Cisco 350-701 Practice Test - Questions Answers, Page 24
List of questions
Question 231
What is the role of an endpoint in protecting a user from a phishing attack?
Question 232
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Question 233
With which components does a southbound API within a software-defined network architecture communicate?
Question 234
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
Question 235
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for.
What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
Question 236
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Question 237
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Question 238
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Question 239
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
Question 240
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Question