Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Questions and Answers
What is a benefit of using Cisco Umbrella?
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
Which problem Is solved by deploying a multicontext firewall?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Which endpoint solution protects a user from a phishing attack?
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?
How is DNS tunneling used to exfiltrate data out of a corporate network?
What is a benefit of using a multifactor authentication strategy?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the
endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?
Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
What is a characteristic of Dynamic ARP Inspection?
Which type of encryption uses a public key and private key?
An engineer is deploying a Cisco Secure Email Gateway and must ensure it reaches the Cisco update servers to retrieve new rules. The engineer must now manually configure the Outbreak Filter rules on an AsyncOS for Cisco Secure Email Gateway. Only outdated rules must be replaced. Up-to-date rules must be retained. Which action must the engineer take next to complete the configuration?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN
and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco
security appliance meets these requirements?
Refer to the exhibit.
Which command was used to display this output?
Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?
Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)
Refer to the exhibit.
An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?
A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
Which algorithm is an NGE hash function?
Refer to the exhibit.
What will occur when this device tries to connect to the port?
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from
Cisco and other vendors to share data and interoperate with each other?
Refer to the exhibit.
Consider that any feature of DNS requests, such as the length off the domain name
and the number of subdomains, can be used to construct models of expected behavior to which
observed values can be compared. Which type of malicious attack are these values associated with?
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
Which two fields are defined in the NetFlow flow? (Choose two)
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to
ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the
network?
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
Drag and drop the concepts from the left onto the correct descriptions on the right
What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?
An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
Which Cisco security solution protects remote users against phishing attacks when they are not connected to
the VPN?
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
What is the difference between deceptive phishing and spear phishing?
What is the benefit of installing Cisco AMP for Endpoints on a network?
Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?
An engineer needs to configure an access control policy rule to always send traffic for inspection without
using the default action. Which action should be configured for this rule?
Under which two circumstances is a CoA issued? (Choose two)
Which two parameters are used for device compliance checks? (Choose two.)
Refer to the exhibit.
What is a result of the configuration?
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an
organization? (Choose two)
Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two.)
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?
What is a difference between FlexVPN and DMVPN?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which
probe must be enabled for this type of profiling to work?
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
Refer to the exhibit.
What does the API key do while working with
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
A network administrator is configuring a rule in an access control policy to block certain URLs and selects the “Chat and Instant Messaging” category. Which reputation score should be selected to accomplish this goal?
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also
provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Which two capabilities does TAXII support? (Choose two)
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
An engineer must enable Outbreak Filters globally on an AsyncOS for Cisco Secure Email Gateway to protect the network from large-scale malware attacks. Drag and drop the steps from the left into the sequence on the right to complete the configuration.
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is
deleted from an identity group?
What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?
What are two functions of TAXII in threat intelligence sharing? (Choose two.)
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?
What are two functions of IKEv1 but not IKEv2? (Choose two)
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Refer to the exhibit. A network engineer must configure a Cisco router to send traps using SNMPv3. The engineer configures a remote user to receive traps and sets the security level to use authentication without privacy. Which command completes the configuration?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view
of activity?
An engineer must configure Cisco AMP for Endpoints so that it contains a list of files that should not be executed by users. These files must not be quarantined. Which action meets this configuration requirement?
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
In which scenario is endpoint-based security the solution?
Which type of algorithm provides the highest level of protection against brute-force attacks?
Which information is required when adding a device to Firepower Management Center?
An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?
Which feature is configured for managed devices in the device platform settings of the Firepower Management
Center?
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention
System?
Refer to the exhibit.
What does the API do when connected to a Cisco security appliance?
Which two devices support WCCP for traffic redirection? (Choose two.)
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Which open source tool does Cisco use to create graphical visualizations of network telemetry on Cisco IOS XE devices?
Which system performs compliance checks and remote wiping?
Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and all servers must communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication between DNS servers and the file server?
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
Which Cisco security solution secures public, private, hybrid, and community clouds?
DoS attacks are categorized as what?
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
Which Dos attack uses fragmented packets to crash a target machine?
Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.
Which threat intelligence standard contains malware hashes?
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
When a Cisco Secure Web Appliance checks a web request, what occurs if it is unable to match a user-defined policy?
What is the primary role of the Cisco Email Security Appliance?
Which risk is created when using an Internet browser to access cloud-based service?
Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)
What is a capability of Cisco ASA Netflow?
An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway.
The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of
certificate should be presented to the end-user to accomplish this goal?
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)
Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
Which action configures the IEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms?
A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?
Which Cisco network security device supports contextual awareness?
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites
but other sites are not accessible due to an error. Why is the error occurring?
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed
through the Cisco Umbrella network. Which action tests the routing?
What is a benefit of using Cisco FMC over Cisco ASDM?
What is the purpose of the certificate signing request when adding a new certificate for a server?
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK
and sequence. Which protocol accomplishes this goal?
What is the purpose of the My Devices Portal in a Cisco ISE environment?
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
Which two capabilities does an MDM provide? (Choose two.)
Which solution supports high availability in routed or transparent mode as well as in northbound and
southbound deployments?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
What must be enabled to secure SaaS-based applications?
What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Which VPN provides scalability for organizations with many remote sites?
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
Which encryption algorithm provides highly secure VPN communications?
In which cloud services model is the tenant responsible for virtual machine OS patching?
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
What are two DDoS attack categories? (Choose two)
Refer to the exhibit.
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
Which process is used to obtain a certificate from a CA?
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly
identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
Based on the NIST 800-145 guide, which cloud architecture is provisioned for exclusive use by a specific group of consumers from different organizations and may be owned, managed, and operated by one or more of those organizations?
Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers
and can be stopped by Cisco Umbrella?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a
recipient address. Which list contains the allowed recipient addresses?
Which ASA deployment mode can provide separation of management on a shared appliance?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?
Drag and drop the Cisco CWS redirection options from the left onto the capabilities on the right.
How is a cross-site scripting attack executed?
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Which ESA implementation method segregates inbound and outbound email?
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA
command must be used?
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized
solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over
to Cisco FTDs. Which solution meets the needs of the organization?
Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
Which function is the primary function of Cisco AMP threat Grid?
A Cisco Secure Email Gateway network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Secure Email Gateway is not dropping files that have an undetermined verdict. What is causing this issue?
What is the target in a phishing attack?
What is the recommendation in a zero-trust model before granting access to corporate applications and resources?
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
What is the benefit of integrating Cisco ISE with a MDM solution?
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?
An engineer is implementing DHCP security mechanisms and needs the ability to add additional attributes to profiles that are created within Cisco ISE Which action accomplishes this task?
Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?
Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?
Which two risks is a company vulnerable to if it does not have a well-established patching solution for
endpoints? (Choose two)
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
Which service allows a user to export application usage and performance statistics with Cisco Application Visibility and Control?
What is a benefit of an endpoint patch management strategy?
A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.
They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
An engineer must deploy Cisco Secure Email with Cloud URL Analysis and must meet these requirements:
To protect the network from large-scale virus outbreaks
To protect the network from non-viral attacks such as phishing scams and malware distribution
To provide active analysis of the structure of the URL and information about the domain and page contents
Which two prerequisites must the engineer ensure are configured? (Choose two.)
What is a description of microsegmentation?
Which baseline form of telemetry is recommended for network infrastructure devices?
Which two mechanisms are used to control phishing attacks? (Choose two)
Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system?
A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
Which service allows a user export application usage and performance statistics with Cisco Application Visibility
and control?
Drag and drop the capabilities from the left onto the correct technologies on the right.
A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?
Which Cisco AMP file disposition valid?
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint
Protection Platform?