ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 11

List of questions

Question 101

Report Export Collapse

A malicious user gained network access by spoofing printer connections that were authorized using MAB on four different switch ports at the same time. What two catalyst switch security features will prevent further violations? (Choose two)

DHCP Snooping

DHCP Snooping

802.1AE MacSec

802.1AE MacSec

Port security

Port security

IP Device track

IP Device track

Dynamic ARP inspection

Dynamic ARP inspection

Private VLANs

Private VLANs

Suggested answer: A, E
asked 10/10/2024
sailakshmi KM
45 questions

Question 102

Report Export Collapse

Which command enables 802.1X globally on a Cisco switch?

dot1x system-auth-control

dot1x system-auth-control

dot1x pae authenticator

dot1x pae authenticator

authentication port-control aut

authentication port-control aut

aaa new-model

aaa new-model

Suggested answer: A
asked 10/10/2024
Adam Bednar
42 questions

Question 103

Report Export Collapse

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?

1

1

2

2

6

6

31

31

Suggested answer: C
Explanation:

Because MAB uses the MAC address as a username and password, you should make sure that the RADIUS server can differentiate MAB requests from other types of requests for network access. This precaution will prevent other clients from attempting to use a MAC address as a valid credential.

Cisco switches uniquely identify MAB requests by setting Attribute 6 (Service-Type) to 10 (Call-Check) in a MAB Access- Request message. Therefore, you can use Attribute 6 to filter MAB requests at the RADIUS server.

Reference: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-basednetworkingservices/config_guide_c17-663759.html

asked 10/10/2024
Gabriel Pereira Dias
41 questions

Question 104

Report Export Collapse

A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface. What is causing this problem?

DHCP snooping has not been enabled on all VLANs.

DHCP snooping has not been enabled on all VLANs.

The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users.

The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users.

Dynamic ARP Inspection has not been enabled on all VLANs

Dynamic ARP Inspection has not been enabled on all VLANs

The no ip arp inspection trust command is applied on all user host interfaces

The no ip arp inspection trust command is applied on all user host interfaces

Suggested answer: D
Explanation:

Dynamic ARP inspection (DAI) is a security feature that validates ARP packets in a network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC address bindings. This capability protects the network from certain man-in- the-middle attacks. After enabling DAI, all ports become untrusted ports.

asked 10/10/2024
Madhanraj N
47 questions

Question 105

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 105 117326 10102024233051000000

An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate.

Which port configuration is missing?

authentication open

authentication open

dotlx reauthentication

dotlx reauthentication

cisp enable

cisp enable

dot1x pae authenticator

dot1x pae authenticator

Suggested answer: D
asked 10/10/2024
juan manuel torrado
40 questions

Question 106

Report Export Collapse

Which SNMPv3 configuration must be used to support the strongest security possible?

asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmp-server group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmpserver group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmpserver group myv3 v3 noauth asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

asa-host(config)#snmp-server group myv3 v3 priv asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy

Suggested answer: D
asked 10/10/2024
Rick van der Slot
41 questions

Question 107

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 107 117328 10102024233051000000

Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

show authentication registrations

show authentication registrations

show authentication method

show authentication method

show dot1x all

show dot1x all

show authentication sessions

show authentication sessions

Suggested answer: D
Explanation:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-xe-3se-3850-cr-book/sec-s1-xe-3se-3850-cr-book_chapter_01.html#wp3404908137Displaying the Summary of All Auth Manager Sessions on the SwitchEnter the following:

Switch# show authentication sessions

Interface MAC Address Method Domain Status Session ID

Gi1/48 0015.63b0.f676 dot1x DATA Authz Success 0A3462B1000000102983C05C

Gi1/5 000f.23c4.a401 mab DATA Authz Success 0A3462B10000000D24F80B58

Gi1/5 0014.bf5d.d26d dot1x DATA Authz Success 0A3462B10000000E29811B94

asked 10/10/2024
Ana Santos
46 questions

Question 108

Report Export Collapse

What Cisco command shows you the status of an 802.1X connection on interface gi0/1?

show authorization status

show authorization status

show authen sess int gi0/1

show authen sess int gi0/1

show connection status gi0/1

show connection status gi0/1

show ver gi0/1

show ver gi0/1

Suggested answer: B
asked 10/10/2024
Daniel Martos
46 questions

Question 109

Report Export Collapse


Refer to the exhibit.

Cisco 350-701 image Question 109 117330 10102024233051000000

What does the number 15 represent in this configuration?

privilege level for an authorized user to this router

privilege level for an authorized user to this router

access list that identifies the SNMP devices that can access the router

access list that identifies the SNMP devices that can access the router

interval in seconds between SNMPv3 authentication attempts

interval in seconds between SNMPv3 authentication attempts

number of possible failed attempts until the SNMPv3 user is locked out

number of possible failed attempts until the SNMPv3 user is locked out

Suggested answer: B
Explanation:

The syntax of this command is shown below: snmp-server group [group-name {v1 | v2c | v3 [auth | noauth | priv]}] [read read-view] [write writeview] [notify notify-view] [access access-list] The command above restricts which IP source addresses are allowed to access SNMP functions on the router. You could restrict SNMP access by simply applying an interface ACL to block incoming SNMP packets that don't come from trusted servers. However, this would not be as effective as using the global SNMP commands shown in this recipe. Because you can apply this method once for the whole router, it is much simpler than applying ACLs to block SNMP on all interfaces separately. Also, using interface

ACLs would block not only SNMP packets intended for this router, but also may stop SNMP packets that just happened to be passing through on their way to some other destination device.

asked 10/10/2024
Roger Warner
39 questions

Question 110

Report Export Collapse

Under which two circumstances is a CoA issued? (Choose two)

A new authentication rule was added to the policy on the Policy Service node.

A new authentication rule was added to the policy on the Policy Service node.

An endpoint is deleted on the Identity Service Engine server.

An endpoint is deleted on the Identity Service Engine server.

A new Identity Source Sequence is created and referenced in the authentication policy.

A new Identity Source Sequence is created and referenced in the authentication policy.

An endpoint is profiled for the first time.

An endpoint is profiled for the first time.

A new Identity Service Engine server is added to the deployment with the Administration persona

A new Identity Service Engine server is added to the deployment with the Administration persona

Suggested answer: B, D
Explanation:

The profiling service issues the change of authorization in the following cases:

– Endpoint deleted—When an endpoint is deleted from the Endpoints page and the endpoint is disconnected or removed from the network.

An exception action is configured—If you have an exception action configured per profile that leads to an unusual or an unacceptable event from that endpoint. The profiling service moves the endpoint to the corresponding static profile by issuing a CoA.

– An endpoint is profiled for the first time—When an endpoint is not statically assigned and profiled for the first time; for example, the profile changes from an unknown to a known profile.

+ An endpoint identity group has changed—When an endpoint is added or removed from an endpoint identity group that is used by an authorization policy.

The profiling service issues a CoA when there is any change in an endpoint identity group, and the endpoint identity group is used in the authorization policy for the following:

++ The endpoint identity group changes for endpoints when they are dynamically profiled ++ The endpoint identity group changes when the static assignment flag is set to true for a dynamic endpoint – An endpoint profiling policy has changed and the policy is used in an authorization policy—When an endpoint profiling policy changes, and the policy is included in a logical profile that is used in an authorization policy. The endpoint profiling policy may change due to the profiling policy match or when an endpoint is statically assigned to an endpoint profiling policy, which is associated to a logical profile. In both the cases, the profiling service issues a CoA, only when the endpoint profiling policy is used in an authorization policy.

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-1/admin_guide/b_ise_admin_guide_21/ b_ise_admin_guide_20_chapter_010100.html

asked 10/10/2024
Naing Thet
45 questions
Total 631 questions
Go to page: of 64

Related questions