ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

Cisco Umbrella

Cisco Umbrella

External Threat Feeds

External Threat Feeds

Cisco Threat Grid

Cisco Threat Grid

Cisco Stealthwatch

Cisco Stealthwatch

Suggested answer: C
Explanation:

Cisco Threat Intelligence Director (CTID) can be integrated with existing Threat Intelligence Platforms deployed by your organization to ingest threat intelligence automatically.

Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threatintelligencedirector

asked 10/10/2024
Chengyang Zhang
50 questions

Question 152

Report Export Collapse

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

Cisco Security Intelligence

Cisco Security Intelligence

Cisco Application Visibility and Control

Cisco Application Visibility and Control

Cisco Model Driven Telemetry

Cisco Model Driven Telemetry

Cisco DNA Center

Cisco DNA Center

Suggested answer: B
Explanation:

The Cisco Application Visibility and Control (AVC) solution leverages multiple technologies to recognize, analyze, and control over 1000 applications, including voice and video, email, file sharing, gaming, peer-to-peer (P2P), and cloud-based applications. AVC combines several Cisco IOS/IOS XE components, as well as communicating with external tools, to integrate the following functions into a powerful solution…

Reference: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/avc/guide/avc-user-guide/avc_tech_overview.html

asked 10/10/2024
Victor Avila
35 questions

Question 153

Report Export Collapse

Which two activities can be done using Cisco DNA Center? (Choose two)

DHCP

DHCP

Design

Design

Accounting

Accounting

DNS

DNS

Provision

Provision

Suggested answer: B, E
Explanation:

Cisco DNA Center has four general sections aligned to IT workflows:

Design: Design your network for consistent configurations by device and by site. Physical maps and logical topologies help provide quick visual reference. The direct import feature brings in existing maps, images, and topologies directly from Cisco Prime Infrastructure and the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), making upgrades easy and quick. Device configurations by site can be consolidated in a "golden image" that can be used to automatically provision new network devices.

These new devices can either be pre-staged by associating the device details and mapping to a site.

Or they can be claimed upon connection and mapped to the site.

Policy: Translate business intent into network policies and apply those policies, such as access control, traffic routing, and quality of service, consistently over the entire wired and wireless infrastructure. Policy-based access control and network segmentation is a critical function of the Cisco Software-Defined Access (SDAccess) solution built from Cisco DNA Center and Cisco Identity Services Engine (ISE). Cisco AI Network Analytics and Cisco Group-Based Policy

Analytics running in the Cisco DNA Center identify endpoints, group similar endpoints, and determine group communication behavior. Cisco DNA Center then facilitates creating policies that determine the form of communication allowed between and within members of each group. ISE then activates the underlying infrastructure and segments the network creating a virtual overlay to follow these policies consistently. Such segmenting implements zero-trust security in the workplace, reduces risk, contains threats, and helps verify regulatory compliance by giving endpoints just the right level of access they need.

Provision: Once you have created policies in Cisco DNA Center, provisioning is a simple drag-anddrop task.

The profiles (called scalable group tags or "SGTs") in the Cisco DNA Center inventory list are assigned a policy, and this policy will always follow the identity. The process is completely automated and zero-touch. New devices added to the network are assigned to an SGT based on identity—greatly facilitating remote office setups.

Assurance: Cisco DNA Assurance, using AI/ML, enables every point on the network to become a sensor, sending continuous streaming telemetry on application performance and user connectivity in real time. The clean and simple dashboard shows detailed network health and flags issues. Then, guided remediation automates resolution to keep your network performing at its optimal with less mundane troubleshooting work.

The outcome is a consistent experience and proactive optimization of your network, with less time spent on troubleshooting tasks.

Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dnacenter/nb-06- dna-center-so-cte-en.html

asked 10/10/2024
sangilipandy Arumugam
27 questions

Question 154

Report Export Collapse

What must be used to share data between multiple security products?

Cisco Rapid Threat Containment

Cisco Rapid Threat Containment

Cisco Platform Exchange Grid

Cisco Platform Exchange Grid

Cisco Advanced Malware Protection

Cisco Advanced Malware Protection

Cisco Stealthwatch Cloud

Cisco Stealthwatch Cloud

Suggested answer: B
asked 10/10/2024
Matteo Di Pomponio
43 questions

Question 155

Report Export Collapse

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

Advanced Malware Protection

Advanced Malware Protection

Platform Exchange Grid

Platform Exchange Grid

Multifactor Platform Integration

Multifactor Platform Integration

Firepower Threat Defense

Firepower Threat Defense

Suggested answer: B
Explanation:

With Cisco pxGrid (Platform Exchange Grid), your multiple security products can now share data and work together. This open, scalable, and IETF standards-driven platform helps you automate security to get answers and contain threats faster.

asked 10/10/2024
Mary Andreou
49 questions

Question 156

Report Export Collapse

What is a feature of the open platform capabilities of Cisco DNA Center?

intent-based APIs

intent-based APIs

automation adapters

automation adapters

domain integration

domain integration

application adapters

application adapters

Suggested answer: A
asked 10/10/2024
megat ilham
39 questions

Question 157

Report Export Collapse

What is the function of the Context Directory Agent?

maintains users' group memberships

maintains users' group memberships

relays user authentication requests from Web Security Appliance to Active Directory

relays user authentication requests from Web Security Appliance to Active Directory

reads the Active Directory logs to map IP addresses to usernames

reads the Active Directory logs to map IP addresses to usernames

accepts user authentication requests on behalf of Web Security Appliance for user identification

accepts user authentication requests on behalf of Web Security Appliance for user identification

Suggested answer: C
Explanation:

Cisco Context Directory Agent (CDA) is a mechanism that maps IP Addresses to usernames in order to allow security gateways to understand which user is using which IP Address in the network, so those security gateways can now make decisions based on those users (or the groups to which the users belong to).

CDA runs on a Cisco Linux machine; monitors in real time a collection of Active Directory domain controller (DC) machines for authentication-related events that generally indicate user logins; learns, analyzes, and caches mappings of IP Addresses and user identities in its database; and makes the latest mappings available to its consumer devices.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/ibf/cda_10/Install_Config_guide/cda10/cda_oveviw.html

asked 10/10/2024
Christie Clark
41 questions

Question 158

Report Export Collapse

What is a characteristic of a bridge group in ASA Firewall transparent mode?

It includes multiple interfaces and access rules between interfaces are customizable

It includes multiple interfaces and access rules between interfaces are customizable

It is a Layer 3 segment and includes one port and customizable access rules

It is a Layer 3 segment and includes one port and customizable access rules

It allows ARP traffic with a single access rule

It allows ARP traffic with a single access rule

It has an IP address on its BVI interface and is used for management traffic

It has an IP address on its BVI interface and is used for management traffic

Suggested answer: A
Explanation:

A bridge group is a group of interfaces that the ASA bridges instead of routes. Bridge groups are only supported in Transparent Firewall Mode. Like any other firewall interfaces, access control between interfaces is controlled, and all of the usual firewall checks are in place.

Each bridge group includes a Bridge Virtual Interface (BVI). The ASA uses the BVI IP address as the source address for packets originating from the bridge group. The BVI IP address must be on the same subnet as the bridge group member interfaces. The BVI does not support traffic on secondary networks; only traffic on the same network as the BVI IP address is supported.

You can include multiple interfaces per bridge group. If you use more than 2 interfaces per bridge group, you can control communication between multiple segments on the same network, and not just between inside and outside. For example, if you have three inside segments that you do not want to communicate with each other, you can put each segment on a separate interface, and only allow them to communicate with the outside interface. Or you can customize the access rules between interfaces to allow only as much access as desired.

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-generalconfig/intro-fw.htmlNote: BVI interface is not used for management purpose. But we can add a separate Managementslot/port interface that is not part of any bridge group, and that allows only management traffic tothe ASA.

asked 10/10/2024
Filippo Panarella
25 questions

Question 159

Report Export Collapse

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

Common Security Exploits

Common Security Exploits

Common Vulnerabilities and Exposures

Common Vulnerabilities and Exposures

Common Exploits and Vulnerabilities

Common Exploits and Vulnerabilities

Common Vulnerabilities, Exploits and Threats

Common Vulnerabilities, Exploits and Threats

Suggested answer: B
Explanation:

Vendors, security researchers, and vulnerability coordination centers typically assign vulnerabilities an identifier that's disclosed to the public. This identifier is known as the Common Vulnerabilities and Exposures (CVE).

CVE is an industry-wide standard. CVE is sponsored by US-CERT, the office of Cybersecurity and Communications at the U.S. Department of Homeland Security.

The goal of CVE is to make it's easier to share data across tools, vulnerability repositories, and security services.

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide

asked 10/10/2024
Ishan Patel
47 questions

Question 160

Report Export Collapse

Which two fields are defined in the NetFlow flow? (Choose two)

type of service byte

type of service byte

class of service bits

class of service bits

Layer 4 protocol type

Layer 4 protocol type

destination port

destination port

output logical interface

output logical interface

Suggested answer: A, D
Explanation:

Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets that all share seven values which define a unique key for the flow:

+ Ingress interface (SNMP ifIndex)

+ Source IP address

+ Destination IP address

+ IP protocol

+ Source port for UDP or TCP, 0 for other protocols

+ Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols + IP Type of Service Note: A flow is a unidirectional series of packets between a given source and destination.

asked 10/10/2024
Robinson Santos
42 questions
Total 631 questions
Go to page: of 64

Related questions