Cisco 350-701 Practice Test - Questions Answers, Page 31
List of questions
Related questions
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
DSCP value
Source interface
Exporter name
Exporter description
Which category includes DoS Attacks?
Virus attacks
Trojan attacks
Flood attacks
Phishing attacks
What are two advantages of using Cisco Any connect over DMVPN? (Choose two)
It provides spoke-to-spoke communications without traversing the hub
It allows different routing protocols to work over the tunnel
It allows customization of access policies based on user identity
It allows multiple sites to connect to the data center
It enables VPN access for individual users from their machines
When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?
RSA is an asymmetric key establishment algorithm intended to output symmetric keys
RSA is a symmetric key establishment algorithm intended to output asymmetric keys
DH is a symmetric key establishment algorithm intended to output asymmetric keys
DH is on asymmetric key establishment algorithm intended to output symmetric keys
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?
Malware installation
Command-and-control communication
Network footprinting
Data exfiltration
What is a difference between GETVPN and IPsec?
GETVPN reduces latency and provides encryption over MPLS without the use of a central hub
GETVPN provides key management and security association management
GETVPN is based on IKEv2 and does not support IKEv1
GETVPN is used to build a VPN network with multiple sites without having to statically configure all devices
What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?
Telemetry uses a pull mehod, which makes it more reliable than SNMP
Telemetry uses push and pull, which makes it more scalable than SNMP
Telemetry uses push and pull which makes it more secure than SNMP
Telemetry uses a push method which makes it faster than SNMP
An organization wants to use Cisco FTD or Cisco ASA devices. Specific URLs must be blocked from being accessed via the firewall which requires that the administrator input the bad URL categories that the organization wants blocked into the access policy. Which solution should be used to meet this requirement?
Cisco ASA because it enables URL filtering and blocks malicious URLs by default, whereas Cisco FTD does not
Cisco ASA because it includes URL filtering in the access control policy capabilities, whereas Cisco FTD does not
Cisco FTD because it includes URL filtering in the access control policy capabilities, whereas Cisco ASA does not
Cisco FTD because it enables URL filtering and blocks malicious URLs by default, whereas Cisco ASA does not
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users. What must be done on the Cisco WSA to support these requirements?
Configure transparent traffic redirection using WCCP in the Cisco WSA and on the network device
Configure active traffic redirection using WPAD in the Cisco WSA and on the network device
Use the Layer 4 setting in the Cisco WSA to receive explicit forward requests from the network device
Use PAC keys to allow only the required network devices to send the traffic to the Cisco WSA
An administrator configures new authorization policies within Cisco ISE and has difficulty profiling the devices. Attributes for the new Cisco IP phones that are profiled based on the RADIUS authentication are seen however the attributes for
CDP or DHCP are not. What should the administrator do to address this issue?
Configure the ip dhcp snooping trust command on the DHCP interfaces to get the information to Cisco ISE
Configure the authentication port-control auto feature within Cisco ISE to identify the devices that are trying to connect
Configure a service template within the switch to standardize the port configurations so that the correct information is sent to Cisco ISE
Configure the device sensor feature within the switch to send the appropriate protocol information
Question