[2023年05月11日] 完全版には更新されたのはCCNP Security(350-701)認定サンプル問題 [Q73-Q89]

Share

[2023年05月11日] 完全版には更新されたのはCCNP Security(350-701)認定サンプル問題

最新のCisco 350-701リアル試験問題集PDF

質問 # 73
What is the primary role of the Cisco Email Security Appliance?

  • A. Mail Delivery Agent
  • B. Mail Transfer Agent
  • C. Mail User Agent
  • D. Mail Submission Agent

正解:B

解説:
Explanation Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay. Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/February2013/ Cisco_SBA_BN_EmailSecurityUsingCiscoESADeploymentGuide-Feb2013.pdf Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay.
Reference:
Explanation Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay. Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/February2013/ Cisco_SBA_BN_EmailSecurityUsingCiscoESADeploymentGuide-Feb2013.pdf


質問 # 74
Drag and drop the capabilities from the left onto the correct technologies on the right.

正解:

解説:


質問 # 75
What are two DDoS attack categories? (Choose two)

  • A. screen-based
  • B. protocol
  • C. sequential
  • D. volume-based
  • E. database

正解:B、D

解説:
There are three basic categories of attack:
+ volume-based attacks, which use high traffic to inundate the network bandwidth
+ protocol attacks, which focus on exploiting server resources
+ application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks Reference: https://www.esecurityplanet.com/networks/types-of-ddos-attacks/ There are three basic categories of attack:
+ volume-based attacks, which use high traffic to inundate the network bandwidth
+ protocol attacks, which focus on exploiting server resources
There are three basic categories of attack:
+ volume-based attacks, which use high traffic to inundate the network bandwidth
+ protocol attacks, which focus on exploiting server resources
+ application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks Reference: https://www.esecurityplanet.com/networks/types-of-ddos-attacks/


質問 # 76
Refer to the exhibit.

What will occur when this device tries to connect to the port?

  • A. 802 1X and MAB will both be used and ISE can use policy to determine the access level
  • B. 802.1X will not work and the device will not be allowed network access
  • C. 802.1X will not work, but MAB will start and allow the device on the network.
  • D. 802 1X will work and the device will be allowed on the network

正解:B


質問 # 77
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

正解:

解説:

Explanation

Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecti


質問 # 78
Drag and drop the solutions from the left onto the solution's benefits on the right.

正解:

解説:


質問 # 79
Which Cisco AMP file disposition valid?

  • A. non malicious
  • B. malware
  • C. dirty
  • D. pristine

正解:B


質問 # 80
Drag and drop the deployment models from the left onto the explanations on the right.

正解:

解説:


質問 # 81
Refer to the exhibit.

Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

  • A. No split-tunnel policy is defined on the Firepower Threat Defense appliance.
  • B. Site-to-site VPN peers are using different encryption algorithms.
  • C. Site-to-site VPN preshared keys are mismatched.
  • D. The access control policy is not allowing VPN traffic in.

正解:A


質問 # 82
Which two capabilities does TAXII support? (Choose two)

  • A. Exchange
  • B. Binding
  • C. Mitigating
  • D. Pull messaging
  • E. Correlation

正解:A、D

解説:
The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network.
TAXII exists to provide specific capabilities to those interested in sharing structured cyber threat information.
TAXII Capabilities are the highest level at which TAXII actions can be described. There are three capabilities that this version of TAXII supports: push messaging, pull messaging, and discovery.
Although there is no "binding" capability in the list but it is the best answer here.


質問 # 83
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?

  • A. Dynamic ARP Inspection has not been enabled on all VLANs
  • B. The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users.
  • C. The no ip arp inspection trust command is applied on all user host interfaces
  • D. DHCP snooping has not been enabled on all VLANs.

正解:C

解説:
Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in-the-middle attacks. After enabling DAI, all ports become untrusted ports.


質問 # 84
Which MDM configuration provides scalability?

  • A. BYOD support without extra appliance or licenses
  • B. automatic device classification with level 7 fingerprinting
  • C. enabling use of device features such as camera use
  • D. pushing WPA2-Enterprise settings automatically to devices

正解:A


質問 # 85
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

  • A. ARP spoofing
  • B. exploits
  • C. malware
  • D. denial-of-service attacks
  • E. eavesdropping

正解:A、C


質問 # 86
A network engineer has configured a NTP server on a Cisco ASA.
The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic.
The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16.
What is the cause of this issue?

  • A. An access list entry for UDP port 123 on the inside interface is missing.
  • B. An access list entry for UDP port 123 on the outside interface is missing.
  • C. Resynchronization of NTP is not forced
  • D. NTP is not configured to use a working server.

正解:D


質問 # 87
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

  • A. knowledge factor
  • B. biometric factor
  • C. time factor
  • D. encryption factor
  • E. confidentiality factor

正解:A、C


質問 # 88
Which attack is commonly associated with C and C++ programming languages?

  • A. buffer overflow
  • B. cross-site scripting
  • C. water holing
  • D. DDoS

正解:A

解説:
Explanation
A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.
Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash, make data corrupt, steal some private information or run his/her own code. It basically means to access any buffer outside of it's alloted memory space. This happens quite frequently in the case of arrays.


質問 # 89
......

Cisco 350-701問題集で一発合格を目指すならこれ!:https://www.jpntest.com/shiken/350-701-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡