DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Optimize Your Cisco 350-701 SCOR Exam Preparation with Reliable Study Resources

Achieving the Cisco 350-701 SCOR certification demonstrates your expertise in implementing and operating core security technologies across various domains. Comprehensive exam preparation is essential for successful passing, and leveraging the right study materials and exam resources can significantly improve your chances of success. Mock exams and practice tests are invaluable tools that provide realistic exam questions and answers, closely aligned with the actual SCOR exam format and content. These test questions cover a wide range of topics, including network security solutions, cloud security controls, content security mechanisms, endpoint protection and detection strategies, secure network access methods, and visibility and enforcement techniques. By regularly practicing with these exam questions, you can assess your readiness, identify knowledge gaps, and reinforce your understanding of critical security concepts. In addition to mock exams, it's crucial to utilize official Cisco study guides, training courses, and other exam resources. These materials offer in-depth explanations, real-world scenarios, and expert insights, ensuring you have a comprehensive understanding of the topics covered in the SCOR exam. Consistent exam preparation, combined with regular mock exam practice, will increase your chances of earning this prestigious Cisco certification, validating your expertise in implementing and operating core security technologies.
Take other online exams

Question #1
An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
A. rovision the email appliance
B. eploy an encryption appliance
C. ap sender !P addresses to a host interface
D. nable flagged message handling
View answer
Correct Answer: D
Question #2
Which type of API is being used when a security application notifies a controller within a software- defined network architecture about a specific security threat?
A. estbound AP
B. outhbound API
C. orthbound API
D. astbound API
View answer
Correct Answer: C
Question #3
Refer to the exhibit.What does the number 15 represent in this configuration?
A. rivilege level for an authorized user to this router
B. ccess list that identifies the SNMP devices that can access the router
C. nterval in seconds between SNMPv3 authentication attempts
D. umber of possible failed attempts until the SNMPv3 user is locked out
View answer
Correct Answer: B
Question #4
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
A. estbound AP
B. outhbound API
C. orthbound API
D. astbound API
View answer
Correct Answer: B
Question #5
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower.What must be configured to accomplish this?
A. Network Discovery policy to receive data from the host
B. Threat Intelligence policy to download the data from the host
C. File Analysis policy to send file data into Cisco Firepower
D. Network Analysis policy to receive NetFlow data from the host
View answer
Correct Answer: A
Question #6
How is data sent out to the attacker during a DNS tunneling attack?
A. s part of the UDP/53 packet payload
B. s part of the domain name
C. s part of the TCP/53 packet header
D. s part of the DNS response packet
View answer
Correct Answer: A
Question #7
In an IaaS cloud services model, which security function is the provider responsible for managing?
A. nternet proxy
B. irewalling virtual machines
C. ASB
D. ypervisor OS hardening
View answer
Correct Answer: B
Question #8
Which attribute has the ability to change during the RADIUS CoA?
A. TP
B. uthorization
C. ccessibility
D. embership
View answer
Correct Answer: B
Question #9
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
A. t allows traffic if it does not meet the profile
B. t defines a traffic baseline for traffic anomaly deduction
C. t inspects hosts that meet the profile with more intrusion rules
D. t blocks traffic if it does not meet the profile
View answer
Correct Answer: B
Question #10
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
A. authentication server: Cisco Identity Service Engine
B. supplicant: Cisco AnyConnect ISE Posture module
C. authenticator: Cisco Catalyst switch
D. authenticator: Cisco Identity Services Engine
E. authentication server: Cisco Prime Infrastructure
View answer
Correct Answer: AC
Question #11
An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default.Which technology must be used to implement these requirements?
A. irtual routing and forwarding
B. icrosegmentation
C. ccess control policy
D. irtual LAN
View answer
Correct Answer: C
Question #12
Which functions of an SDN architecture require southbound APIs to enable communication?
A. DN controller and the network elements
B. anagement console and the SDN controller
C. anagement console and the cloud
D. DN controller and the cloud
View answer
Correct Answer: A
Question #13
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?
A. se security services to configure the traffic monitor,
B. se URL categorization to prevent the application traffic
C. se an access policy group to configure application control settings
D. se web security reporting to validate engine functionality
View answer
Correct Answer: C
Question #14
Which technology reduces data loss by identifying sensitive information stored in public computing environments?
A. ublic Cloud
B. ybrid Cloud
C. ommunity Cloud
D. rivate Cloud
View answer
Correct Answer: D
Question #15
DRAG DROP (Drag and Drop is not supported)Drag and drop the common security threats from the left onto the definitions on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #16
Refer to the exhibit.What does this Python script accomplish?
A. t allows authentication with TLSv1 SSL protocol
B. t authenticates to a Cisco ISE with an SSH connection
C. t authenticates to a Cisco ISE server using the username of ersad
D. t lists the LDAP users from the external identity store configured on Cisco ISE
View answer
Correct Answer: C
Question #17
Which IPS engine detects ARP spoofing?
A. tomic ARP Engine
B. ervice Generic Engine
C. RP Inspection Engine
D. IC Engine
View answer
Correct Answer: A
Question #18
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
A. isco Cloudlock
B. isco Umbrella
C. isco AMP
D. isco App Dynamics
View answer
Correct Answer: A
Question #19
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172
B. authenticates the IP address of the 172
C. authenticates the IKEv1 peers in the 172
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
View answer
Correct Answer: B
Question #20
07. Cisco AMP for Endpoints has connectors for which of the following operating systems?
A. indow
B. acOS
C. ndroid
D. lloftheseanswersarecorrec
View answer
Correct Answer: D
Question #21
Which attack is commonly associated with C and C++ programming languages?
A. ross-site scripting
B. ater holing
C. DoS
D. uffer overflow
View answer
Correct Answer: D
Question #22
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host
A. he tunnel is not being established to hostB
B. hange isakmp to ikev2 in the command on hostA
C. nter the command with a different password on hostB
D. nter the same command on hostB
E. hange the password on hostA to the default password
View answer
Correct Answer: C
Question #23
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
A. show authentication registrations
B. show authentication method
C. show dot1x all
D. show authentication sessions
View answer
Correct Answer: D
Question #24
Which algorithm provides asymmetric encryption?
A. C4
B. ES
C. SA
D. DES
View answer
Correct Answer: C
Question #25
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
A. onfigure an advanced custom detection list
B. onfigure an IP Block & Allow custom detection list
C. onfigure an application custom detection list
D. onfigure a simple custom detection list
View answer
Correct Answer: A
Question #26
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications.Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A. eak passwords for authentication
B. nencrypted links for traffic
C. oftware bugs on applications
D. mproper file security
View answer
Correct Answer: B
Question #27
How does Cisco Advanced Phishing Protection protect users?
A. t validates the sender by using DKIM
B. t determines which identities are perceived by the sender
C. t utilizes sensors that send messages securely
D. t uses machine learning and real-time behavior analytics
View answer
Correct Answer: B
Question #28
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A. TIX
B. MPP
C. xGrid
D. MTP
View answer
Correct Answer: A
Question #29
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic.Which action will accomplish this task?
A. et content settings to High
B. onfigure the intelligent proxy
C. se destination block lists
D. onfigure application block lists
View answer
Correct Answer: B
Question #30
What is a characteristic of a bridge group in ASA Firewall transparent mode?
A. t includes multiple interfaces and access rules between interfaces are customizable
B. t is a Layer 3 segment and includes one port and customizable access rules
C. t allows ARP traffic with a single access rule
D. t has an IP address on its BVI interface and is used for management traffic
View answer
Correct Answer: A
Question #31
Which Cisco AMP file disposition valid?
A. pero analysis
B. ynamic analysis
C. andbox analysis
D. alware analysis
View answer
Correct Answer: B
Question #32
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?
A. SIRT
B. alos
C. SIRT
D. EVNET
View answer
Correct Answer: B
Question #33
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE.Which CoA type achieves this goal?
A. ort Bounce
B. oA Terminate
C. oA Reauth
D. oA Session Query
View answer
Correct Answer: C
Question #34
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients.What must be done on the Cisco ESA to accomplish this goal?
A. onfigure incoming content filters
B. se Bounce Verification
C. onfigure Directory Harvest Attack Prevention
D. ypass LDAP access queries in the recipient access table
View answer
Correct Answer: C
Question #35
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. pplication settings
B. ontent categories
C. ecurity settings
D. estination lists
View answer
Correct Answer: D
Question #36
Which type of attack is social engineering?
A. rojan
B. hishing
C. alware
D. ITM
View answer
Correct Answer: B
Question #37
A network engineer needs to select a VPN type that provides the most stringent security, multiple security associations for the connections, and efficient VPN establishment with the least bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this environment?
A. DMVPN because it uses multiple SAs and FlexVPN does not
B. DMVPN because it supports IKEv2 and FlexVPN does not
C. FlexVPN because it supports IKEv2 and DMVPN does not
D. FlexVPN because it uses multiple SAs and DMVPN does not
View answer
Correct Answer: D
Question #38
Refer to the exhibit.A network administrator configures command authorization for the admin5 user.What is the admin5user able to do on HQ_Router after this configuration?
A. nmp-server host inside 10
B. nmp-server host inside 10
C. nmp-server host inside 10
D. nmp-server host inside 10
View answer
Correct Answer: B
Question #39
Refer to the exhibit.How does Cisco Umbrella manage traffic that is directed toward risky domains?
A. raffic is proximed through the intelligent proxy
B. raffic is managed by the security settings and blocked
C. raffic is managed by the application settings, unhandled and allowed
D. raffic is allowed but logged
View answer
Correct Answer: B
Question #40
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
A. PP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses
B. DR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses
C. PP focuses on network security, and EDR focuses on device security
D. DR focuses on network security, and EPP focuses on device security
View answer
Correct Answer: AD
Question #41
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
A. alware installation
B. ommand-and-control communication
C. etwork footprinting
D. ata exfiltration
View answer
Correct Answer: D
Question #42
An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower.Which feature should be used to accomplish this?
A. etFlow
B. acket Tracer
C. etwork Discovery
D. ccess Control
View answer
Correct Answer: A
Question #43
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
A. YOD on boarding
B. imple Certificate Enrollment Protocol
C. lient provisioning
D. AC authentication bypass
View answer
Correct Answer: A
Question #44
04. What are two Detection and Analytics Engines of Cognitive Threat Analytics?
A. ataexfiltrati
B. ommandandcontrolcommunicati
C. ntelligentproxy
D.
View answer
Correct Answer: AB
Question #45
Refer to the exhibit.What will occur when this device tries to connect to the port?
A. 02
B. 02
C. 02 1X will work and the device will be allowed on the network
D. 02 1X and MAB will both be used and ISE can use policy to determine the access level
View answer
Correct Answer: B
Question #46
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
A. eardrop
B. murf
C. AND
D. YN flood
View answer
Correct Answer: A
Question #47
What provides visibility and awareness into what is currently occurring on the network?
A. MX
B. MI
C. rime Infrastructure
D. elemetry
View answer
Correct Answer: D
Question #48
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?(Choose two)
A. t decrypts HTTPS application traffic for unauthenticated users
B. t alerts users when the WSA decrypts their traffic
C. t decrypts HTTPS application traffic for authenticated users
D. t provides enhanced HTTPS application detection for AsyncOS
View answer
Correct Answer: AD
Question #49
What is the role of an endpoint in protecting a user from a phishing attack?
A. se Cisco Stealthwatch and Cisco ISE Integration
B. tilize 802
C. se machine learning models to help identify anomalies and determine expected sending behavior
D. nsure that antivirus and anti malware software is up to date
View answer
Correct Answer: C
Question #50
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
A. rl
B. erminal
C. rofile
D. elfsigned
View answer
Correct Answer: C
Question #51
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
A. ACACS+
B. HAP
C. TLMSSP
D. ADIUS
E. erberos
View answer
Correct Answer: AD
Question #52
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs.Which solution meets the needs of the organization?
A. isco FMC
B. SM
C. isco FDM
D. DO
View answer
Correct Answer: B
Question #53
Refer to the exhibit.Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
A. how authentication registrations
B. how authentication method
C. how dot1x all
D. how authentication sessions
View answer
Correct Answer: D
Question #54
An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices.What should be done to ensure that all subdomains of domain.com are blocked?
A. onfigure the *
B. onfigure the *
C. onfigure the *
D. onfigure the domain
View answer
Correct Answer: C
Question #55
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
A. ith an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
B. ith a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product
C. ith an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product
D. ith an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it
View answer
Correct Answer: D
Question #56
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance.Which product should be used to meet these requirements?
A. isco Umbrella
B. isco AMP
C. isco Stealthwatch
D. isco Tetration
View answer
Correct Answer: D
Question #57
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. uthenticates the IKEv2 peers in the 172
B. uthenticates the IP address of the 172
C. uthenticates the IKEv1 peers in the 172
D. ecures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
View answer
Correct Answer: C
Question #58
Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?
A. onfigure system add
B. onfigure manager add host
C. onfigure manager delete
D. onfigure manager add
View answer
Correct Answer: D
Question #59
An organization has two systems in their DMZ that have an unencrypted link between them for communication.The organization does not have a defined password policy and uses several default accounts on the systems.The application used on those systems also have not gone through stringent code reviews.Which vulnerability would help an attacker brute force their way into the systems?
A. eak passwords
B. ack of input validation
C. issing encryption
D. ack of file permission
View answer
Correct Answer: C
Question #60
DRAG DROP (Drag and Drop is not supported)Drag and drop the descriptions from the left onto the encryption algorithms on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #61
Refer to the exhibit.What will happen when this Python script is run?
A. he compromised computers and malware trajectories will be received from Cisco AMP
B. he list of computers and their current vulnerabilities will be received from Cisco AMP
C. he compromised computers and what compromised them will be received from Cisco AMP
D. he list of computers, policies, and connector statuses will be received from Cisco AMP
View answer
Correct Answer: D
Question #62
03. In which type of Cisco WSA deployment mode is the client configured to use the web proxy?
A. ransparentmode
B. xplicitforwardmode
C. CCPmode
D. oneoftheseanswersiscorrec
View answer
Correct Answer: B
Question #63
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
A. t allows the administrator to quarantine malicious files so that the application can function, just not maliciously
B. t discovers and controls cloud apps that are connected to a company's corporate environment
C. t deletes any application that does not belong in the network
D. t sends the application information to an administrator to act on
View answer
Correct Answer: B
Question #64
What is a difference between FlexVPN and DMVPN?
A. MVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
B. MVPN uses only IKEv1 FlexVPN uses only IKEv2
C. lexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
D. lexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
View answer
Correct Answer: C
Question #65
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
A. o issue and revoke digital certificates
B. o validate the authenticity of a digital certificate
C. o create the private key for a digital certificate
D. o certify the ownership of a public key by the named subject
View answer
Correct Answer: B
Question #66
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
A. GFW
B. MP
C. SA
D. SA
View answer
Correct Answer: AB
Question #67
Refer to the exhibit.Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance.What is causing this issue?
A. o split-tunnel policy is defined on the Firepower Threat Defense appliance
B. he access control policy is not allowing VPN traffic in
C. ite-to-site VPN peers are using different encryption algorithms
D. ite-to-site VPN preshared keys are mismatched
View answer
Correct Answer: A
Question #68
What is the difference between Cross-site Scripting and SQL Injection, attacks?
A. daptive Network Control Policy List
B. ontext Visibility
C. ccounting Reports
D. ADIUS Live Logs
View answer
Correct Answer: A
Question #69
What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?
A. t tracks flow-create, flow-teardown, and flow-denied events
B. t provides stateless IP flow tracking that exports all records of a specific flow
C. t tracks the flow continuously and provides updates every 10 seconds
D. ts events match all traffic classes in parallel
View answer
Correct Answer: A
Question #70
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
A. outed mode
B. ransparent mode
C. ultiple context mode
D. ultiple zone mode
View answer
Correct Answer: CE
Question #71
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform.What should be used to meet these requirements?
A. isco Umbrella
B. isco Cloud Email Security
C. isco NGFW
D. isco Cloudlock
View answer
Correct Answer: D
Question #72
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.How does the switch behave in this situation?
A. t forwards the packet after validation by using the MAC Binding Table
B. t drops the packet after validation by using the IP & MAC Binding Table
C. t forwards the packet without validation
D. t drops the packet without validation
View answer
Correct Answer: B
Question #73
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
A. murf
B. ITM
C. eardrop
D. AND
View answer
Correct Answer: B
Question #74
Refer to the exhibit.What will happen when the Python script is executed?
A. he hostname will be translated to an IP address and printed
B. he hostname will be printed for the client in the client ID field
C. he script will pull all computer hostnames and print them
D. he script will translate the IP address to FODN and print it
View answer
Correct Answer: C
Question #75
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
A. how authorization status
B. how authen sess int gi0/1
C. how connection status gi0/1
D. how ver gi0/1
View answer
Correct Answer: B
Question #76
Refer to the exhibit.Which type of authentication is in use?
A. DAP authentication for Microsoft Outlook
B. OP3 authentication
C. MTP relay server authentication
D. xternal user and relay mail authentication
View answer
Correct Answer: A
Question #77
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows.What action would allow the attacker to gain access to machine 1 but not machine 2?
A. niffing the packets between the two hosts
B. ending continuous pings
C. verflowing the buffer's memory
D. nserting malicious commands into the database
View answer
Correct Answer: D
Question #78
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
A. P Blacklist Center
B. ile Reputation Center
C. MP Reputation Center
D. P and Domain Reputation Center
View answer
Correct Answer: DE
Question #79
What must be used to share data between multiple security products?
A. dvanced Malware Protection
B. latform Exchange Grid
C. ultifactor Platform Integration
D. irepower Threat Defense
View answer
Correct Answer: B
Question #80
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)
A. uality of service
B. ime synchronization
C. etwork address translations
D. ntrusion policy
View answer
Correct Answer: BC
Question #81
Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?
A. ybrid
B. ommunity
C. rivate
D. ublic
View answer
Correct Answer: B
Question #82
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. ser input validation in a web page or web application
B. inux and Windows operating systems
C. atabase
D. eb page images
View answer
Correct Answer: A
Question #83
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
A. ransparent
B. edirection
C. orward
D. roxy gateway
View answer
Correct Answer: A
Question #84
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
A. SCP value
B. ource interface
C. xporter name
D. xporter description
View answer
Correct Answer: C
Question #85
DRAG DROP (Drag and Drop is not supported)Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #86
An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)
A. t defines what data is going to be encrypted via the VPN
B. t configures the pre-shared authentication key
C. t prevents all IP addresses from connecting to the VPN server
D. t configures the local address for the VPN server
View answer
Correct Answer: BE
Question #87
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
A. ultiple context mode
B. ser deployment of Layer 3 networks
C. Pv6
D. lustering
View answer
Correct Answer: B
Question #88
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so.Which command is required to enable the client to accept the server's authentication key?
A. tp peer 1
B. tp server 1
C. tp server 1
D. tp peer 1
View answer
Correct Answer: B
Question #89
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
A. elemetry uses a pull mehod, which makes it more reliable than SNMP
B. elemetry uses push and pull, which makes it more scalable than SNMP
C. elemetry uses push and pull which makes it more secure than SNMP
D. elemetry uses a push method which makes it faster than SNMP
View answer
Correct Answer: D
Question #90
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?(Choose two)
A. ompliant
B. nknown
C. uthorized
D. oncompliant
View answer
Correct Answer: BD
Question #91
Why is it important to implement MFA inside of an organization?
A. o prevent man-the-middle attacks from being successful
B. o prevent DoS attacks from being successful
C. o prevent brute force attacks from being successful
D. o prevent phishing attacks from being successful
View answer
Correct Answer: C
Question #92
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
A. KEv1
B. H
C. SP
D. KEv2
View answer
Correct Answer: C
Question #93
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
A. he attack is fragmented into groups of 16 octets before transmission
B. he attack is fragmented into groups of 8 octets before transmission
C. hort synchronized bursts of traffic are used to disrupt TCP connections
D. alformed packets are used to crash systems
E. ublicly accessible DNS servers are typically used to execute the attack
View answer
Correct Answer: BD
Question #94
Under which two circumstances is a CoA issued? (Choose two)
A. et the IP address of an interface
B. omplete no configurations
C. omplete all configurations
D. dd subinterfaces
View answer
Correct Answer: BD
Question #95
Which command enables 802.1X globally on a Cisco switch?
A.
B.
C.
D. 1
View answer
Correct Answer: A
Question #96
Which two key and block sizes are valid for AES? (Choose two)
A. ES-GCM
B. HA-96
C. ES-256
D. HA-384
View answer
Correct Answer: CD
Question #97
An organization wants to secure users, data, and applications in the cloud. The solution must be API- based and operate as a cloud-native CASB.Which solution must be used for this implementation?
A. isco Cloudlock
B. isco Cloud Email Security
C. isco Firepower Next-Generation Firewall
D. isco Umbrella
View answer
Correct Answer: A
Question #98
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.However, the connection is failing.Which action should be taken to accomplish this goal?
A. isable telnet using the no ip telnet command
B. nable the SSH server using the ip ssh server command
C. onfigure the port using the ip ssh port 22 command
D. enerate the RSA key using the crypto key generate rsa command
View answer
Correct Answer: D
Question #99
05. You are hired to configure a site-to-site VPN between a Cisco FTD device and a Cisco IOS-XE router. Which of the following encryption and hashing protocols will you select for optimal security?
A. ES-192,SHA,Diffie-HellmanGroup21
B. DEA,SHA,Diffie-HellmanGroup2
C. ES-192,SHA,Diffie-HellmanGroup5
D. ES-256,SHA,Diffie-HellmanGroup21
View answer
Correct Answer: A
Question #100
09. The Cisco ESA acts as a mail transfer agent. The Cisco ESA is the destination of which public records?
A. A
B. X
C. -NAME
D. lloftheseanswersarecorrec
View answer
Correct Answer: B
Question #101
Which risk is created when using an Internet browser to access cloud-based service?
A. isconfiguration of infrastructure, which allows unauthorized access
B. ntermittent connection to the cloud connectors
C. ulnerabilities within protocol
D. nsecure implementation of API
View answer
Correct Answer: D
Question #102
DRAG DROP (Drag and Drop is not supported)Drag and drop the VPN functions from the left onto the description on the right.
A. ee Explanation section for answer
View answer
Correct Answer: A
Question #103
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category.Which reputation score should be selected to accomplish this goal?
A.
B.
C.
D. 0
View answer
Correct Answer: D
Question #104
What is a difference between an XSS attack and an SQL injection attack?
A. SQL injection is a hacking method used to attack SQL databases, whereas XSS attack can exist in many different types of applications
B. XSS attacks are used to steal information from databases, whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them
C. XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications
D. SQL injection attacks are used to steal information from databases, whereas XSS attacks are used to redirect users to websites where attackers can steal data from them
View answer
Correct Answer: D
Question #105
What is the difference between a vulnerability and an exploit?
A. A vulnerability is a weakness that can be exploited by an attacker
B. A vulnerability is a hypothetical event for an attacker to exploit
C. An exploit is a hypothetical event that causes a vulnerability in the network
D. An exploit is a weakness that can cause a vulnerability in the network
View answer
Correct Answer: A
Question #106
Which Dos attack uses fragmented packets to crash a target machine?
A. o prevent theft of the endpoints
B. ecause defense-in-depth stops at the network
C. o expose the endpoint to more threats
D. ecause human error or insider threats will still exist
View answer
Correct Answer: C

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: