CCNP SCOR 350-701 Exam Questions PDF
Document Details
Uploaded by jmclark59
null
Cisco
Alan Inman
Tags
Related
- Software-Defined Networking, Network Function Virtualisation et Network Slicing PDF
- Chapter 2 Software Define Networking (SDN) PDF
- Chapter 3: Software-Defined Networking Security and Network Programmability PDF
- ECE 4436A Networking: Principles, Protocols, and Architectures PDF
- SDN Class Notes PDF
- SDN PDF
Summary
This document contains flashcards with practice questions for the Cisco CCNP SCOR 350-701 exam. Topics include SDN architecture, REST APIs on Cisco ASA, and different types of cyber security attacks.
Full Transcript
11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape ...
11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Study These Flashcards Cisco CCNP SCOR 350-701 > CCNP SCOR 350-701 - Actual Exam Questions > Flashcards CCNP SCOR 350-701 - Actual Exam Questions Flashcards 1 Q Which functions of an SDN architecture require southbound APIs to enable communication? A. SDN controller and the network elements B. management console and the SDN controller C. management console and the cloud D. SDN controller and the cloud A A) SDN controller and the network elements Southbound APIs that relay information between the controller and the individual network devices (such as switches, access points, routers, and firewalls) https://www.cisco.com/c/en/us/solutions/software-defined-networking/overview.html 2 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 1/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.) A. put Study These Flashcards B. options C. get D. push E. connect A A-C Request Structure Available request methods are: GET – Retrieves data from the specified object. PUT – Adds the supplied information to the specified object; returns a 404 Resource Not Found error if the object does not exist. POST – Creates the object with the supplied information. DELETE – Deletes the specified object. PATCH – Applies partial modifications to the specified object. https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html#pgfId- 68826 3 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 2/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network? A. SDN controller and the cloud B. management console and theStudy SDN These Flashcards controller C. management console and the cloud D. SDN controller and the management solution A D) SDN controller and the management solution Northbound APIs are the link between the applications and the SDN controller. The applications can tell the network what they need (data, storage, bandwidth, and so on) and the network can deliver those resources, or communicate what it has. These APIs support a wide variety of applications 4 Q What is a feature of the open platform capabilities of Cisco DNA Center? A. application adapters B. domain integration C. intent-based APIs D. automation adapters A C) intent-based APIs The Cisco DNA Center open platform for intent-based networking provides 360-degree extensibility across multiple components, including: Intent-based APIs https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 3/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Process adapters Domain adapters SDKs Study These Flashcards 5 Q Refer to the exhibit. What does the API do when connected to a Cisco security appliance? A. create an SNMP pull mechanism for managing AMP B. gather network telemetry information from AMP for endpoints C. get the process and PID information from the computers in the network D. gather the network interface information about the computers AMP sees A D. Gather the network interface information about the computers AMP sees Verified correct. 6 Q Which form of attack is launched using botnets? A. TCP flood https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 4/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape B. DDOS C. DOS D. virus Study These Flashcards A B 7 Q In which form of attack is alternate encoding, such as hexadecimal representation, most often observed? A. smurf B. distributed denial of service C. cross-site scripting D. rootkit exploit A C. cross-site scripting Verified correct 8 Q Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities? A. user input validation in a web page or web application https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 5/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape B. Linux and Windows operating systems C. database D. web page images Study These Flashcards A A. user input validation in a web page or web application Verified correct 9 Q What is the difference between deceptive phishing and spear phishing? A. Deceptive phishing is an attack aimed at a specific user in the organization who holds a C-level role. B. A spear-phishing campaign is aimed at a specific person versus a group of people. C. Spear phishing is when the attack is aimed at the C-level executives of an organization. D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage. A B. A spear-phishing campaign is aimed at a specific person versus a group of people Verified correct How well did you know this? https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 6/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 1 2 3 4 5 Not at all Perfectly 10 Study These Flashcards Q Which two behavioral patterns characterize a ping of death attack? (Choose two.) A. The attack is fragmented into groups of 16 octets before transmission B. The attack is fragmented into groups of 8 octets before transmission C. Short synchronized bursts of traffic are used to disrupt TCP connections D. Malformed packets are used to crash systems E. Publicly accessible DNS servers are typically used to execute the attack A B) The attack is fragmented into groups of 8 octets before transmission D) Malformed packets are used to crash systems 11 Q Which two mechanisms are used to control phishing attacks? (Choose two.) A. Enable browser alerts for fraudulent websites. B. Define security group memberships. C. Revoke expired CRL of the websites. D. Use antispyware software. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 7/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape E. Implement email filtering techniques. A A. Enable browser alerts for fraudulent websites. Study TheseEFlashcards 12 Q Which attack is commonly associated with C and C++ programming languages? A. Cross-site scripting B. Water holing C. DDoS D. Buffer overflow A D. Buffer overflow https://en.wikipedia.org/wiki/Buffer_overflow 13 Q Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.) A. Check integer, float, or Boolean string parameters to ensure accurate values. B. Use prepared statements and parameterized queries. C. Secure the connection between the web and the app tier. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 8/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. Write SQL code instead of using object-relational mapping libraries. E. Block SQL code execution in the web application database login. Study These Flashcards A A. Check integer, float, or Boolean string parameters to ensure accurate values. B. Use prepared statements and parameterized queries. https://en.wikipedia.org/wiki/SQL_injection 14 Q Which two kinds of attacks are prevented by multifactor authentication? (Choose two.) A. phishing B. brute force C. man-in-the-middle D. DDOS E. teardrop A A. phishing B. brute force https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco- mfa-password-security-infographic.pdf MFA protects against phishing, social engineering, and password brute-force attacks and secures your logins from attackers exploiting weak or stolen credentials. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 9/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 15 Q What are two rootkit types? (Choose two.) Study These Flashcards A. registry B. buffer mode C. user mode D. bootloader E. virtual A C. User mode D. Bootloader 16 Q How is DNS tunneling used to exfiltrate data out of a corporate network? A. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data C. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network D. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 10/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A B) It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data Study These Flashcards Once the desired data is obtained, the payload encodes the data as a series of 32 characters (0-9, A-Z) broken into short strings (3KJ242AIE9, PO28X977W,. 17 Q Which type of attack is social engineering? A. trojan B. MITM C. phishing D. malware A C. phishing 18 Q What are two DDoS attack categories? (Choose two.) A. protocol B. source-based C. database D. sequential https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 11/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape E. volume-based A Study These Flashcards A. protocol E. volume-based Protocol Attacks: Includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more Volume Based: Includes UDP floods, ICMP floods, and other spoofed-packet floods. …. … Application Layer Attacks. 19 Q In which type of attack does the attacker insert their machine between two hosts that are communicating with each other? A. man-in-the-middle B. LDAP injection C. insecure API D. cross-site scripting A A. man-in-the-middle 20 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 12/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape How does Cisco Advanced Phishing Protection protect users? A. It utilizes sensors that send messages securely. B. It uses machine learning and real-time behavior analytics. Study These Flashcards C. It validates the sender by using DKIM. D. It determines which identities are perceived by the sender. A B. It uses machine learning and real-time behavior analytics. Verified Cisco Advanced Phishing Protection provides Business Email Compromise (BEC) and phishing detection capabilities. It detects identity deception-based threats by performing reputation checks on sender addresses by using advanced machine learning techniques and added intelligence. This intelligence continuously adapts to drive a real-time understanding of senders and provides enhanced protection. 21 Q How does DNS Tunneling exfiltrate data? A. An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection. B. An attacker opens a reverse DNS shell to get into the clients system and installs malware on it. C. An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain. D. An attacker uses a non-standard DNS port to gain access to the organizations DNS servers in order to poison the resolutions. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 13/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A A) An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection. DNS tunneling exploits the DNSStudy These protocol Flashcards to tunnel malware and other data through a client-server model. The attacker registers a domain, such as badsite.com. The domain’s name server points to the attacker’s server, where a tunneling malware program is installed. 22 Q An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the systems applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text? A. unencrypted links for traffic B. weak passwords for authentication C. improper file security D. software bugs on applications A A. unencrypted links for traffic 23 Q A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing? https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 14/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. SYN flood B. slowloris C. phishing Study These Flashcards D. pharming A A. SYN flood 24 Q Which two preventive measures are used to control cross-site scripting? (Choose two.) A. Enable client-side scripts on a per-domain basis. B. Incorporate contextual output encoding/escaping. C. Disable cookie inspection in the HTML inspection engine. D. Run untrusted HTML input through an HTML sanitization engine. E. SameSite cookie attribute should not be used. A A. Enable client-side scripts on a per-domain basis D. Run untrusted HTML input through an HTML sanitization engine. Verified correct 25 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 15/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Which threat involves software being used to gain unauthorized access to a computer system? A. ping of death Study These Flashcards B. HTTP flood C. NTP amplification D. virus A D. virus 26 Q Which two capabilities does TAXII support? (Choose two.) A. exchange B. pull messaging C. binding D. correlation E. mitigating A A. exchange B. pull messaging Verified correct https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 16/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 27 Q Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.) Study These Flashcards A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically. B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device. C. The IPsec configuration that is set up on the active device must be duplicated on the standby device. D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically. E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device. A C. The IPsec configuration that is set up on the active device must be duplicated on the standby device. E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device. https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15- mt/sec-vpn-availability-15-mt-book/sec-state-fail- ipsec.html#:~:text=Stateful%20failover%20for%20IPsec%20requires,accelerator%20or %20identical%20encryption%20accelerators. Restrictions for Stateful Failover for IPsec When configuring redundancy for a VPN, the following restrictions apply: Both the active and standby devices must run the identical version of the Cisco IOS software, and both the active and standby devices must be connected via a hub or switch. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 17/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 28 Q Which algorithm provides encryption and authentication for data plane Study These Flashcards communication? A. AES-GCM B. SHA-96 C. AES-256 D. SHA-384 A A. AES-GCM https://en.wikipedia.org/wiki/Galois/Counter_Mode In the Cisco SD-WAN network for unicast traffic, data plane encryption is done by AES- 256-GCM, a symmetric-key algorithm that uses the same key to encrypt outgoing packets and to decrypt incoming packets. Each router periodically generates an AES key for its data path (specifically, one key per TLOC) and transmits this key to the vSmart controller in OMP route packets, which are similar to IP route updates. These packets contain information that the vSmart controller uses to determine the network topology, including the router’s TLOC (a tuple of the system IP address and traffic color) and AES key. The vSmart controller then places these OMP route packets into reachability advertisements that it sends to the other routers in the network. In this way, the AES keys for all the routers are distributed across the network. Even though the key exchange is symmetric, the routers use it in an asymmetric fashion. The result is a simple and scalable key exchange process that uses the Cisco vSmart Controller. https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/s ecurity-book/security-overview.html#id_112385 29 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 18/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Q DRAG DROP - Drag and drop the capabilities from the left onto the correct technologies on the right. Select and Place: Study These Flashcards A 30 Q Which two key and block sizes are valid for AES? (Choose two.) A. 64-bit block size, 112-bit key length B. 64-bit block size, 168-bit key length C. 128-bit block size, 192-bit key length D. 128-bit block size, 256-bit key length E. 192-bit block size, 256-bit key length A C. 128-bit block size, 192-bit key length D. 128-bit block size, 256-bit key length https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 19/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape https://en.wikipedia.org/wiki/Advanced_Encryption_Standard 31 Study These Flashcards Q Which two descriptions of AES encryption are true? (Choose two.) A. AES is less secure than 3DES. B. AES is more secure than 3DES. C. AES can use a 168-bit key for encryption. D. AES can use a 256-bit key for encryption. E. AES encrypts and decrypts a key three times in sequence. A B. AES is more secure than 3DES D. AES can use a 256-bit key for encryption. 32 Q What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol? A. STIX B. XMPP C. pxGrid D. SMTP https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 20/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A A. STIX Study These Flashcards 33 Q DRAG DROP - Drag and drop the descriptions from the left onto the correct protocol versions on the right. Select and Place: A 34 Q Which VPN technology can support a multivendor environment and secure traffic between sites? A. SSL VPN B. GET VPN C. FlexVPN https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 21/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. DMVPN A Study These Flashcards C. FlexVPN 35 Q Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity? A. DMVPN B. FlexVPN C. IPsec DVTI D. GET VPN A D. GET VPN 36 Q What is the commonality between DMVPN and FlexVPN technologies? A. FlexVPN and DMVPN use the new key management protocol, IKEv2 B. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes C. IOS routers run the same NHRP code for DMVPN and FlexVPN https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 22/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. FlexVPN and DMVPN use the same hashing algorithms A C. IOS routers run the same NHRP code for DMVPN and FlexVPN Study These Flashcards 37 Q Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN? A. DTLSv1 B. TLSv1 C. TLSv1.1 D. TLSv1.2 A A. DTLSv1 38 Q Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats? A. Talos B. PSIRT C. SCIRT https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 23/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. DEVNET A A. Talos Study These Flashcards 39 Q When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used? A. Common Vulnerabilities, Exploits and Threats B. Common Vulnerabilities and Exposures C. Common Exploits and Vulnerabilities D. Common Security Exploits A B. Common Vulnerabilities and Exposures 40 Q Which two features of Cisco DNA Center are used in a Software-Defined Network solution? (Choose two.) A. accounting B. assurance C. automation D. authentication https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 24/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape E. encryption A Study These Flashcards B. Assurance C. Automation 41 Q What provides the ability to program and monitor networks from somewhere other than the DNAC GUI? A. ASDM B. NetFlow C. API D. desktop client A C. API 42 Q What is a function of 3DES in reference to cryptography? A. It encrypts traffic. B. It creates one-time-use passwords. C. It hashes files. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 25/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. It generates private keys. A Study These Flashcards A. It encrypts traffic. 43 Q Which two activities can be done using Cisco DNA Center? (Choose two.) A. DHCP B. design C. accounting D. DNS E. provision A B. Design E. Provision 44 Q Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server? A. terminal https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 26/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape B. selfsigned C. url D. profile Study These Flashcards A D. profile 45 Q Which type of API is being used when a security application notifies a controller within a software-defined network architecture about a specific security threat? A. southbound API B. westbound API C. eastbound API D. northbound API A D. northbound API 46 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 27/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2? A. sniffing the packets between the two hosts Study These Flashcards B. sending continuous pings AC. overflowing the buffers memory D. inserting malicious commands D. inserting into the malicious database into the database commands 47 Q What is the function of SDN southbound API protocols? A. to allow for the static configuration of control plane applications B. to enable the controller to use REST C. to enable the controller to make changes D. to allow for the dynamic configuration of control plane applications A C. to enable the controller to make changes 48 Q DRAG DROP - Drag and drop the threats from the left onto examples of that threat on the right. Select and Place: https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 28/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Study These Flashcards A 49 Q What is the difference between Cross-site Scripting and SQL Injection attacks? A. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated. B. Cross-site Scripting is an attack where code is executed from the server-side, whereas SQL Injection is an attack where code is executed from the client-side. C. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack. D. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser. A B. Cross-site Scripting is an attack where code is executed from the server-side, whereas SQL Injection is an attack where code is executed from the client-side. 50 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 29/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Q Drag and drop the common security threats from the left onto the definitions on the right. Select and Place: Study These Flashcards A 1. Worm 2. Spam 3. Botnet 4. Phishing 51 Q Which type of dashboard does Cisco DNA Center provide for complete control of the network? A. distributed management B. service management C. application management D. centralized management https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 30/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A D. centralized management Study These 52Flashcards Q A. The list of computers, policies, and connector statuses will be received from Cisco AMP. B. The list of computers and their current vulnerabilities will be received from Cisco AMP. C. The compromised computers and malware trajectories will be received from Cisco AMP. D. The compromised computers and what compromised them will be received from Cisco AMP. A A. The list of computers, policies, and connector statuses will be received from Cisco AMP. 53 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 31/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. The hostname will be printed for the client in the client ID field. B. The hostname will be translated to an IP address and printed. C. The script will pull all computer hostnames and print them. Study These Flashcards D. The script will translate the IP address to FQDN and print it. A C. The script will pull all computer hostnames and print them. 54 Q With which components does a southbound API within a software-defined network architecture communicate? A. applications B. controllers within the network C. appliances D. devices such as routers and switches A D. devices such as routers and switches 55 Q Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources? https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 32/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. BYOD onboarding B. MAC authentication bypass C. client provisioning Study These Flashcards D. Simple Certificate Enrollment Protocol A D. Simple Certificate Enrollment Protocol 56 Q What are two characteristics of Cisco DNA Center APIs? (Choose two.) A. They are Cisco proprietary. B. They do not support Python scripts. C. They view the overall health of the network. D. They quickly provision new devices. E. Postman is required to utilize Cisco DNA Center API calls. A C. They view the overall health of the network. D. They quickly provision new devices. 57 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 33/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true? A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled. Study B. A sysopt command can be used These Flashcards to enable NSEL on a specific interface. C. NSEL can be used without a collector configured. D. A flow-export event type must be defined under a policy. A D. A flow-export event type must be defined under a policy. 58 Q Which feature requires a network discovery policy on the Cisco Firepower NGIPS? A. security intelligence B. impact flags C. health monitoring D. URL filtering A B. impact flags https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fp mc-config-guide-v61/introduction_to_network_discovery_and_identity.html? bookSearch=true 59 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 34/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Q Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System? A. correlation Study These Flashcards B. intrusion C. access control D. network discovery A D. network discovery 60 Q What is a characteristic of traffic storm control behavior? A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval. B. Traffic storm control cannot determine if the packet is unicast or broadcast. C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval. D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast. A https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 35/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval. 61 Q DRAG DROP - Study These Flashcards Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right. Select and Place: A 62 Q Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true? A. The authentication request contains only a password B. The authentication request contains only a username C. The authentication and authorization requests are grouped in a single packet. D. There is separate authentication and authorization request packets. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 36/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A Study These Flashcards C. The authentication and authorization requests are grouped in a single packet. 63 Q Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab? A. show authentication registrations B. show authentication method C. show dot1x all D. show authentication sessions A D. show authentication sessions Verified https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 37/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 64 Q Refer to the exhibit. What does the number 15 represent in this configuration? Study These Flashcards A. privilege level for an authorized user to this router B. access-list that identifies the SNMP devices that can access the router C. interval in seconds between SNMPv3 authentication attempts D. number of possible failed attempts until the SNMPv3 user is locked out A A. privilege level for an authorized user to this router 65 Q What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command? A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 38/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX A B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX Study These Flashcards 66 Q Which command enables 802.1X globally on a Cisco switch? A. dot1x system-auth-control B. dot1x pae authenticator C. authentication port-control auto D. aaa new-model A A. dot1x system-auth-control Verified To globally enable 802.1x authentication on the switch, use the dot1x system-auth- control command in Global Configuration mode. https://www.cisco.com/c/en/us/support/docs/smb/switches/cisco-small-business-300- series-managed-switches/smb5635-configure-global-802-1x-properties-on-a-switch- through-the-c.html 67 Q What is a characteristic of Dynamic ARP Inspection? https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 39/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database. B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted. Study These Flashcards C. DAI associates a trust state with each switch. D. DAI intercepts all ARP requests and responses on trusted ports only. A A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database. Verified Dynamic ARP Inspection To prevent ARP poisoning attacks such as the one described in the previous section, a switch must ensure that only valid ARP requests and responses are relayed. DAI prevents these attacks by intercepting all ARP requests and responses. Each of these intercepted packets is verified for valid MAC address to IP address bindings before the local ARP cache is updated or the packet is forwarded to the appropriate destination. Invalid ARP packets are dropped. DAI determines the validity of an ARP packet based on valid MAC address to IP address bindings stored in a trusted database. This database is built at runtime by DHCP snooping, provided that it is enabled on the VLANs and on the switch in question. In addition, DAI can also validate ARP packets against user-configured ARP ACLs in order to handle hosts that use statically configured IP addresses. DAI can also be configured to drop ARP packets when the IP addresses in the packet are invalid or when the MAC addresses in the body of the ARP packet do not match the addresses specified in the Ethernet header. 68 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 40/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Which statement about IOS zone-based firewalls is true? A. An unassigned interface can communicate with assigned interfaces B. Only one interface can be assigned to a zone. Study These Flashcards C. An interface can be assigned to multiple zones. D. An interface can be assigned only to one zone. A D. An interface can be assigned only to one zone. https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design- guide.html 69 Q When wired 802.1X authentication is implemented, which two components are required? (Choose two.) A. authentication server: Cisco Identity Service Engine B. supplicant: Cisco AnyConnect ISE Posture module C. authenticator: Cisco Catalyst switch D. authenticator: Cisco Identity Services Engine E. authentication server: Cisco Prime Infrastructure A A. authentication server: Cisco Identity Service Engine C. authenticator: Cisco Catalyst switch https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 41/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape https://www.lookingpoint.com/blog/ise-series-802.1x 70 Study These Flashcards Q Which SNMPv3 configuration must be used to support the strongest security possible? A. asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy B. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp- server host inside 10.255.254.1 version 3 andy C. asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy D. asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp- server host inside 10.255.254.1 version 3 andy A D. asa-host (config) # SNMP-server group myv3 v3 priv asa-host (config) #SNMP-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa- host (config) #SNMP-server host inside 10.255.254.1 version 3 andy 71 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 42/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Q Under which two circumstances is a CoA issued? (Choose two.) A. A new authentication rule was added to the policy on the Policy Service node. B. An endpoint is deleted on theStudy These Identity Flashcards Service Engine server. C. A new Identity Source Sequence is created and referenced in the authentication policy. D. An endpoint is profiled for the first time. E. A new Identity Service Engine server is added to the deployment with the Administration persona. A B. An endpoint is deleted on the Identity Service Engine server. D. An endpoint is profiled for the first time. https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html An Endpoint is Profiled for the First Time The profiler service issues a CoA for an endpoint that is not statically assigned and profiled for the first time i.e. the profile changes from an unknown to a known profile. An Endpoint is Deleted The profiler service issues a CoA when an endpoint is deleted from the Endpoints page and the endpoint is most likely disconnected or removed from the network. For more information on CoA exemptions, see the “CoA Exemptions” section. For more information on CoA configuration details, see Table 17-2. 72 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 43/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Which ASA deployment mode can provide separation of management on a shared appliance? A. DMZ multiple zone mode B. transparent firewall mode Study These Flashcards C. multiple context mode D. routed mode A C. multiple context mode 73 Q Refer to the exhibit. Which command was used to display this output? A. show dot1x all B. show dot1x C. show dot1x all summary D. show dot1x interface gi1/0/12 A A. show dot1x all https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 44/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/xe- 3se/3850/sec-user-8021x-xe-3se-3850-book/config-ieee-802x- 74 pba.html Q Study These Flashcards What is a characteristic of Cisco ASA NetFlow v9 Secure Event Logging? A. It tracks flow-create, flow-teardown, and flow-denied events. B. It provides stateless IP flow tracking that exports all records of a specific flow. C. It tracks the flow continuously and provides updates every 10 seconds. D. Its events match all traffic classes in parallel. A A. It tracks flow-create, flow-teardown, and flow-denied events Verified The ASA and ASASM implementations of NSEL provide the following major functions: Tracks flow-create, flow-teardown, and flow-denied events, and generates appropriate NSEL data records. Triggers flow-update events and generate appropriate NSEL data records. Defines and exports templates that describe the progression of a flow. Templates describe the format of the data records that are exported through NetFlow. Each event has several record formats or templates associated with it. Tracks configured NSEL collectors and delivers templates and data records to these configured NSEL collectors through NetFlow over UDP only. Sends template information periodically to NSEL collectors. Collectors receive template definitions, normally before receiving flow records. Filters NSEL events based on the traffic and event type through Modular Policy Framework, then sends records to different collectors. Traffic is matched based on the order in which classes are configured. After a match is found, no other classes are checked. The supported event types are flow-create, flow-denied, flow-teardown, flow- https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 45/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape update, and all. Records can be sent to different collectors. For example, with two collectors, you can do the following: – Log all flow-denied events that match ACL 1 to collector 1. Study These – Log all flow-create events to collector 1. Flashcards – Log all flow-teardown events to collector 2. – Log all flow-update events to collector 1. Delays the export of flow-create events. https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa- general-cli/monitor-nsel.html 75 Q A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0383320506 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal? A. snmp-server host inside 10.255.254.1 snmpv3 andy B. snmp-server host inside 10.255.254.1 version 3 myv3 C. snmp-server host inside 10.255.254.1 snmpv3 myv3 D. snmp-server host inside 10.255.254.1 version 3 andy A D. SNMP-server host inside 10.255.254.1 version 3 andy https://www.cisco.com/c/en/us/td/docs/security/asa/snmp/snmpv3_tools/snmpv3_1.h tml 76 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 46/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Q An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used? Study These Flashcards A. flow exporter B. ip flow-export destination 1.1.1.1 2055 C. flow-export destination inside 1.1.1.1 2055 D. ip flow monitor input A C. flow-export destination inside 1.1.1.1 2055 https://www.cisco.com/c/en/us/td/docs/security/asa/special/netflow/guide/asa_netflo w.html 77 Q A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0383320506 address 0.0.0.0 command on host A. The tunnel is not being established to host B. What action is needed to authenticate the VPN? A. Change the password on host A to the default password B. Enter the command with a different password on host B C. Enter the same command on host B D. Change isakmp to ikev2 in the command on host A A https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 47/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape C. Enter the same command on host B 78 Q Study These Flashcards Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.) A. Define a NetFlow collector by using the flow-export command B. Create a class map to match interesting traffic C. Create an ACL to allow UDP traffic on port 9996 D. Enable NetFlow Version 9 E. Apply NetFlow Exporter to the outside interface in the inbound direction A A. Define a NetFlow collector by using the flow-export command B. Create a class map to match interesting traffic 79 Q Refer to the exhibit. A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration? A. set the IP address of an interface B. add subinterfaces C. complete no configurations D. complete all configurations https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 48/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Study These Flashcards A C. complete no configurations 80 Q How many interfaces per bridge group does an ASA bridge group deployment support? A. up to 16 B. up to 2 C. up to 4 D. up to 8 A C. up to 4 81 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 49/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the Interface status of all interfaces, and there is no err-disabled interface. What is causing this problem? Study These Flashcards A. DHCP snooping has not been enabled on all VLANs B. Dynamic ARP inspection has not been enabled on all VLANs AC. The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users A. DHCP snooping has not been enabled on all VLANs D. The no ip arp inspection trust command is applied on all user host interfaces 82 Q DRAG DROP - Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right. Select and Place: A 83 Q https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 50/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape An engineer needs behavioral analysis to detect malicious activity on the hosts and is configuring the organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal? Study These Flashcards A. sFlow B. NetFlow C. mirror port D. VPC flow logs A D. VPC flow logs 84 Q An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing. Which action should be taken to accomplish this goal? A. Generate the RSA key using the crypto key generate rsa command. B. Configure the port using the ip ssh port 22 command. C. Enable the SSH server using the ip ssh server command. D. Disable telnet using the no ip telnet command. A A. Generate the RSA key using the crypto key generate rsa command Verified https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 51/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape Asks about “algorithms” such as RSA, not protocols like ssh. https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-xe-3se-3650-cr- book/sec-a1-xe-3se-3850-cr-book_chapter_0110.pdf Study These Flashcards 85 Q Refer to the exhibit. Which type of authentication is in use? A. POP3 authentication B. SMTP relay server authentication C. external user and relay mail authentication D. LDAP authentication for Microsoft Outlook A D. LDAP authentication for Microsoft Outlook 86 Q Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity? A. ip dhcp snooping limit 41 https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 52/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape B. ip dhcp snooping verify mac-address C. ip dhcp snooping trust D. ip dhcp snooping vlan 41 Study These Flashcards A C. ip dhcp snooping trust 87 Q Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue? A. Site-to-site VPN preshared keys are mismatched. B. Site-to-site VPN peers are using different encryption algorithms. C. No split-tunnel policy is defined on the Firepower Threat Defense appliance. D. The access control policy is not allowing VPN traffic in. A D. The access control policy is not allowing VPN traffic in. https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 53/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape 88 Q Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel Study These Flashcards between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output? A. interesting traffic was not applied B. encryption algorithm mismatch C. authentication key mismatch D. hashing algorithm mismatch A C. authentication key mismatch 89 Q Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment? A. group policy B. access control policy C. device management policy https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 54/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape D. platform settings policy A D.Study platform settings These policy Flashcards 90 Q Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment? A. group policy B. access control policy C. device management policy D. platform service policy A D. platform service policy 91 Q The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform? A. Certificate Trust List B. Endpoint Trust List https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 55/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape C. Enterprise Proxy Service D. Secured Collaboration Proxy Study These Flashcards A A. Certificate Trust List 92 Q Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two.) A. SIP B. inline normalization C. SSL D. packet decoder E. modbus A A. SIP C. SSL 93 Q Which feature is configured for managed devices in the device platform settings of the Firepower Management Center? https://www.brainscape.com/flashcards/ccnp-scor-350-701-actual-exam-questions-10217484/packs/18247623 56/149 11/10/24, 3:10 PM CCNP SCOR 350-701 - Actual Exam Questions Flashcards by Alan Inman | Brainscape A. quality of service B. time synchronization C. network address translations Study These Flashcards D. intrusion policy A B. time synchronization 94 Q Which information is required when adding a device to Firepower Management Center? A. username and password B. encryption method C. device serial number D. registration key A D. registration key