Cisco 350-701 Practice Test - Questions Answers, Page 24

List of questions
Question 231

What is the role of an endpoint in protecting a user from a phishing attack?
Question 232

An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Question 233

With which components does a southbound API within a software-defined network architecture communicate?
Question 234

A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
Question 235

When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for.
What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
Question 236

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
Question 237

Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Question 238

What is the difference between Cross-site Scripting and SQL Injection, attacks?
Question 239

A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
Question 240

What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Question