ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 20

Question list
Search
Search

An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

A.

TCP 6514

A.

TCP 6514

Answers
B.

UDP 1700

B.

UDP 1700

Answers
C.

TCP 49

C.

TCP 49

Answers
D.

UDP 1812

D.

UDP 1812

Answers
Suggested answer: B

Explanation:

CoA Messages are sent on two different udp ports depending on the platform. Cisco standardizes on UDP port 1700, while the actual RFC calls out using UDP port 3799.

Which public cloud provider supports the Cisco Next Generation Firewall Virtual?

A.

Google Cloud Platform

A.

Google Cloud Platform

Answers
B.

Red Hat Enterprise Visualization

B.

Red Hat Enterprise Visualization

Answers
C.

VMware ESXi

C.

VMware ESXi

Answers
D.

Amazon Web Services

D.

Amazon Web Services

Answers
Suggested answer: D

Explanation:

Cisco Firepower NGFW Virtual (NGFWv) is the virtualized version of Cisco's Firepower next generation firewall.

The Cisco NGFW virtual appliance is available in the AWS and Azure marketplaces. In AWS, it can be deployed in routed and passive modes. Passive mode design requires ERSPAN, the Encapsulated Remote Switched Port Analyzer, which is currently not available in Azure.

In passive mode, NGFWv inspects packets like an Intrusion Detection System (IDS) appliance, but no action can be taken on the packet.

In routed mode NGFWv acts as a next hop for workloads. It can inspect packets and also take action on the packet based on rule and policy definitions.

Reference: https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtualappliance-asav/ white-paper-c11-740505.html

What is the purpose of the My Devices Portal in a Cisco ISE environment?

A.

to register new laptops and mobile devices

A.

to register new laptops and mobile devices

Answers
B.

to request a newly provisioned mobile device

B.

to request a newly provisioned mobile device

Answers
C.

to provision userless and agentless systems

C.

to provision userless and agentless systems

Answers
D.

to manage and deploy antivirus definitions and patches on systems owned by the end user

D.

to manage and deploy antivirus definitions and patches on systems owned by the end user

Answers
Suggested answer: A

Explanation:

Depending on your company policy, you might be able to use your mobile phones, tablets, printers, Internet radios, and other network devices on your company's network. You can use the My Devices portal to register and manage these devices on your company's network.

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/mydevices/b_mydevices_2x.html

Refer to the exhibit.

An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity?

A.

ip dhcp snooping verify mac-address

A.

ip dhcp snooping verify mac-address

Answers
B.

ip dhcp snooping limit 41

B.

ip dhcp snooping limit 41

Answers
C.

ip dhcp snooping vlan 41

C.

ip dhcp snooping vlan 41

Answers
D.

ip dhcp snooping trust

D.

ip dhcp snooping trust

Answers
Suggested answer: D

Explanation:

To understand DHCP snooping we need to learn about DHCP spoofing attack first.

DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers them with fake DHCP Response before the authorized DHCP Response comes to the clients.

The fake DHCP Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go through the attacker computer, the attacker becomes a "man-in-the-middle".

The attacker can have some ways to make sure its fake DHCP Response arrives first. In fact, if the attacker is "closer" than the DHCP Server then he doesn't need to do anything. Or he can DoS the DHCP Server so that it can't send the DHCP Response.

DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.

Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down.

The port connected to a DHCP server should be configured as trusted port with the "ip dhcp snooping trust" command. Other ports connecting to hosts are untrusted ports by default.

In this question, we need to configure the uplink to "trust" (under interface Gi1/0/1) as shown below.

What is the purpose of the certificate signing request when adding a new certificate for a server?

A.

It is the password for the certificate that is needed to install it with.

A.

It is the password for the certificate that is needed to install it with.

Answers
B.

It provides the server information so a certificate can be created and signed

B.

It provides the server information so a certificate can be created and signed

Answers
C.

It provides the certificate client information so the server can authenticate against it when installing

C.

It provides the certificate client information so the server can authenticate against it when installing

Answers
D.

It is the certificate that will be loaded onto the server

D.

It is the certificate that will be loaded onto the server

Answers
Suggested answer: B

Explanation:

A certificate signing request (CSR) is one of the first steps towards getting your own SSL Certificate.

Generated on the same server you plan to install the certificate on, the CSR contains information (e.g. common name, organization, country) that the Certificate Authority (CA) will use to create your certificate. It also contains the public key that will be included in your certificate and is signed with the corresponding private key

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

A.

Cisco Cloudlock

A.

Cisco Cloudlock

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

Cisco AMP

C.

Cisco AMP

Answers
D.

Cisco App Dynamics

D.

Cisco App Dynamics

Answers
Suggested answer: A

Explanation:

Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely.

It protects your cloud users, data, and apps. Cisco Cloudlock provides visibility and compliance checks, protects data against misuse and exfiltration, and provides threat protections against malware like ransomware.

What is managed by Cisco Security Manager?

A.

access point

A.

access point

Answers
B.

WSA

B.

WSA

Answers
C.

ASA

C.

ASA

Answers
D.

ESA

D.

ESA

Answers
Suggested answer: C

Explanation:

Cisco Security Manager provides a comprehensive management solution for:

– Cisco ASA 5500 Series Adaptive Security Appliances

– Cisco intrusion prevention systems 4200 and 4500 Series Sensors

– Cisco AnyConnect Secure Mobility Client

Reference: https://www.cisco.com/c/en/us/products/security/security-manager/index.html

How does Cisco Advanced Phishing Protection protect users?

A.

It validates the sender by using DKIM.

A.

It validates the sender by using DKIM.

Answers
B.

It determines which identities are perceived by the sender

B.

It determines which identities are perceived by the sender

Answers
C.

It utilizes sensors that send messages securely.

C.

It utilizes sensors that send messages securely.

Answers
D.

It uses machine learning and real-time behavior analytics.

D.

It uses machine learning and real-time behavior analytics.

Answers
Suggested answer: B

Explanation:

Cisco Advanced Phishing Protection provides sender authentication and BEC detection capabilities. It uses advanced machine learning techniques, real-time behavior analytics, relationship modeling, and telemetry to protect against identity deception-based threats.

Reference: https://docs.ces.cisco.com/docs/advanced-phishing-protection

What is a benefit of using Cisco FMC over Cisco ASDM?

A.

Cisco FMC uses Java while Cisco ASDM uses HTML5.

A.

Cisco FMC uses Java while Cisco ASDM uses HTML5.

Answers
B.

Cisco FMC provides centralized management while Cisco ASDM does not.

B.

Cisco FMC provides centralized management while Cisco ASDM does not.

Answers
C.

Cisco FMC supports pushing configurations to devices while Cisco ASDM does not.

C.

Cisco FMC supports pushing configurations to devices while Cisco ASDM does not.

Answers
D.

Cisco FMC supports all firewall products whereas Cisco ASDM only supports Cisco ASA devices

D.

Cisco FMC supports all firewall products whereas Cisco ASDM only supports Cisco ASA devices

Answers
Suggested answer: B

Explanation:

Cisco FTD devices, Cisco Firepower devices, and the Cisco ASA FirePOWER modules can be managed by the Firepower Management Center (FMC), formerly known as the FireSIGHT Management Center -> Answer D is not correct

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide Note: The ASA FirePOWER module runs on the separately upgraded ASA operating system "You cannot use an FMC to manage ASA firewall functions."

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepowercompatibility.htmlThe Cisco Secure Firewall Threat Defense Manager (Firepower Management Center) increases theeffectiveness of your Cisco network security solutions by providing centralized, integrated, andstreamlined management.

Reference: https://www.cisco.com/c/en/us/products/collateral/security/firesight-managementcenter/datasheetc78-736775.html

What is a key difference between Cisco Firepower and Cisco ASA?

A.

Cisco ASA provides access control while Cisco Firepower does not.

A.

Cisco ASA provides access control while Cisco Firepower does not.

Answers
B.

Cisco Firepower provides identity-based access control while Cisco ASA does not.

B.

Cisco Firepower provides identity-based access control while Cisco ASA does not.

Answers
C.

Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.

C.

Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.

Answers
D.

Cisco ASA provides SSL inspection while Cisco Firepower does not.

D.

Cisco ASA provides SSL inspection while Cisco Firepower does not.

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64