w