Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Questions and Answers
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being
accessed via the firewall which requires that the administrator input the bad URL categories that the
organization wants blocked into the access policy. Which solution should be used to meet this requirement?
What is a difference between a DoS attack and a DDoS attack?
Which role is a default guest type in Cisco ISE?
Which ESA implementation method segregates inbound and outbound email?
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco Secure Email Gateway?
Which component of Cisco umbrella architecture increases reliability of the service?
When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?
Drag and drop the capabilities from the left onto the correct technologies on the right.
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?
Which endpoint solution protects a user from a phishing attack?
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
Which threat intelligence standard contains malware hashes?
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.
The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?
Refer to the exhibit.
What does the number 15 represent in this configuration?
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which
probe must be enabled for this type of profiling to work?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the
corporate network. The endpoints must have the corporate antivirus application installed and be running the
latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the
network?
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and
operate as a cloud-native CASB. Which solution must be used for this implementation?
What are two DDoS attack categories? (Choose two)
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to
prevent the session during the initial TCP communication?
An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?
Which VPN provides scalability for organizations with many remote sites?
What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Which interface mode does a Cisco Secure IPS device use to block suspicious traffic?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
Which functions of an SDN architecture require southbound APIs to enable communication?
What is a benefit of performing device compliance?
A malicious user gained network access by spoofing printer connections that were authorized using MAB on
four different switch ports at the same time. What two catalyst switch security features will prevent further
violations? (Choose two)
Which technology provides a combination of endpoint protection endpoint detection, and response?
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN
and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco
security appliance meets these requirements?
A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?
How is DNS tunneling used to exfiltrate data out of a corporate network?
What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
Refer to the exhibit. When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZ_inside zone once the configuration is deployed?
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)
What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?
When NetFlow is applied to an interface, which component creates the flow monitor cache that is used
to collect traffic based on the key and nonkey fields in the configured record?
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the network?
An organization wants to secure data in a cloud environment. Its security model requires that all users be
authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
Which form of attack is launched using botnets?
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
Which two actions does the Cisco ISE posture module provide that ensures endpoint security? (Choose two.)
Which system performs compliance checks and remote wiping?
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
Which ASA deployment mode can provide separation of management on a shared appliance?
Which Cisco firewall solution supports configuration via Cisco Policy Language?
Which two preventive measures are used to control cross-site scripting? (Choose two)
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
What is the benefit of integrating Cisco ISE with a MDM solution?
What are two features of NetFlow flow monitoring? (Choose two)
With which components does a southbound API within a software-defined network architecture communicate?
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?
What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?
What is a benefit of using Cisco FMC over Cisco ASDM?
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
What is the function of the Context Directory Agent?
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization
needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of
172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
An engineer is configuring device-hardening on a router in order to prevent credentials from being seen
if the router configuration was compromised. Which command should be used?
What is a difference between GRE over IPsec and IPsec with crypto map?
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
Which benefit does DMVPN provide over GETVPN?
Drag and drop the concepts from the left onto the correct descriptions on the right
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally
manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Which technology must be used to implement secure VPN connectivity among company branches over a
private IP cloud with any-to-any scalable connectivity?
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
Refer to the exhibit.
An engineer must configure a Cisco switch to perform PPP authentication via a TACACS server located at IP address 10.1.1.10. Authentication must fall back to the local database using the username LocalUser and password C1Sc0451069341l if the TACACS server is unreachable.
Drag and drop the commands from the left onto the corresponding configuration steps on the right.
What is a difference between weak passwords and missing encryption?
What is the purpose of the Cisco Endpoint loC feature?
Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat?
Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?
What is a characteristic of a bridge group in ASA Firewall transparent mode?
Which technology is used to improve web traffic performance by proxy caching?
For a given policy in Cisco Umbrella, how should a customer block websites based on a custom list?
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this
requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
Refer to the exhibit.
Which command was used to display this output?
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?
Refer to the exhibit. An engineer is implementing a certificate-based VPN. What is the result of the existing configuration?
In which two customer environments is the Cisco Secure Web Appliance Virtual connector traffic direction method selected? (Choose two.)
Which two behavioral patterns characterize a ping of death attack? (Choose two)
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the
configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
What is a benefit of an endpoint patch management strategy?
Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers
and can be stopped by Cisco Umbrella?
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data
within a network perimeter?
An administrator needs to configure the Cisco ASA via ASDM such that the network management system
can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?
(Choose two.)
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
What is the term for the concept of limiting communication between applications or containers on the same node?
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed
through the Cisco Umbrella network. Which action tests the routing?
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
Which API technology with SDN architecture is used to communicate with a controller and network devices such as routers and switches?
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
A network administrator is configuring SNMPv3 on a new router. The users have already been created;
however, an additional configuration is needed to facilitate access to the SNMP views. What must the
administrator do to accomplish this?
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
What is the primary benefit of deploying an ESA in hybrid mode?
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Which Cisco Secure Client module is integrated with Splunk Enterprise to provide monitoring capabilities to administrators to allow them to view endpoint application usage?
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
An engineer must implement a file transfer solution between a company's data center and branches. The company has numerous servers hosted in a hybrid cloud implementation. The file transfer protocol must support authentication, protect the data against unauthorized access, and ensure that users cannot list directories or remove files remotely. Which protocol must be used?
Refer to the exhibit,
which command results in these messages when attempting to troubleshoot an iPsec VPN connection?
Refer to the exhibit.
What will occur when this device tries to connect to the port?
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA?
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
A security engineer is tasked with configuring TACACS on a Cisco ASA firewall. The engineer must be able to access the firewall command line interface remotely. The authentication must fall back to the local user database of the Cisco ASA firewall. AAA server group named TACACS-GROUP is already configured with TACACS server IP address 192.168.10.10 and key C1sc0512222832!. Which configuration must be done next to meet the requirement?
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?
Refer to the exhibit.
What will happen when this Python script is run?
Which network monitoring solution uses streams and pushes operational data to provide a near real-time view
of activity?
Which type of attack is social engineering?
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
Which encryption algorithm provides highly secure VPN communications?
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
Which risk is created when using an Internet browser to access cloud-based service?
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
Which security solution protects users leveraging DNS-layer security?
Which VPN technology supports a multivendor environment and secure traffic between sites?
Which cloud service model offers an environment for cloud consumers to develop and deploy applications
without needing to manage or maintain the underlying cloud infrastructure?
What is the purpose of CA in a PKI?
Which two products are used to forecast capacity needs accurately in real time? (Choose two.)
Which type of algorithm provides the highest level of protection against brute-force attacks?
How does a WCCP-configured router identify if the Cisco WSA is functional?
Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
Refer to the exhibit.
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access.
Most PCs and IP phones can connect and authenticate using their machine certificate credentials. However printer and video cameras cannot base d on the interface configuration provided, what must be to get these devices on to the network using Cisco ISE for authentication and authorization while maintaining security controls?
Which firewall mode does a Cisco Adaptive Security Appliance use to inspect Layer 2 traffic?
Refer to the exhibit. A network engineer must retrieve the interface configuration on a Cisco router by using the NETCONF API. The engineer uses a python script to automate the activity.
Which code snippet completes the script?
A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?
What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?
An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway.
The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of
certificate should be presented to the end-user to accomplish this goal?
A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)
Drag and drop the common security threats from the left onto the definitions on the right.
What is a characteristic of Firepower NGIPS inline deployment mode?
An engineer implements Cisco CloudLock to secure a Microsoft Office 365 application in the cloud. The engineer must configure protection for corporate files in case of any incidents. Which two actions must be taken to complete the implementation? (Choose two.)
What are two workload security models? (Choose two.)
Which technology must De used to Implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
What is a commonality between DMVPN and FlexVPN technologies?
An organization wants to provide visibility and to identify active threats in its network using a VM. The
organization wants to extract metadata from network packet flow while ensuring that payloads are not retained
or transferred outside the network. Which solution meets these requirements?
What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)
Which method must be used to connect Cisco Secure Workload to external orchestrators at a client site when the client does not allow incoming connections?
Which two descriptions of AES encryption are true? (Choose two)
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)
What is the concept of Cl/CD pipelining?
Which category includes DoS Attacks?
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
Which Cisco solution integrates industry-leading artificial intelligence and machine learning analytics and an assurance database to review the security posture and maintain visibility of an organization’s cloud environment?
How does DNS Tunneling exfiltrate data?
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your
environment?
How does Cisco Umbrella archive logs to an enterprise owned storage?
Which feature is used to restrict communication between interfaces on a Cisco ASA?
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
Which Dos attack uses fragmented packets to crash a target machine?
What is a difference between FlexVPN and DMVPN?
v
Refer to the exhibit When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZjnside zone once the configuration is deployed?
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a
recipient address. Which list contains the allowed recipient addresses?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
An engineer is configuring cloud logging on Cisco ASA and needs events to compress. Which component must be configured to accomplish this goal?
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management
port conflicts with other communications on the network and must be changed. What must be done to ensure
that all devices can communicate together?
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)
How many interfaces per bridge group does an ASA bridge group deployment support?
While using Cisco Secure Firewall's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
Refer to the exhibit. What function does the API key perform while working with
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network
is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?
Which two mechanisms are used to control phishing attacks? (Choose two)
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
Which service allows a user to export application usage and performance statistics with Cisco Application Visibility and Control?
What limits communication between applications or containers on the same node?
What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)
Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Secure Firewall Threat Defense appliance. What is causing this issue?
An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?
Which action configures the IEEE 802.1X Flexible Authentication feature lo support Layer 3 authentication mechanisms?
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current
encryption technology?
Drag and drop the solutions from the left onto the solution's benefits on the right.