ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 28

Question list
Search
Search

List of questions

Search

What are two Trojan malware attacks? (Choose two)

A.

Frontdoor

A.

Frontdoor

Answers
B.

Rootkit

B.

Rootkit

Answers
C.

Smurf

C.

Smurf

Answers
D.

Backdoor

D.

Backdoor

Answers
E.

Sync

E.

Sync

Answers
Suggested answer: B, D

What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?

A.

To protect the endpoint against malicious file transfers

A.

To protect the endpoint against malicious file transfers

Answers
B.

To ensure that assets are secure from malicious links on and off the corporate network

B.

To ensure that assets are secure from malicious links on and off the corporate network

Answers
C.

To establish secure VPN connectivity to the corporate network

C.

To establish secure VPN connectivity to the corporate network

Answers
D.

To enforce posture compliance and mandatory software

D.

To enforce posture compliance and mandatory software

Answers
Suggested answer: B

Explanation:

Umbrella Roaming is a cloud-delivered security service for Cisco's next-generation firewall. It protects your employees even when they are off the VPN.

What is a capability of Cisco ASA Netflow?

A.

It filters NSEL events based on traffic

A.

It filters NSEL events based on traffic

Answers
B.

It generates NSEL events even if the MPF is not configured

B.

It generates NSEL events even if the MPF is not configured

Answers
C.

It logs all event types only to the same collector

C.

It logs all event types only to the same collector

Answers
D.

It sends NetFlow data records from active and standby ASAs in an active standby failover pair

D.

It sends NetFlow data records from active and standby ASAs in an active standby failover pair

Answers
Suggested answer: A

Which component of Cisco umbrella architecture increases reliability of the service?

A.

Anycast IP

A.

Anycast IP

Answers
B.

AMP Threat grid

B.

AMP Threat grid

Answers
C.

Cisco Talos

C.

Cisco Talos

Answers
D.

BGP route reflector

D.

BGP route reflector

Answers
Suggested answer: C

What is the benefit of integrating Cisco ISE with a MDM solution?

A.

It provides compliance checks for access to the network

A.

It provides compliance checks for access to the network

Answers
B.

It provides the ability to update other applications on the mobile device

B.

It provides the ability to update other applications on the mobile device

Answers
C.

It provides the ability to add applications to the mobile device through Cisco ISE

C.

It provides the ability to add applications to the mobile device through Cisco ISE

Answers
D.

It provides network device administration access

D.

It provides network device administration access

Answers
Suggested answer: A

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/ise/2-4/admin_guide/b_ISE_admin_guide_24/m_ise_interoperability_mdm.html

An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?

A.

Configure the *.com address in the block list.

A.

Configure the *.com address in the block list.

Answers
B.

Configure the *.domain.com address in the block list

B.

Configure the *.domain.com address in the block list

Answers
C.

Configure the *domain.com address in the block list

C.

Configure the *domain.com address in the block list

Answers
D.

Configure the domain.com address in the block list

D.

Configure the domain.com address in the block list

Answers
Suggested answer: D

An organization wants to provide visibility and to identify active threats in its network using a VM.

The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?

A.

Cisco Umbrella Cloud

A.

Cisco Umbrella Cloud

Answers
B.

Cisco Stealthwatch Cloud PNM

B.

Cisco Stealthwatch Cloud PNM

Answers
C.

Cisco Stealthwatch Cloud PCM

C.

Cisco Stealthwatch Cloud PCM

Answers
D.

Cisco Umbrella On-Premises

D.

Cisco Umbrella On-Premises

Answers
Suggested answer: B

Explanation:

Private Network Monitoring (PNM) provides visibility and threat detection for the on-premises network, delivered from the cloud as a SaaS solution. It is the perfect solution for organizations who prefer SaaS products and desire better awareness and security in their on-premises environments while reducing capital expenditure and operational overhead. It works by deploying lightweight software in a virtual machine or server that can consume a variety of native sources of telemetry or extract metadata from network packet flow. It encrypts this metadata and sends it to the Stealthwatch Cloud analytics platform for analysis.

Stealthwatch Cloud consumes metadata only. The packet payloads are never retained or transferred outside the network.

This lab focuses on how to configure a Stealthwatch Cloud Private Network Monitoring (PNM) Sensor, in order to provide visibility and effectively identify active threats, and monitors user and device behavior within onpremises networks.

The Stealthwatch Cloud PNM Sensor is an extremely flexible piece of technology, capable of being utilized in a number of different deployment scenarios. It can be deployed as a complete Ubuntu based virtual appliance on different hypervisors (e.g. –VMware, VirtualBox). It can be deployed on hardware running a number of different Linux-based operating systems.

Reference: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/LTRSEC-2240-LG2.pdf

An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs. Which solution meets the needs of the organization?

A.

Cisco FMC

A.

Cisco FMC

Answers
B.

CSM

B.

CSM

Answers
C.

Cisco FDM

C.

Cisco FDM

Answers
D.

CDO

D.

CDO

Answers
Suggested answer: B

An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and dat a. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?

A.

Virtual routing and forwarding

A.

Virtual routing and forwarding

Answers
B.

Microsegmentation

B.

Microsegmentation

Answers
C.

Access control policy

C.

Access control policy

Answers
D.

Virtual LAN

D.

Virtual LAN

Answers
Suggested answer: C

Explanation:

Zero Trust is a security framework requiring all users, whether in or outside the organization's network, to be authenticated, authorized, and continuously validated for security configuration and posture before being granted or keeping access to applications and data. Zero Trust assumes that there is no traditional network edge; networks can be local, in the cloud, or a combination or hybrid with resources anywhere as well as workers in any location.

The Zero Trust model uses microsegmentation — a security technique that involves dividing perimeters into small zones to maintain separate access to every part of the network — to contain attacks.

A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?

A.

Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy

A.

Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy

Answers
B.

Make the priority for the new policy 5 and the primary policy 1

B.

Make the priority for the new policy 5 and the primary policy 1

Answers
C.

Change the encryption to AES* to support all AES algorithms in the primary policy

C.

Change the encryption to AES* to support all AES algorithms in the primary policy

Answers
D.

Make the priority for the primary policy 10 and the new policy 1

D.

Make the priority for the primary policy 10 and the new policy 1

Answers
Suggested answer: B

Explanation:

All IKE policies on the device are sent to the remote peer regardless of what is in the selected policy section.

The first IKE Policy matched by the remote peer will be selected for the VPN connection. Choose which policy is sent first using the priority field. Priority 1 will be sent first.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ikeprotocols/215470- site-to-site-vpn-configuration-on-ftd-ma.html

Total 631 questions
Go to page: of 64