ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 18

Question list
Search
Search

What are the two types of managed Intercloud Fabric deployment models? (Choose two)

A.

Service Provider managed

A.

Service Provider managed

Answers
B.

Public managed

B.

Public managed

Answers
C.

Hybrid managed

C.

Hybrid managed

Answers
D.

User managed

D.

User managed

Answers
E.

Enterprise managed

E.

Enterprise managed

Answers
Suggested answer: A, E

Explanation:

Many enterprises prefer to deploy development workloads in the public cloud, primarily for convenience and faster deployment. This approach can cause concern for IT administrators, who must control the flow of IT traffic and spending and help ensure the security of data and intellectual property. Without the proper controls, data and intellectual property can escape this oversight. The Cisco Intercloud Fabric solution helps control this shadow IT, discovering resources deployed in the public cloud outside IT control and placing these resources under Cisco Intercloud Fabric control.

Cisco Intercloud Fabric addresses the cloud deployment requirements appropriate for two hybrid cloud deployment models: Enterprise Managed (an enterprise manages its own cloud environments) and Service Provider Managed (the service provider administers and controls all cloud resources).

Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric.pdfThe Cisco Intercloud Fabric architecture provides two product configurations to address the followingtwoconsumption models:

+ Cisco Intercloud Fabric for Business

+ Cisco Intercloud Fabric for Providers

Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric/Intercloud_Fabric_2.html

What are two DDoS attack categories? (Choose two)

A.

sequential

A.

sequential

Answers
B.

protocol

B.

protocol

Answers
C.

database

C.

database

Answers
D.

volume-based

D.

volume-based

Answers
E.

screen-based

E.

screen-based

Answers
Suggested answer: B, D

Explanation:

There are three basic categories of attack:

+ volume-based attacks, which use high traffic to inundate the network bandwidth + protocol attacks, which focus on exploiting server resources + application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks Reference: https://www.esecurityplanet.com/networks/types-of-ddosattacks/

Refer to the exhibit.

Which type of authentication is in use?

A.

LDAP authentication for Microsoft Outlook

A.

LDAP authentication for Microsoft Outlook

Answers
B.

POP3 authentication

B.

POP3 authentication

Answers
C.

SMTP relay server authentication

C.

SMTP relay server authentication

Answers
D.

external user and relay mail authentication

D.

external user and relay mail authentication

Answers
Suggested answer: A

Explanation:

The TLS connections are recorded in the mail logs, along with other significant actions that are related to messages, such as filter actions, anti-virus and anti-spam verdicts, and delivery attempts. If there is a successful TLS connection, there will be a TLS success entry in the mail logs. Likewise, a failed TLS connection produces a TLS failed entry. If a message does not have an associated TLS entry in the log file, that message was not delivered over a TLS connection.

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118844-technoteesa-00.htmlThe exhibit in this Qshows a successful TLS connection from the remote host (reception) in the maillog.

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.

What must be configured to accomplish this?

A.

Configure the Cisco WSA to modify policies based on the traffic seen

A.

Configure the Cisco WSA to modify policies based on the traffic seen

Answers
B.

Configure the Cisco ESA to receive real-time updates from Talos

B.

Configure the Cisco ESA to receive real-time updates from Talos

Answers
C.

Configure the Cisco WSA to receive real-time updates from Talos

C.

Configure the Cisco WSA to receive real-time updates from Talos

Answers
D.

Configure the Cisco ESA to modify policies based on the traffic seen

D.

Configure the Cisco ESA to modify policies based on the traffic seen

Answers
Suggested answer: D

Explanation:

The Mail Policies menu is where almost all of the controls related to email filtering happens. All the security and content filtering policies are set here, so it's likely that, as an ESA administrator, the pages on this menu are where you are likely to spend most of your time.

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

A.

Encrypted Traffic Analytics

A.

Encrypted Traffic Analytics

Answers
B.

Threat Intelligence Director

B.

Threat Intelligence Director

Answers
C.

Cognitive Threat Analytics

C.

Cognitive Threat Analytics

Answers
D.

Cisco Talos Intelligence

D.

Cisco Talos Intelligence

Answers
Suggested answer: B

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)

A.

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

A.

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

Answers
B.

The Cisco WSA responds with its own IP address only if it is running in explicit mode.

B.

The Cisco WSA responds with its own IP address only if it is running in explicit mode.

Answers
C.

The Cisco WSA is configured in a web browser only if it is running in transparent mode.

C.

The Cisco WSA is configured in a web browser only if it is running in transparent mode.

Answers
D.

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

D.

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

Answers
E.

The Cisco WSA responds with its own IP address only if it is running in transparent mode.

E.

The Cisco WSA responds with its own IP address only if it is running in transparent mode.

Answers
Suggested answer: B, D

Explanation:

The Cisco Web Security Appliance (WSA) includes a web proxy, a threat analytics engine, antimalware engine, policy management, and reporting in a single physical or virtual appliance. The main use of the Cisco WSA is to protect users from accessing malicious websites and being infected by malware.

You can deploy the Cisco WSA in two different modes:

– Explicit forward mode

– Transparent mode

In explicit forward mode, the client is configured to explicitly use the proxy, subsequently sending all web traffic to the proxy. Because the client knows there is a proxy and sends all traffic to the proxy in explicit forward mode, the client does not perform a DNS lookup of the domain before requesting the URL. The Cisco WSA is responsible for DNS resolution, as well.

When you configure the Cisco WSA in explicit mode, you do not need to configure any other network infrastructure devices to redirect client requests to the Cisco WSA. However, you must configure each client to send traffic to the Cisco WSA.

-> Therefore in explicit mode, WSA only checks the traffic between client & web server. WSA does not use its own IP address to request -> Answer B is not correct.

When the Cisco WSA is in transparent mode, clients do not know there is a proxy deployed. Network infrastructure devices are configured to forward traffic to the Cisco WSA. In transparent mode deployments, network infrastructure devices redirect web traffic to the proxy. Web traffic redirection can be done using policybased routing (PBR)—available on many routers —or using Cisco's Web Cache Communication Protocol (WCCP) on Cisco ASA, Cisco routers, or switches.

The Web Cache Communication Protocol (WCCP), developed by Cisco Systems, specifies interactions between one or more switches) and one or more web-caches. The purpose of the interaction is to establish and maintain the transparent redirectio of traffic flowing through a group of routers.

Reference: https://www.cisco.com/c/en/us/tech/content-networking/web-cache-communicationsprotocol-wccp/index.html->Therefore answer D is correct as redirection can be done on Layer 3 device only.

In transparent mode, the client is unaware its traffic is being sent to a proxy (Cisco WSA) and, as a result, the client uses DNS to resolve the domain name in the URL and send the web request destined for the web server (not the proxy).

When you configure the Cisco WSA in transparent mode, you need to identify a network choke point with a redirection device (a Cisco ASA) to redirect traffic to the proxy.

WSA in Transparent mode

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide -> Therefore in Transparent mode, WSA uses its own IP address to initiate a new connection the Web Server (in step 4 above) -> Answer E is correct.

Answer C is surely not correct as WSA cannot be configured in a web browser in either mode.

Answer A seems to be correct but it is not. This answer is correct if it states "When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request source" (not destination).

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

A.

Modify an access policy

A.

Modify an access policy

Answers
B.

Modify identification profiles

B.

Modify identification profiles

Answers
C.

Modify outbound malware scanning policies

C.

Modify outbound malware scanning policies

Answers
D.

Modify web proxy settings

D.

Modify web proxy settings

Answers
Suggested answer: D

Explanation:

URL conditions in access control rules allow you to limit the websites that users on your network can access. This feature is called URL filtering. There are two ways you can use access control to specify URLs you want to block (or, conversely, allow):

– With any license, you can manually specify individual URLs, groups of URLs, and URL lists and feeds to achieve granular, custom control over web traffic.

– With a URL Filtering license, you can also control access to websites based on the URL's general classification, or category, and risk level, or reputation. The system displays this category and reputation data in connection logs, intrusion events, and application details.

Using category and reputation data also simplifies policy creation and administration. It grants you assurance that the system will control web traffic as expected. Finally, because Cisco's threat intelligence is continually updated with new

URLs, as well as new categories and risks for existing URLs, you can ensure that the system uses up-to-date information to filter requested URLs. Malicious sites that represent security threats such as malware, spam, botnets, and phishing may appear and disappear faster than you can update and deploy new policies.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Access_Control_Rules__URL_Filtering.html

What is the function of SDN southbound API protocols?

A.

to allow for the dynamic configuration of control plane applications

A.

to allow for the dynamic configuration of control plane applications

Answers
B.

to enable the controller to make changes

B.

to enable the controller to make changes

Answers
C.

to enable the controller to use REST

C.

to enable the controller to use REST

Answers
D.

to allow for the static configuration of control plane applications

D.

to allow for the static configuration of control plane applications

Answers
Suggested answer: B

Explanation:

Southbound APIs enable SDN controllers to dynamically make changes based on real-time demands and scalability needs.

Reference: https://www.ciscopress.com/articles/article.asp?p=3004581&seqNum=2

Note: Southbound APIs helps us communicate with data plane (not control plane) applications

Refer to the exhibit.

Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

A.

No split-tunnel policy is defined on the Firepower Threat Defense appliance.

A.

No split-tunnel policy is defined on the Firepower Threat Defense appliance.

Answers
B.

The access control policy is not allowing VPN traffic in.

B.

The access control policy is not allowing VPN traffic in.

Answers
C.

Site-to-site VPN peers are using different encryption algorithms.

C.

Site-to-site VPN peers are using different encryption algorithms.

Answers
D.

Site-to-site VPN preshared keys are mismatched.

D.

Site-to-site VPN preshared keys are mismatched.

Answers
Suggested answer: A

Explanation:

If sysopt permit-vpn is not enabled then an access control policy must be created to allow the VPN traffic through the FTD device. If sysopt permit-vpn is enabled skip creating an access control policy.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ikeprotocols/215470- site-to-site-vpn-configuration-on-ftd-ma.html

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

A.

weak passwords for authentication

A.

weak passwords for authentication

Answers
B.

unencrypted links for traffic

B.

unencrypted links for traffic

Answers
C.

software bugs on applications

C.

software bugs on applications

Answers
D.

improper file security

D.

improper file security

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64