ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 17

Question list
Search
Search

List of questions

Search

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

A.

NetFlow

A.

NetFlow

Answers
B.

desktop client

B.

desktop client

Answers
C.

ASDM

C.

ASDM

Answers
D.

API

D.

API

Answers
Suggested answer: D

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

A.

sniffing the packets between the two hosts

A.

sniffing the packets between the two hosts

Answers
B.

sending continuous pings

B.

sending continuous pings

Answers
C.

overflowing the buffer's memory

C.

overflowing the buffer's memory

Answers
D.

inserting malicious commands into the database

D.

inserting malicious commands into the database

Answers
Suggested answer: D

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

A.

Cisco Firepower

A.

Cisco Firepower

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

ISE

C.

ISE

Answers
D.

AMP

D.

AMP

Answers
Suggested answer: B

Explanation:

Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations – before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent.

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise.

The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?

A.

Security Manager

A.

Security Manager

Answers
B.

Cloudlock

B.

Cloudlock

Answers
C.

Web Security Appliance

C.

Web Security Appliance

Answers
D.

Cisco ISE

D.

Cisco ISE

Answers
Suggested answer: B

Explanation:

Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely. It protects your cloud users, data, and apps. Cisco Cloudlock provides visibility and compliance checks, protects data against misuse and exfiltration, and provides threat protections against malware like ransomware.

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.

However, the connection is failing. Which action should be taken to accomplish this goal?

A.

Disable telnet using the no ip telnet command.

A.

Disable telnet using the no ip telnet command.

Answers
B.

Enable the SSH server using the ip ssh server command.

B.

Enable the SSH server using the ip ssh server command.

Answers
C.

Configure the port using the ip ssh port 22 command.

C.

Configure the port using the ip ssh port 22 command.

Answers
D.

Generate the RSA key using the crypto key generate rsa command.

D.

Generate the RSA key using the crypto key generate rsa command.

Answers
Suggested answer: D

Explanation:

In this question, the engineer was trying to secure the connection so maybe he was trying to allow SSH to the device. But maybe something went wrong so the connection was failing (the connection used to be good). So maybe he was missing the "crypto key generate rsa" command.


A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

A.

AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

A.

AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

Answers
B.

The file is queued for upload when connectivity is restored.

B.

The file is queued for upload when connectivity is restored.

Answers
C.

The file upload is abandoned.

C.

The file upload is abandoned.

Answers
D.

The ESA immediately makes another attempt to upload the file.

D.

The ESA immediately makes another attempt to upload the file.

Answers
Suggested answer: C

Explanation:

The appliance will try once to upload the file; if upload is not successful, for example because of connectivity problems, the file may not be uploaded. If the failure was because the file analysis server was overloaded, the upload will be attempted once more.

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118796-technoteesa-00.htmlIn this question, it stated "the network is congested" (not the file analysis server was overloaded) sotheappliance will not try to upload the file again.

Which type of algorithm provides the highest level of protection against brute-force attacks?

A.

PFS

A.

PFS

Answers
B.

HMAC

B.

HMAC

Answers
C.

MD5

C.

MD5

Answers
D.

SHA

D.

SHA

Answers
Suggested answer: D

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?

A.

posture assessment

A.

posture assessment

Answers
B.

CoA

B.

CoA

Answers
C.

external identity source

C.

external identity source

Answers
D.

SNMP probe

D.

SNMP probe

Answers
Suggested answer: B

Explanation:

Cisco ISE allows a global configuration to issue a Change of Authorization (CoA) in the Profiler Configuration page that enables the profiling service with more control over endpoints that are already authenticated.

One of the settings to configure the CoA type is "Reauth". This option is used to enforce reauthentication of an already authenticated endpoint when it is profiled.

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/ b_ise_admin_guide_sample_chapter_010101.html

A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category. Which reputation score should be selected to accomplish this goal?

A.

1

A.

1

Answers
B.

3

B.

3

Answers
C.

5

C.

5

Answers
D.

10

D.

10

Answers
Suggested answer: D

Explanation:

We choose "Chat and Instant Messaging" category in "URL Category":

To block certain URLs we need to choose URL Reputation from 6 to 10.

Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

A.

PSIRT

A.

PSIRT

Answers
B.

Talos

B.

Talos

Answers
C.

CSIRT

C.

CSIRT

Answers
D.

DEVNET

D.

DEVNET

Answers
Suggested answer: B

Explanation:

Talos Threat Source is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.

Reference: https://talosintelligence.com/newsletters

Total 631 questions
Go to page: of 64