ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 26

List of questions

Question 251

Report Export Collapse

In which two ways does Easy Connect help control network access when used with Cisco TrustSec?

(Choose two)

It allows multiple security products to share information and work together to enhance security posture in the network.

It allows multiple security products to share information and work together to enhance security posture in the network.

It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.

It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.

It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.

It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.

It integrates with third-party products to provide better visibility throughout the network.

It integrates with third-party products to provide better visibility throughout the network.

It allows for managed endpoints that authenticate to AD to be mapped to Security Groups

(PassiveID).

It allows for managed endpoints that authenticate to AD to be mapped to Security Groups

(PassiveID).

Suggested answer: C, E
Explanation:

Easy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity.

Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprisenetworks/trustsec/trustsec-witheasy-connect-configuration-guide.pdf

asked 10/10/2024
MAYKON AZEVEDO
42 questions

Question 252

Report Export Collapse

What is the benefit of installing Cisco AMP for Endpoints on a network?

It provides operating system patches on the endpoints for security.

It provides operating system patches on the endpoints for security.

It provides flow-based visibility for the endpoints network connections.

It provides flow-based visibility for the endpoints network connections.

It enables behavioral analysis to be used for the endpoints.

It enables behavioral analysis to be used for the endpoints.

It protects endpoint systems through application control and real-time scanning

It protects endpoint systems through application control and real-time scanning

Suggested answer: D
asked 10/10/2024
Kishi Peart
43 questions

Question 253

Report Export Collapse

An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?

Set a trusted interface for the DHCP server

Set a trusted interface for the DHCP server

Set the DHCP snooping bit to 1

Set the DHCP snooping bit to 1

Add entries in the DHCP snooping database

Add entries in the DHCP snooping database

Enable ARP inspection for the required VLAN

Enable ARP inspection for the required VLAN

Suggested answer: A
Explanation:

To understand DHCP snooping we need to learn about DHCP spoofing attack first.

Cisco 350-701 image Question 253 explanation 117474 10102024233051000000

DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers them with fake DHCP Response before the authorized DHCP Response comes to the clients.

The fake DHCP Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go through the attacker computer, the attacker becomes a "man-in-the-middle".

The attacker can have some ways to make sure its fake DHCP Response arrives first. In fact, if the attacker is "closer" than the DHCP Server then he doesn't need to do anything. Or he can DoS the DHCP Server so that it can't send the DHCP Response.

DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.

Cisco 350-701 image Question 253 explanation 117474 10102024233051000000

Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down.

asked 10/10/2024
EMELINE LE QUENTREC
29 questions

Question 254

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 254 117475 10102024233051000000

What will happen when the Python script is executed?

The hostname will be translated to an IP address and printed.

The hostname will be translated to an IP address and printed.

The hostname will be printed for the client in the client ID field.

The hostname will be printed for the client in the client ID field.

The script will pull all computer hostnames and print them.

The script will pull all computer hostnames and print them.

The script will translate the IP address to FODN and print it

The script will translate the IP address to FODN and print it

Suggested answer: C
asked 10/10/2024
Victor Gouveia Pennella
47 questions

Question 255

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 255 117476 10102024233051000000

When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?

Group Policy

Group Policy

Method

Method

SAML Server

SAML Server

DHCP Servers

DHCP Servers

Suggested answer: B
Explanation:

In order to use AAA along with an external token authentication mechanism, set the "Method" as "Both" in the Authentication.

asked 10/10/2024
Loyiso Gawula
41 questions

Question 256

Report Export Collapse

An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?

Cisco Umbrella

Cisco Umbrella

Cisco Cloud Email Security

Cisco Cloud Email Security

Cisco NGFW

Cisco NGFW

Cisco Cloudlock

Cisco Cloudlock

Suggested answer: D
Explanation:

Cisco Cloudlock: Secure your cloud users, data, and applications with the cloud-native Cloud Access Security Broker (CASB) and cloud cybersecurity platform.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-websecurity/at-a-glance-c45- 738565.pdf

asked 10/10/2024
Luis Maciel
47 questions

Question 257

Report Export Collapse

An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API. Which solution should be used to accomplish this goal?

SIEM

SIEM

CASB

CASB

Adaptive MFA

Adaptive MFA

Cisco Cloudlock

Cisco Cloudlock

Suggested answer: D
Explanation:

+ Cisco Cloudlock continuously monitors cloud environments with a cloud Data Loss Prevention (DLP) engine to identify sensitive information stored in cloud environments in violation of policy.

+ Cloudlock is API-based.

+ Incidents are a key resource in the Cisco Cloudlock application. They are triggered by the Cloudlock policy engine when a policy detection criteria result in a match in an object (document, field, folder, post, or file).

Reference: https://docs.umbrella.com/cloudlock-documentation/docs/endpointsNote:

+ Security information and event management (SIEM) platforms collect log and event data from security systems, networks and computers, and turn it into actionable security insights.

+ An incident is a record of the triggering of an alerting policy. Cloud Monitoring opens an incident when a condition of an alerting policy has been met.

asked 10/10/2024
Sumit Sengupta
46 questions

Question 258

Report Export Collapse

Why is it important to implement MFA inside of an organization?

To prevent man-the-middle attacks from being successful.

To prevent man-the-middle attacks from being successful.

To prevent DoS attacks from being successful.

To prevent DoS attacks from being successful.

To prevent brute force attacks from being successful.

To prevent brute force attacks from being successful.

To prevent phishing attacks from being successful.

To prevent phishing attacks from being successful.

Suggested answer: C
asked 10/10/2024
Thanh Phan
44 questions

Question 259

Report Export Collapse

A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?

map SNMPv3 users to SNMP views

map SNMPv3 users to SNMP views

set the password to be used for SNMPv3 authentication

set the password to be used for SNMPv3 authentication

define the encryption algorithm to be used by SNMPv3

define the encryption algorithm to be used by SNMPv3

specify the UDP port used by SNMP

specify the UDP port used by SNMP

Suggested answer: B
asked 10/10/2024
patricia rosales
37 questions

Question 260

Report Export Collapse

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?

Cisco Defense Orchestrator

Cisco Defense Orchestrator

Cisco Secureworks

Cisco Secureworks

Cisco DNA Center

Cisco DNA Center

Cisco Configuration Professional

Cisco Configuration Professional

Suggested answer: A
Explanation:

Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms.

Cisco Defense Orchestrator features:

….

Management of hybrid environments: Managing a mix of firewalls running the ASA, FTD, and Meraki MX software is now easy, with the ability to share policy elements across platforms.

Reference: https://www.cisco.com/c/en/us/products/collateral/security/defenseorchestrator/datasheet-c78-736847.html

asked 10/10/2024
Kinshuk Choubisa
48 questions
Total 631 questions
Go to page: of 64
Search

Related questions