web analytics

[23-Aug-2024] New 2020 CCIE/CCNP 350-701 SCOR Dumps with VCE and PDF from PassLeader (Update Questions)

New 2020 CCIE/CCNP 350-701 SCOR exam questions from PassLeader 350-701 dumps! Welcome to download the newest PassLeader 350-701 VCE and PDF dumps: https://www.passleader.com/350-701.html (760 Q&As)

P.S. Free 2020 CCIE/CCNP 350-701 SCOR dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1hkvcWfx1vI0RBtKa9NEv1NysJf5D2QaJ

NEW QUESTION 701
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?

A.    The changes are applied only after the configuration is saved in Cisco Umbrella.
B.    The user role of Block Page Bypass or higher is needed to perform these changes.
C.    The changes are applied immediately if the destination list is part of a policy.
D.    The destination list must be removed from the policy before changes are made to it.

Answer: C

NEW QUESTION 702
Which file type is supported when performing a bulk upload of destinations into a destination list on Cisco Umbrella?

A.    XLS
B.    RTF
C.    TXT
D.    CSV

Answer: D

NEW QUESTION 703
An engineer is configuring a Cisco Secure Email Cloud Gateway instance to send logs to an external server for auditing. For security purposes, a username and SSH key with the fingerprint d0:46:03:8e:d7:f1:bb:9b:33:13:94:60:49:da:9b:e3 has been generated on the remote log server that accepts only the SSHv2 protocol. Which log retrieval method must be configured in the log subscription?

A.    syslog push
B.    manually download
C.    SCP push
D.    FTP push

Answer: C

NEW QUESTION 704
An engineer configured 802.1X authentication on a switch port but cannot authenticate. Which action must the engineer take to validate if the user credentials are correct?

A.    Check the logs of the authentication server for the username and authentication rejection logs.
B.    Check policy enforcement point for the authentication mechanism and credentials used.
C.    Check the supplicant logs for the username and password entered, then check the authentication provider.
D.    Check the authenticator and view the debug logs for the username and password.

Answer: A

NEW QUESTION 705
Which feature only implements on the Cisco ASA in the transparent mode?

A.    inspect application layer of the traffic sent between hosts
B.    stateful inspection
C.    inspect traffic between hosts in the same subnet
D.    inspect anycast traffic

Answer: C

NEW QUESTION 706
An engineer is configuring Cisco Secure Web Appliance and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?

A.    MDA on the router.
B.    WCCP on switch.
C.    PBR on Cisco Secure Web Appliance.
D.    DNS resolution on Cisco Secure Web Appliance.

Answer: B

NEW QUESTION 707
Which two algorithms must be used when an engineer is creating a connection that will have classified data across it? (Choose two.)

A.    RSA-3072
B.    ECDSA-256
C.    AES-256
D.    RC4
E.    SHA-384

Answer: CE

NEW QUESTION 708
Which process is used to obtain a certificate from a CA?

A.    enrollment
B.    registration
C.    approval
D.    signing

Answer: A

NEW QUESTION 709
Which two methods are valid to be included in an authentication method list? (Choose two.)

A.    default
B.    login
C.    console
D.    line
E.    enable

Answer: BE

NEW QUESTION 710
A network administrator is shipping a Cisco ASA to a remote retail site. The administrator wants to ensure that the device configuration cannot be accessed by someone at the site with physical access and a console cable. Which command must be used to mitigate this risk?

A.    aaa authentication console
B.    config-register 0x00000041
C.    no service password-recovery
D.    no service sw-reset-button

Answer: C

NEW QUESTION 711
Which two products are used to forecast capacity needs accurately in real time? (Choose two.)

A.    Cisco Secure Workload
B.    Cisco Cloudlock
C.    Cisco Umbrella
D.    Cisco AppDynamics
E.    Cisco Workload Optimization Manager

Answer: DE

NEW QUESTION 712
A Cisco Secure Cloud Analytics administrator is setting up a private network monitor sensor to monitor an on-premises environment. Which two pieces of information from the sensor are used to link to the Secure Cloud Analytics portal? (Choose two.)

A.    private IP address
B.    unique service key
C.    SSL certificate
D.    public IP address
E.    NAT ID

Answer: BD

NEW QUESTION 713
Which attack gives unauthorized access to files on the web server?

A.    DHCP snooping
B.    path traversal
C.    broadcast storm
D.    distributed DoS

Answer: B

NEW QUESTION 714
A network administrator needs a solution to match traffic and allow or deny the traffic based on the type of application, not just the source or destination address and port used. Which kind of security product must the network administrator implement to meet this requirement?

A.    nextgeneration firewall
B.    web application firewall
C.    next generation intrusion prevention system
D.    intrusion detection system

Answer: A

NEW QUESTION 715
What is a benefit of using Cisco CWS compared to an on-premises Cisco Secure Web Appliance?

A.    CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Secure Web Appliance does not.
B.    Content scanning for SAAS cloud applications is available through CWS and not available through Secure Web Appliance.
C.    CWS minimizes the load on the internal network and security infrastructure as compared to Secure Web Appliance.
D.    URL categories are updated more frequently on CWS than they are on Secure Web Appliance.

Answer: A

NEW QUESTION 716
Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?

A.    SSL inspection
B.    security levels
C.    stateless inspection
D.    security zones

Answer: D

NEW QUESTION 717
Which Cisco solution secures the cloud users, data and applications with the cloud-native CASB and cloud cybersecurity platform?

A.    Cisco Appdynamics
B.    Cisco Umbrella
C.    Cisco CloudLock
D.    Cisco Secure Network Analytics

Answer: C

NEW QUESTION 718
What are the components of endpoint protection against social engineering attacks?

A.    Cisco Secure Email Gateway
B.    IPsec
C.    firewall
D.    IDS

Answer: A

NEW QUESTION 719
Which feature is used to restrict communication between interfaces on a Cisco ASA?

A.    VLAN subinterfaces
B.    traffic zones
C.    VxLAN interfaces
D.    security levels

Answer: D

NEW QUESTION 720
Which IPsec mode must be used when encrypting data over a public network between two servers with RFC1918 IP addresses?

A.    main mode
B.    aggressive mode
C.    transport mode
D.    tunnel mode

Answer: D

NEW QUESTION 721
Which platform uses Cyber Threat Intelligence as its main source of information?

A.    EPP
B.    EDR
C.    Cisco ASA
D.    Cisco Secure Endpoint

Answer: D

NEW QUESTION 722
Which security mechanism is designed to protect against “offline brute-force” attacks?

A.    Token
B.    MFA
C.    Salt
D.    CAPTCHA

Answer: C

NEW QUESTION 723
Which method is used on a Cisco IOS router to redirect traffic to the Cisco Secure Web Appliance for URL inspection?

A.    WCCP
B.    route map
C.    PAC file
D.    WPAD

Answer: A

NEW QUESTION 724
Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)

A.    service tcp-keepalives-in
B.    no service password-recovery
C.    no cdp run
D.    no ip http server
E.    ip ssh version 2

Answer: CD

NEW QUESTION 725
Which Cisco firewall solution supports configuration via Cisco Policy Language?

A.    NGFW
B.    CBAC
C.    IPS
D.    ZFW

Answer: D

NEW QUESTION 726
A network administrator has configured DHCP snooping on a Cisco switch to prevent unauthorized DHCP servers from assigning IP addresses. During configuration, a device with MAC address 04:66:96:79:0:AB received an IP address from an unauthorized DHCP server. Which configuration step must the network administrator take to accomplish the requirement?

A.    Apply DHCP option 82 to identify the trusted DHCP server.
B.    Configure each device on the network to use authorize DHCP server manually.
C.    Configure an access control list to only allow DHCP traffic from trusted DHCP server.
D.    Implement DHCP option 82 to relay DHCP requests to the trusted DHCP server.

Answer: D

NEW QUESTION 727
What are two examples of code injection vulnerabilities? (Choose two.)

A.    XML external entity injection
B.    cross-site scripting
C.    session hijacking
D.    SQL injection
E.    arbitrary command injection

Answer: BD

NEW QUESTION 728
What is a feature of an endpoint detection and response solution?

A.    ensuring the security of network devices by choosing which devices are allowed to reach the network
B.    capturing and clarifying data on email, endpoints, and servers to mitigate threats
C.    rapidly and consistently observing and examining data to mitigate threats
D.    preventing attacks by identifying harmful events with machine learning and conduct-based defense

Answer: C

NEW QUESTION 729
An engineer is deploying a Cisco Secure Email Gateway and must ensure it reaches the Cisco update servers to retrieve new rules. The engineer must now manually configure the Outbreak Filter rules on an AsyncOS for Cisco Secure Email Gateway. Only outdated rules must be replaced. Up-to-date rules must be retained. Which action must the engineer take next to complete the configuration?

A.    Use the outbreakconfig command in CLI.
B.    Select Outbreak Filters.
C.    Perform a backup/restore of the database.
D.    Click Update Rules Now.

Answer: A

NEW QUESTION 730
A website administrator wants to prevent SQL injection attacks against the company’s customer database, which is referenced by the web server. Which two methods help prevent SQL injection attacks? (Choose two.)

A.    using load balancers with NAT
B.    performing input validation
C.    enforcing TLS 1.3 only
D.    using SSL certificates
E.    using web application firewalls

Answer: BE

NEW QUESTION 731
An engineer is configuring DHCP on a Cisco switch and wants to ensure that a DHCP packet will be dropped. Under which condition will this occur?

A.    A packet from a DHCP server is received from inside the network or firewall.
B.    All packets are dropped until the administrator manually enters the approved servers into the DHCP snooping database.
C.    A packet is received on an untrusted interface, and the source MAC address and the DHCP client hardware address do not match.
D.    A DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is 0.0.0.0.

Answer: C

NEW QUESTION 732
An engineer is configuring guest WLAN access using Cisco ISE and the Cisco WLC. Which action temporarily gives guest endpoints access dynamically while maintaining visibility into who or what connecting?

A.    Configure ISE and the WLC for quest redirection and services using a self-registered portal.
B.    Modify the WLC configuration to allow any endpoint to access an internet-only VLAN.
C.    Configure ISE and the WLC for guest redirection and services using a hotspot portal.
D.    Modify the WLC configuration to require local WLC logins for the authentication prompts.

Answer: A

NEW QUESTION 733
An engineer needs to configure cloud logging on Cisco ASA with SAL integration. Which parameter must be considered for this configuration?

A.    Events can be viewed only from one regional cloud.
B.    All CSM versions are supported.
C.    Onboard Cisco ASA device to CDO is needed.
D.    Required storage size can be allocated dynamically.

Answer: C

NEW QUESTION 734
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?

A.    Cisco Secure Client
B.    Cisco ISE
C.    Cisco Secure Workload
D.    Cisco AMP for Network

Answer: C

NEW QUESTION 735
A network administrator has installed Secure Endpoint in the network. During setup it was noticed an endpoint has been exhibiting unusual behavior, including slow performance and unexpected network activity. Administrator discovers a suspicious file named abc0467145535.exe running in the background. Which step must the network administrator take to investigate and remediate the potential malware?

A.    Isolate the endpoint from the network.
B.    Reset the endpoint password and enable multi-factor authentication.
C.    Format and reinstall the operating system on the endpoint.
D.    Disable all non-essential processes running on the endpoint.

Answer: A

NEW QUESTION 736
What are two targets in cross-site scripting attacks? (Choose two.)

A.    footer
B.    cookie
C.    input
D.    header
E.    image

Answer: DE

NEW QUESTION 737
Which component performs the resolution between the tunnel address and mGRE address in DMVPN?

A.    GDOI
B.    NBMA
C.    NHRP
D.    NHS

Answer: C

NEW QUESTION 738
What is a difference between encrypted passwords and hardcoded passwords?

A.    Encrypted passwords are easier to obtain, and hardcoded passwords are known only to developers.
B.    Encrypted passwords are generated by an application user, and hardcoded passwords are generated randomly.
C.    Encrypted passwords are used for frontend applications, and hardcoded passwords are used for backend applications.
D.    Encrypted passwords are stored in a database, and hardcoded passwords are embedded in the source code.

Answer: D

NEW QUESTION 739
Which action adds IOCs to customize detections for a new attack?

A.    Use the initiate Endpoint 1OC scan feature to gather the IOC information and push it to clients.
B.    Upload the 10Cs into the Installed Endpoint IOC feature within Cisco Secure Endpoint.
C.    Add a custom advanced detection to include the 1OCs needed within Cisco Secure Endpoint.
D.    Modify the base policy within Cisco Secure Endpoint to include simple custom detections.

Answer: B

NEW QUESTION 740
A network administrator received a critical message alert from a Cisco Secure Web Appliance stating that the log partition is at 107% capacity. How does a Cisco Secure Web Appliance respond when its logging partition is full?

A.    It overwrites the oldest log files.
B.    It suspends logging and reporting functions.
C.    It deletes logs older than a configurable age.
D.    It archives older logs in a compressed file to free space.

Answer: B

NEW QUESTION 741
A network administrator has configured TACACS on a network device using the key Cisc0466974274 for authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is falling. Which configuration step must the administrator complete?

A.    Configure the TACACS key on the server to match with the network device.
B.    Install a compatible operating system version on the TACACS server.
C.    Implement synchronized system clock on TACACS server that matches the network device.
D.    Apply an access control list on TACACS server to allow communication with the network device.

Answer: A

NEW QUESTION 742
How do the features of DMVPN compare to IPsec VPN?

A.    DMVPN supports high availability routing, and IPsec VPN supports stateless failover.
B.    DMVPN uses hub-and-spoke topology, and IPsec VPN uses on-demand spoke topology.
C.    DMVPN supports non-IP protocols, and IPsec VPN only supports IP protocols.
D.    DMVPN supports multiple vendors, and IPsec VPN only supports Cisco products.

Answer: A

NEW QUESTION 743
What has driven an increase in the need for endpoint-based security?

A.    minimal endpoint-based security manual configuration and implementation
B.    increased data volumes and value in data center storage
C.    increased number of BYOD policies and hybrid remote worker
D.    stricter control mechanism requirements for enterprise access

Answer: C

NEW QUESTION 744
What must be configured on Cisco Secure Endpoint to create a custom detection file list to detect and quarantine future files?

A.    Create an advanced custom detection and upload the hash of each file.
B.    Add a network IP block allowed list to the configuration and add the blocked files.
C.    Use the simple custom detection feature and add each detection to the list.
D.    Configure an application control allowed applications list to block the files.

Answer: A

NEW QUESTION 745
An engineer must register a fixed network on a Cisco Umbrella platform. Which two actions must be performed when adding a new public IP address? (Choose two.)

A.    Enter a network public IP address.
B.    Install the Umbrella root certificate.
C.    Configure the DNS security settings.
D.    Point DNS to Umbrella platform DNS servers.
E.    Point DHCP to Umbrella platform DHCP servers.

Answer: AD

NEW QUESTION 746
Which action configures the iEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms?

A.    Modify the Dot1x configuration on the VPN server to send Layer 3 authentications to an external authentication database.
B.    Identify the devices using this feature and create a policy that allows them to pass Layer 2 authentication.
C.    Add MAB into the switch to allow redirection to a Layer 3 device for authentication.
D.    Configure WebAuth so the hosts are redirected to a web page for authentication.

Answer: C

NEW QUESTION 747
Which API technology with SDN architecture is used to communicate with a controller and network devices such as routers and switches?

A.    rest APIs
B.    northbound APIs
C.    southbound APIs
D.    unprotected APIs

Answer: C

NEW QUESTION 748
Which solution should a network administrator deploy to protect a webserver from SQL injection attacks?

A.    IDS
B.    Secure Web Appliance
C.    ISE
D.    IPS

Answer: B

NEW QUESTION 749
What is a capability of Cisco AVC?

A.    application bandwidth enforcement on Cisco IOS platforms
B.    interoperates by using GET VPN on tunnel interfaces
C.    traffic filtering by using a Security Intelligence policy
D.    deep packet inspection on IPsec encapsulated traffic

Answer: A

NEW QUESTION 750
Which parameter must be set for an invalid certificate handling on a Cisco Seucure Web Appliance with a policy for HTTPS traffic?

A.    Decrypt
B.    Reject
C.    Accept
D.    Scan

Answer: A

NEW QUESTION 751
A networking team must harden an organization’s network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?

A.    dedicated VLAN ID for all trunk ports
B.    disable STP on the network devices
C.    DHCP snooping on all the switches
D.    enable port-based network access control

Answer: A

NEW QUESTION 752
……


New 2020 CCIE/CCNP 350-701 SCOR exam questions from PassLeader 350-701 dumps! Welcome to download the newest PassLeader 350-701 VCE and PDF dumps: https://www.passleader.com/350-701.html (760 Q&As)

P.S. Free 2020 CCIE/CCNP 350-701 SCOR dumps are available on Google Drive shared by PassLeader: https://drive.google.com/open?id=1hkvcWfx1vI0RBtKa9NEv1NysJf5D2QaJ