ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?

A.

Cisco Stealthwatch Cloud

A.

Cisco Stealthwatch Cloud

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

NetFlow collectors

C.

NetFlow collectors

Answers
D.

Cisco Cloudlock

D.

Cisco Cloudlock

Answers
Suggested answer: A

What is the difference between a vulnerability and an exploit?

A.

A vulnerability is a hypothetical event for an attacker to exploit

A.

A vulnerability is a hypothetical event for an attacker to exploit

Answers
B.

A vulnerability is a weakness that can be exploited by an attacker

B.

A vulnerability is a weakness that can be exploited by an attacker

Answers
C.

An exploit is a weakness that can cause a vulnerability in the network

C.

An exploit is a weakness that can cause a vulnerability in the network

Answers
D.

An exploit is a hypothetical event that causes a vulnerability in the network

D.

An exploit is a hypothetical event that causes a vulnerability in the network

Answers
Suggested answer: B

Cisco SensorBase gaihers threat information from a variety of Cisco products and services and performs analytics to find patterns on threats Which term describes this process?

A.

deployment

A.

deployment

Answers
B.

consumption

B.

consumption

Answers
C.

authoring

C.

authoring

Answers
D.

sharing

D.

sharing

Answers
Suggested answer: D

An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1 1 11 using the flow record Stea!thwatch406397954 command Which additional command is required to complete the flow record?

A.

transport udp 2055

A.

transport udp 2055

Answers
B.

match ipv4 ttl

B.

match ipv4 ttl

Answers
C.

cache timeout active 60

C.

cache timeout active 60

Answers
D.

destination 1.1.1.1

D.

destination 1.1.1.1

Answers
Suggested answer: B

Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for malicious processes in data center traffic and servers while performing software vulnerability detection?

A.

Cisco Tetration

A.

Cisco Tetration

Answers
B.

Cisco ISE?

B.

Cisco ISE?

Answers
C.

Cisco AMP for Network

C.

Cisco AMP for Network

Answers
D.

Cisco AnyConnect

D.

Cisco AnyConnect

Answers
Suggested answer: A

How is data sent out to the attacker during a DNS tunneling attack?

A.

as part of the UDP/53 packet payload

A.

as part of the UDP/53 packet payload

Answers
B.

as part of the domain name

B.

as part of the domain name

Answers
C.

as part of the TCP/53 packet header

C.

as part of the TCP/53 packet header

Answers
D.

as part of the DNS response packet

D.

as part of the DNS response packet

Answers
Suggested answer: A

An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?

A.

Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE.

A.

Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE.

Answers
B.

Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE

B.

Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE

Answers
C.

Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.

C.

Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.

Answers
D.

Modify the current policy with the condition MFASourceSequence DUO=true in the authorization conditions within Cisco ISE

D.

Modify the current policy with the condition MFASourceSequence DUO=true in the authorization conditions within Cisco ISE

Answers
Suggested answer: B

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures The configuration is created in the simple detection policy section, but it does not work What is the reason for this failure?

A.

The administrator must upload the file instead of the hash for Cisco AMP to use.

A.

The administrator must upload the file instead of the hash for Cisco AMP to use.

Answers
B.

The MD5 hash uploaded to the simple detection policy is in the incorrect format

B.

The MD5 hash uploaded to the simple detection policy is in the incorrect format

Answers
C.

The APK must be uploaded for the application that the detection is intended

C.

The APK must be uploaded for the application that the detection is intended

Answers
D.

Detections for MD5 signatures must be configured in the advanced custom detection policies

D.

Detections for MD5 signatures must be configured in the advanced custom detection policies

Answers
Suggested answer: D

An organization is selecting a cloud architecture and does not want to be responsible for patch management of the operating systems. Why should the organization select either Platform as a Service or Infrastructure as a Service for this environment?

A.

Platform as a Service because the customer manages the operating system

A.

Platform as a Service because the customer manages the operating system

Answers
B.

Infrastructure as a Service because the customer manages the operating system

B.

Infrastructure as a Service because the customer manages the operating system

Answers
C.

Platform as a Service because the service provider manages the operating system

C.

Platform as a Service because the service provider manages the operating system

Answers
D.

Infrastructure as a Service because the service provider manages the operating system

D.

Infrastructure as a Service because the service provider manages the operating system

Answers
Suggested answer: C


An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?

A.

Change the IP address of the new Cisco ISE node to the same network as the others.

A.

Change the IP address of the new Cisco ISE node to the same network as the others.

Answers
B.

Make the new Cisco ISE node a secondary PAN before registering it with the primary.

B.

Make the new Cisco ISE node a secondary PAN before registering it with the primary.

Answers
C.

Open port 8905 on the firewall between the Cisco ISE nodes

C.

Open port 8905 on the firewall between the Cisco ISE nodes

Answers
D.

Add the DNS entry for the new Cisco ISE node into the DNS server

D.

Add the DNS entry for the new Cisco ISE node into the DNS server

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64