ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report Export Collapse

What are the two types of managed Intercloud Fabric deployment models? (Choose two)

Service Provider managed

Service Provider managed

Public managed

Public managed

Hybrid managed

Hybrid managed

User managed

User managed

Enterprise managed

Enterprise managed

Suggested answer: A, E
Explanation:

Many enterprises prefer to deploy development workloads in the public cloud, primarily for convenience and faster deployment. This approach can cause concern for IT administrators, who must control the flow of IT traffic and spending and help ensure the security of data and intellectual property. Without the proper controls, data and intellectual property can escape this oversight. The Cisco Intercloud Fabric solution helps control this shadow IT, discovering resources deployed in the public cloud outside IT control and placing these resources under Cisco Intercloud Fabric control.

Cisco Intercloud Fabric addresses the cloud deployment requirements appropriate for two hybrid cloud deployment models: Enterprise Managed (an enterprise manages its own cloud environments) and Service Provider Managed (the service provider administers and controls all cloud resources).

Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric.pdfThe Cisco Intercloud Fabric architecture provides two product configurations to address the followingtwoconsumption models:

+ Cisco Intercloud Fabric for Business

+ Cisco Intercloud Fabric for Providers

Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric/Intercloud_Fabric_2.html

asked 10/10/2024
Yves ADINGNI
42 questions

Question 172

Report Export Collapse

What are two DDoS attack categories? (Choose two)

sequential

sequential

protocol

protocol

database

database

volume-based

volume-based

screen-based

screen-based

Suggested answer: B, D
Explanation:

There are three basic categories of attack:

+ volume-based attacks, which use high traffic to inundate the network bandwidth + protocol attacks, which focus on exploiting server resources + application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks Reference: https://www.esecurityplanet.com/networks/types-of-ddosattacks/

asked 10/10/2024
Ivan Ramirez
37 questions

Question 173

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 173 117394 10102024233051000000

Which type of authentication is in use?

LDAP authentication for Microsoft Outlook

LDAP authentication for Microsoft Outlook

POP3 authentication

POP3 authentication

SMTP relay server authentication

SMTP relay server authentication

external user and relay mail authentication

external user and relay mail authentication

Suggested answer: A
Explanation:

The TLS connections are recorded in the mail logs, along with other significant actions that are related to messages, such as filter actions, anti-virus and anti-spam verdicts, and delivery attempts. If there is a successful TLS connection, there will be a TLS success entry in the mail logs. Likewise, a failed TLS connection produces a TLS failed entry. If a message does not have an associated TLS entry in the log file, that message was not delivered over a TLS connection.

Reference: https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118844-technoteesa-00.htmlThe exhibit in this Qshows a successful TLS connection from the remote host (reception) in the maillog.

asked 10/10/2024
Elefánti Gábor
41 questions

Question 174

Report Export Collapse

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.

What must be configured to accomplish this?

Configure the Cisco WSA to modify policies based on the traffic seen

Configure the Cisco WSA to modify policies based on the traffic seen

Configure the Cisco ESA to receive real-time updates from Talos

Configure the Cisco ESA to receive real-time updates from Talos

Configure the Cisco WSA to receive real-time updates from Talos

Configure the Cisco WSA to receive real-time updates from Talos

Configure the Cisco ESA to modify policies based on the traffic seen

Configure the Cisco ESA to modify policies based on the traffic seen

Suggested answer: D
Explanation:

The Mail Policies menu is where almost all of the controls related to email filtering happens. All the security and content filtering policies are set here, so it's likely that, as an ESA administrator, the pages on this menu are where you are likely to spend most of your time.

Cisco 350-701 image Question 174 explanation 117395 10102024233051000000

asked 10/10/2024
Dewi Fitriyani
58 questions

Question 175

Report Export Collapse

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?

Encrypted Traffic Analytics

Encrypted Traffic Analytics

Threat Intelligence Director

Threat Intelligence Director

Cognitive Threat Analytics

Cognitive Threat Analytics

Cisco Talos Intelligence

Cisco Talos Intelligence

Suggested answer: B
asked 10/10/2024
Robert McConnell
37 questions

Question 176

Report Export Collapse

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.

The Cisco WSA responds with its own IP address only if it is running in explicit mode.

The Cisco WSA responds with its own IP address only if it is running in explicit mode.

The Cisco WSA is configured in a web browser only if it is running in transparent mode.

The Cisco WSA is configured in a web browser only if it is running in transparent mode.

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.

The Cisco WSA responds with its own IP address only if it is running in transparent mode.

The Cisco WSA responds with its own IP address only if it is running in transparent mode.

Suggested answer: B, D
Explanation:

The Cisco Web Security Appliance (WSA) includes a web proxy, a threat analytics engine, antimalware engine, policy management, and reporting in a single physical or virtual appliance. The main use of the Cisco WSA is to protect users from accessing malicious websites and being infected by malware.

You can deploy the Cisco WSA in two different modes:

– Explicit forward mode

– Transparent mode

In explicit forward mode, the client is configured to explicitly use the proxy, subsequently sending all web traffic to the proxy. Because the client knows there is a proxy and sends all traffic to the proxy in explicit forward mode, the client does not perform a DNS lookup of the domain before requesting the URL. The Cisco WSA is responsible for DNS resolution, as well.

When you configure the Cisco WSA in explicit mode, you do not need to configure any other network infrastructure devices to redirect client requests to the Cisco WSA. However, you must configure each client to send traffic to the Cisco WSA.

-> Therefore in explicit mode, WSA only checks the traffic between client & web server. WSA does not use its own IP address to request -> Answer B is not correct.

When the Cisco WSA is in transparent mode, clients do not know there is a proxy deployed. Network infrastructure devices are configured to forward traffic to the Cisco WSA. In transparent mode deployments, network infrastructure devices redirect web traffic to the proxy. Web traffic redirection can be done using policybased routing (PBR)—available on many routers —or using Cisco's Web Cache Communication Protocol (WCCP) on Cisco ASA, Cisco routers, or switches.

The Web Cache Communication Protocol (WCCP), developed by Cisco Systems, specifies interactions between one or more switches) and one or more web-caches. The purpose of the interaction is to establish and maintain the transparent redirectio of traffic flowing through a group of routers.

Reference: https://www.cisco.com/c/en/us/tech/content-networking/web-cache-communicationsprotocol-wccp/index.html->Therefore answer D is correct as redirection can be done on Layer 3 device only.

In transparent mode, the client is unaware its traffic is being sent to a proxy (Cisco WSA) and, as a result, the client uses DNS to resolve the domain name in the URL and send the web request destined for the web server (not the proxy).

When you configure the Cisco WSA in transparent mode, you need to identify a network choke point with a redirection device (a Cisco ASA) to redirect traffic to the proxy.

WSA in Transparent mode

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide -> Therefore in Transparent mode, WSA uses its own IP address to initiate a new connection the Web Server (in step 4 above) -> Answer E is correct.

Answer C is surely not correct as WSA cannot be configured in a web browser in either mode.

Answer A seems to be correct but it is not. This answer is correct if it states "When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request source" (not destination).

asked 10/10/2024
San Min Oo
49 questions

Question 177

Report Export Collapse

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

Modify an access policy

Modify an access policy

Modify identification profiles

Modify identification profiles

Modify outbound malware scanning policies

Modify outbound malware scanning policies

Modify web proxy settings

Modify web proxy settings

Suggested answer: D
Explanation:

URL conditions in access control rules allow you to limit the websites that users on your network can access. This feature is called URL filtering. There are two ways you can use access control to specify URLs you want to block (or, conversely, allow):

– With any license, you can manually specify individual URLs, groups of URLs, and URL lists and feeds to achieve granular, custom control over web traffic.

– With a URL Filtering license, you can also control access to websites based on the URL's general classification, or category, and risk level, or reputation. The system displays this category and reputation data in connection logs, intrusion events, and application details.

Using category and reputation data also simplifies policy creation and administration. It grants you assurance that the system will control web traffic as expected. Finally, because Cisco's threat intelligence is continually updated with new

URLs, as well as new categories and risks for existing URLs, you can ensure that the system uses up-to-date information to filter requested URLs. Malicious sites that represent security threats such as malware, spam, botnets, and phishing may appear and disappear faster than you can update and deploy new policies.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Access_Control_Rules__URL_Filtering.html

asked 10/10/2024
Eric Hebert
38 questions

Question 178

Report Export Collapse

What is the function of SDN southbound API protocols?

to allow for the dynamic configuration of control plane applications

to allow for the dynamic configuration of control plane applications

to enable the controller to make changes

to enable the controller to make changes

to enable the controller to use REST

to enable the controller to use REST

to allow for the static configuration of control plane applications

to allow for the static configuration of control plane applications

Suggested answer: B
Explanation:

Southbound APIs enable SDN controllers to dynamically make changes based on real-time demands and scalability needs.

Reference: https://www.ciscopress.com/articles/article.asp?p=3004581&seqNum=2

Cisco 350-701 image Question 178 explanation 117399 10102024233051000000

Note: Southbound APIs helps us communicate with data plane (not control plane) applications

asked 10/10/2024
Ibrahim SACCA
42 questions

Question 179

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 179 117400 10102024233051000000

Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?

No split-tunnel policy is defined on the Firepower Threat Defense appliance.

No split-tunnel policy is defined on the Firepower Threat Defense appliance.

The access control policy is not allowing VPN traffic in.

The access control policy is not allowing VPN traffic in.

Site-to-site VPN peers are using different encryption algorithms.

Site-to-site VPN peers are using different encryption algorithms.

Site-to-site VPN preshared keys are mismatched.

Site-to-site VPN preshared keys are mismatched.

Suggested answer: A
Explanation:

If sysopt permit-vpn is not enabled then an access control policy must be created to allow the VPN traffic through the FTD device. If sysopt permit-vpn is enabled skip creating an access control policy.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ikeprotocols/215470- site-to-site-vpn-configuration-on-ftd-ma.html

asked 10/10/2024
ABDOUL RAZAK TIENDREBEOGO
30 questions

Question 180

Report Export Collapse

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

weak passwords for authentication

weak passwords for authentication

unencrypted links for traffic

unencrypted links for traffic

software bugs on applications

software bugs on applications

improper file security

improper file security

Suggested answer: B
asked 10/10/2024
Colin Mabe
50 questions
Total 631 questions
Go to page: of 64

Related questions