Cisco 350-701 Practice Test - Questions Answers, Page 27
Related questions
What is a function of 3DES in reference to cryptography?
It hashes files.
It creates one-time use passwords.
It encrypts traffic.
It generates private keys.
Which risk is created when using an Internet browser to access cloud-based service?
misconfiguration of infrastructure, which allows unauthorized access
intermittent connection to the cloud connectors
vulnerabilities within protocol
insecure implementation of API
An organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation. Which actions must be performed in order to provide this capability?
deliver and send copies to other recipients
quarantine and send a DLP violation notification
quarantine and alter the subject header with a DLP violation
deliver and add disclaimer text
Refer to the exhibit.
An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?
configure manager add DONTRESOLVE kregistration key>
configure manager add <FMC IP address> <registration key> 16
configure manager add DONTRESOLVE <registration key> FTD123
configure manager add <FMC IP address> <registration key>
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a trusted interface.
How does the switch behave in this situation?
It forwards the packet after validation by using the MAC Binding Table.
It drops the packet after validation by using the IP & MAC Binding Table.
It forwards the packet without validation.
It drops the packet without validation.
What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?
The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-Based Policy Firewall starts out by allowing all traffic, even on untrusted interfaces
The Cisco IOS router with Zone-Based Policy Firewall can be configured for high availability, whereas the Cisco ASA cannot
The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default, whereas the Cisco ASA starts out by allowing all traffic until rules are added
The Cisco ASA can be configured for high availability whereas the Cisco IOS router with Zone- Based Policy Firewall cannot
What is a benefit of performing device compliance?
Verification of the latest OS patches
Device classification and authorization
Providing multi-factor authentication
Providing attribute-driven policies
Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by several organizations from a specific group?
Hybrid
Community
Private
Public
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?
IKEv1
AH
ESP
IKEv2
An organization wants to secure users, data, and applications in the cloud. The solution must be APIbased and operate as a cloud-native CASB. Which solution must be used for this implementation?
Cisco Cloudlock
Cisco Cloud Email Security
Cisco Firepower Next-Generation Firewall
Cisco Umbrella
Question