Cisco 350-701 Practice Test - Questions Answers, Page 32
List of questions
Related questions
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?
Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud
Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud
Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud
Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default management port conflicts with other communications on the network and must be changed. What must be done to ensure that all devices can communicate together?
Manually change the management port on Cisco FMC and all managed Cisco FTD devices
Set the tunnel to go through the Cisco FTD
Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTD devices
Set the tunnel port to 8305
Which service allows a user export application usage and performance statistics with Cisco Application Visibility and control?
SNORT
NetFlow
SNMP
802.1X
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?
The engineer is attempting to upload a hash created using MD5 instead of SHA-256
The file being uploaded is incompatible with simple detections and must use advanced detections
The hash being uploaded is part of a set in an incorrect format
The engineer is attempting to upload a file instead of a hash
Refer to the exhibit.
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802.1X deployment and has difficulty with some endpoints gaining access.
Most PCs and IP phones can connect and authenticate using their machine certificate credentials.
However printer and video cameras cannot base d on the interface configuration provided, what must be to get these devices on to the network using Cisco ISE for authentication and authorization while maintaining security controls?
Change the default policy in Cisco ISE to allow all devices not using machine authentication .
Enable insecure protocols within Cisco ISE in the allowed protocols configuration.
Configure authentication event fail retry 2 action authorize vlan 41 on the interface
Add mab to the interface configuration.
An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source- interface command needed for this configuration?
Only requests that originate from a configured NAS IP are accepted by a RADIUS server
The RADIUS authentication key is transmitted only from the defined RADIUS source interface
RADIUS requests are generated only by a router if a RADIUS source interface is defined.
Encrypted RADIUS authentication requires the RADIUS source interface be defined
A customer has various external HTTP resources available including Intranet. Extranet, and Internet,with a proxy configuration running in explicit mode Which method allows the client desktopbrowsers to be configured to select when to connect direct or when to use the proxy?
Transparent mode
Forward file
PAC file
Bridge mode
Refer to the exhibit. What does this Python script accomplish?
It allows authentication with TLSv1 SSL protocol
It authenticates to a Cisco ISE with an SSH connection.
lt authenticates to a Cisco ISE server using the username of ersad
It lists the LDAP users from the external identity store configured on Cisco ISE
Which system facilitates deploying microsegmentation and multi-tenancy services with a policyQuestions & Answers PDF P-174 based container?
SDLC
Docker
Lambda
Contiv
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?
big data
storm centers
sandboxing
blocklisting
Question