ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 16

Question list
Search
Search

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

A.

Cisco Umbrella

A.

Cisco Umbrella

Answers
B.

External Threat Feeds

B.

External Threat Feeds

Answers
C.

Cisco Threat Grid

C.

Cisco Threat Grid

Answers
D.

Cisco Stealthwatch

D.

Cisco Stealthwatch

Answers
Suggested answer: C

Explanation:

Cisco Threat Intelligence Director (CTID) can be integrated with existing Threat Intelligence Platforms deployed by your organization to ingest threat intelligence automatically.

Reference: https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threatintelligencedirector

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

A.

Cisco Security Intelligence

A.

Cisco Security Intelligence

Answers
B.

Cisco Application Visibility and Control

B.

Cisco Application Visibility and Control

Answers
C.

Cisco Model Driven Telemetry

C.

Cisco Model Driven Telemetry

Answers
D.

Cisco DNA Center

D.

Cisco DNA Center

Answers
Suggested answer: B

Explanation:

The Cisco Application Visibility and Control (AVC) solution leverages multiple technologies to recognize, analyze, and control over 1000 applications, including voice and video, email, file sharing, gaming, peer-to-peer (P2P), and cloud-based applications. AVC combines several Cisco IOS/IOS XE components, as well as communicating with external tools, to integrate the following functions into a powerful solution…

Reference: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/avc/guide/avc-user-guide/avc_tech_overview.html

Which two activities can be done using Cisco DNA Center? (Choose two)

A.

DHCP

A.

DHCP

Answers
B.

Design

B.

Design

Answers
C.

Accounting

C.

Accounting

Answers
D.

DNS

D.

DNS

Answers
E.

Provision

E.

Provision

Answers
Suggested answer: B, E

Explanation:

Cisco DNA Center has four general sections aligned to IT workflows:

Design: Design your network for consistent configurations by device and by site. Physical maps and logical topologies help provide quick visual reference. The direct import feature brings in existing maps, images, and topologies directly from Cisco Prime Infrastructure and the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), making upgrades easy and quick. Device configurations by site can be consolidated in a "golden image" that can be used to automatically provision new network devices.

These new devices can either be pre-staged by associating the device details and mapping to a site.

Or they can be claimed upon connection and mapped to the site.

Policy: Translate business intent into network policies and apply those policies, such as access control, traffic routing, and quality of service, consistently over the entire wired and wireless infrastructure. Policy-based access control and network segmentation is a critical function of the Cisco Software-Defined Access (SDAccess) solution built from Cisco DNA Center and Cisco Identity Services Engine (ISE). Cisco AI Network Analytics and Cisco Group-Based Policy

Analytics running in the Cisco DNA Center identify endpoints, group similar endpoints, and determine group communication behavior. Cisco DNA Center then facilitates creating policies that determine the form of communication allowed between and within members of each group. ISE then activates the underlying infrastructure and segments the network creating a virtual overlay to follow these policies consistently. Such segmenting implements zero-trust security in the workplace, reduces risk, contains threats, and helps verify regulatory compliance by giving endpoints just the right level of access they need.

Provision: Once you have created policies in Cisco DNA Center, provisioning is a simple drag-anddrop task.

The profiles (called scalable group tags or "SGTs") in the Cisco DNA Center inventory list are assigned a policy, and this policy will always follow the identity. The process is completely automated and zero-touch. New devices added to the network are assigned to an SGT based on identity—greatly facilitating remote office setups.

Assurance: Cisco DNA Assurance, using AI/ML, enables every point on the network to become a sensor, sending continuous streaming telemetry on application performance and user connectivity in real time. The clean and simple dashboard shows detailed network health and flags issues. Then, guided remediation automates resolution to keep your network performing at its optimal with less mundane troubleshooting work.

The outcome is a consistent experience and proactive optimization of your network, with less time spent on troubleshooting tasks.

Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dnacenter/nb-06- dna-center-so-cte-en.html

What must be used to share data between multiple security products?

A.

Cisco Rapid Threat Containment

A.

Cisco Rapid Threat Containment

Answers
B.

Cisco Platform Exchange Grid

B.

Cisco Platform Exchange Grid

Answers
C.

Cisco Advanced Malware Protection

C.

Cisco Advanced Malware Protection

Answers
D.

Cisco Stealthwatch Cloud

D.

Cisco Stealthwatch Cloud

Answers
Suggested answer: B

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

A.

Advanced Malware Protection

A.

Advanced Malware Protection

Answers
B.

Platform Exchange Grid

B.

Platform Exchange Grid

Answers
C.

Multifactor Platform Integration

C.

Multifactor Platform Integration

Answers
D.

Firepower Threat Defense

D.

Firepower Threat Defense

Answers
Suggested answer: B

Explanation:

With Cisco pxGrid (Platform Exchange Grid), your multiple security products can now share data and work together. This open, scalable, and IETF standards-driven platform helps you automate security to get answers and contain threats faster.

What is a feature of the open platform capabilities of Cisco DNA Center?

A.

intent-based APIs

A.

intent-based APIs

Answers
B.

automation adapters

B.

automation adapters

Answers
C.

domain integration

C.

domain integration

Answers
D.

application adapters

D.

application adapters

Answers
Suggested answer: A

What is the function of the Context Directory Agent?

A.

maintains users' group memberships

A.

maintains users' group memberships

Answers
B.

relays user authentication requests from Web Security Appliance to Active Directory

B.

relays user authentication requests from Web Security Appliance to Active Directory

Answers
C.

reads the Active Directory logs to map IP addresses to usernames

C.

reads the Active Directory logs to map IP addresses to usernames

Answers
D.

accepts user authentication requests on behalf of Web Security Appliance for user identification

D.

accepts user authentication requests on behalf of Web Security Appliance for user identification

Answers
Suggested answer: C

Explanation:

Cisco Context Directory Agent (CDA) is a mechanism that maps IP Addresses to usernames in order to allow security gateways to understand which user is using which IP Address in the network, so those security gateways can now make decisions based on those users (or the groups to which the users belong to).

CDA runs on a Cisco Linux machine; monitors in real time a collection of Active Directory domain controller (DC) machines for authentication-related events that generally indicate user logins; learns, analyzes, and caches mappings of IP Addresses and user identities in its database; and makes the latest mappings available to its consumer devices.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/ibf/cda_10/Install_Config_guide/cda10/cda_oveviw.html

What is a characteristic of a bridge group in ASA Firewall transparent mode?

A.

It includes multiple interfaces and access rules between interfaces are customizable

A.

It includes multiple interfaces and access rules between interfaces are customizable

Answers
B.

It is a Layer 3 segment and includes one port and customizable access rules

B.

It is a Layer 3 segment and includes one port and customizable access rules

Answers
C.

It allows ARP traffic with a single access rule

C.

It allows ARP traffic with a single access rule

Answers
D.

It has an IP address on its BVI interface and is used for management traffic

D.

It has an IP address on its BVI interface and is used for management traffic

Answers
Suggested answer: A

Explanation:

A bridge group is a group of interfaces that the ASA bridges instead of routes. Bridge groups are only supported in Transparent Firewall Mode. Like any other firewall interfaces, access control between interfaces is controlled, and all of the usual firewall checks are in place.

Each bridge group includes a Bridge Virtual Interface (BVI). The ASA uses the BVI IP address as the source address for packets originating from the bridge group. The BVI IP address must be on the same subnet as the bridge group member interfaces. The BVI does not support traffic on secondary networks; only traffic on the same network as the BVI IP address is supported.

You can include multiple interfaces per bridge group. If you use more than 2 interfaces per bridge group, you can control communication between multiple segments on the same network, and not just between inside and outside. For example, if you have three inside segments that you do not want to communicate with each other, you can put each segment on a separate interface, and only allow them to communicate with the outside interface. Or you can customize the access rules between interfaces to allow only as much access as desired.

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95-generalconfig/intro-fw.htmlNote: BVI interface is not used for management purpose. But we can add a separate Managementslot/port interface that is not part of any bridge group, and that allows only management traffic tothe ASA.

When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

A.

Common Security Exploits

A.

Common Security Exploits

Answers
B.

Common Vulnerabilities and Exposures

B.

Common Vulnerabilities and Exposures

Answers
C.

Common Exploits and Vulnerabilities

C.

Common Exploits and Vulnerabilities

Answers
D.

Common Vulnerabilities, Exploits and Threats

D.

Common Vulnerabilities, Exploits and Threats

Answers
Suggested answer: B

Explanation:

Vendors, security researchers, and vulnerability coordination centers typically assign vulnerabilities an identifier that's disclosed to the public. This identifier is known as the Common Vulnerabilities and Exposures (CVE).

CVE is an industry-wide standard. CVE is sponsored by US-CERT, the office of Cybersecurity and Communications at the U.S. Department of Homeland Security.

The goal of CVE is to make it's easier to share data across tools, vulnerability repositories, and security services.

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide

Which two fields are defined in the NetFlow flow? (Choose two)

A.

type of service byte

A.

type of service byte

Answers
B.

class of service bits

B.

class of service bits

Answers
C.

Layer 4 protocol type

C.

Layer 4 protocol type

Answers
D.

destination port

D.

destination port

Answers
E.

output logical interface

E.

output logical interface

Answers
Suggested answer: A, D

Explanation:

Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets that all share seven values which define a unique key for the flow:

+ Ingress interface (SNMP ifIndex)

+ Source IP address

+ Destination IP address

+ IP protocol

+ Source port for UDP or TCP, 0 for other protocols

+ Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols + IP Type of Service Note: A flow is a unidirectional series of packets between a given source and destination.

Total 631 questions
Go to page: of 64