Cisco 350-701 Practice Test - Questions Answers, Page 24
List of questions
Related questions
What is the role of an endpoint in protecting a user from a phishing attack?
Use Cisco Stealthwatch and Cisco ISE Integration.
Utilize 802.1X network security to ensure unauthorized access to resources.
Use machine learning models to help identify anomalies and determine expected sending behavior.
Ensure that antivirus and anti malware software is up to date
An organization has noticed an increase in malicious content downloads and wants to use Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which action will accomplish this task?
Set content settings to High
Configure the intelligent proxy.
Use destination block lists.
Configure application block lists.
With which components does a southbound API within a software-defined network architecture communicate?
controllers within the network
applications
appliances
devices such as routers and switches
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
a Network Discovery policy to receive data from the host
a Threat Intelligence policy to download the data from the host
a File Analysis policy to send file data into Cisco Firepower
a Network Analysis policy to receive NetFlow data from the host
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what the IP addressing in this command issued for.
What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?
The key server that is managing the keys for the connection will be at 1.2.3.4
The remote connection will only be allowed from 1.2.3.4
The address that will be used as the crypto validation authority
All IP addresses other than 1.2.3.4 will be allowed
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?
file access from a different user
interesting file access
user login suspicious behavior
privilege escalation
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.
Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)
Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the pre configured interval.
Use EEM to have the ports return to service automatically in less than 300 seconds.
Enter the shutdown and no shutdown commands on the interfaces.
Enable the snmp-server enable traps command and wait 300 seconds
Ensure that interfaces are configured with the error-disable detection and recovery feature
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.
Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.
Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.
Cross-site Scripting is an attack where code is executed from the server side, whereas SQL Injection is an attack where code is executed from the client side.
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
Adaptive Network Control Policy List
Context Visibility
Accounting Reports
RADIUS Live Logs
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
Place the Cisco ISE server and the AD server in the same subnet
Configure a common administrator account
Configure a common DNS server
Synchronize the clocks of the Cisco ISE server and the AD server
Question