Cisco 350-701 Practice Test - Questions Answers, Page 23
List of questions
Related questions
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?
need to be reestablished with stateful failover and preserved with stateless failover
preserved with stateful failover and need to be reestablished with stateless failover
preserved with both stateful and stateless failover
need to be reestablished with both stateful and stateless failover
Which type of protection encrypts RSA keys when they are exported and imported?
file
passphrase
NGE
nonexportable
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
The policy was created to send a message to quarantine instead of drop
The file has a reputation score that is above the threshold
The file has a reputation score that is below the threshold
The policy was created to disable file analysis
An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?
NetFlow
Packet Tracer
Network Discovery
Access Control
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
buffer overflow
DoS
SQL injection
phishing
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements?
(Choose two)
Use outbreak filters from SenderBase
Enable a message tracking service
Configure a recipient access table
Deploy the Cisco ESA in the DMZ
Scan quarantined emails using AntiVirus signatures
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
service management
centralized management
application management
distributed management
In an IaaS cloud services model, which security function is the provider responsible for managing?
Internet proxy
firewalling virtual machines
CASB
hypervisor OS hardening
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
Use MAB with profiling
Use MAB with posture assessment.
Use 802.1X with posture assessment.
Use 802.1X with profiling.
An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do so.
Which command is required to enable the client to accept the server's authentication key?
ntp peer 1.1.1.1 key 1
ntp server 1.1.1.1 key 1
ntp server 1.1.1.2 key 1
ntp peer 1.1.1.2 key 1
Question