ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Refer to the exhibit.

What will occur when this device tries to connect to the port?

A.

802.1X will not work, but MAB will start and allow the device on the network.

A.

802.1X will not work, but MAB will start and allow the device on the network.

Answers
B.

802.1X will not work and the device will not be allowed network access

B.

802.1X will not work and the device will not be allowed network access

Answers
C.

802 1X will work and the device will be allowed on the network

C.

802 1X will work and the device will be allowed on the network

Answers
D.

802 1X and MAB will both be used and ISE can use policy to determine the access level

D.

802 1X and MAB will both be used and ISE can use policy to determine the access level

Answers
Suggested answer: B

A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?

A.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA CLI.

A.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA CLI.

Answers
B.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA GUI

B.

Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA GUI

Answers
C.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA GUI.

C.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA GUI.

Answers
D.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA CLI

D.

Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA CLI

Answers
Suggested answer: A

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

A.

server farm

A.

server farm

Answers
B.

perimeter

B.

perimeter

Answers
C.

core

C.

core

Answers
D.

East-West gateways

D.

East-West gateways

Answers
Suggested answer: B

Refer to the exhibit.

An engineer is implementing a certificate based VPN. What is the result of the existing configuration?

A.

The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.

A.

The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.

Answers
B.

Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully

B.

Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully

Answers
C.

The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER

C.

The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER

Answers
D.

The OU of the IKEv2 peer certificate is set to MANGLER

D.

The OU of the IKEv2 peer certificate is set to MANGLER

Answers
Suggested answer: A

What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?

A.

Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not

A.

Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers whereas Cisco WSA does not

Answers
B.

Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco WSA.

B.

Cisco CWS minimizes the load on the internal network and security infrastructure as compared to Cisco WSA.

Answers
C.

URL categories are updated more frequently on Cisco CWS than they are on Cisco WSA

C.

URL categories are updated more frequently on Cisco CWS than they are on Cisco WSA

Answers
D.

Content scanning for SAAS cloud applications is available through Cisco CWS and not available through Cisco WSA

D.

Content scanning for SAAS cloud applications is available through Cisco CWS and not available through Cisco WSA

Answers
Suggested answer: A

What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?

A.

trusted automated exchange

A.

trusted automated exchange

Answers
B.

Indicators of Compromise

B.

Indicators of Compromise

Answers
C.

The Exploit Database

C.

The Exploit Database

Answers
D.

threat intelligence

D.

threat intelligence

Answers
Suggested answer: D

An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)

A.

Configure Cisco ACI to ingest AWS information.

A.

Configure Cisco ACI to ingest AWS information.

Answers
B.

Configure Cisco Thousand Eyes to ingest AWS information.

B.

Configure Cisco Thousand Eyes to ingest AWS information.

Answers
C.

Send syslog from AWS to Cisco Stealthwatch Cloud.

C.

Send syslog from AWS to Cisco Stealthwatch Cloud.

Answers
D.

Send VPC Flow Logs to Cisco Stealthwatch Cloud.

D.

Send VPC Flow Logs to Cisco Stealthwatch Cloud.

Answers
E.

Configure Cisco Stealthwatch Cloud to ingest AWS information

E.

Configure Cisco Stealthwatch Cloud to ingest AWS information

Answers
Suggested answer: B, E

What is the function of the crypto is a kmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?

A.

It defines what data is going to be encrypted via the VPN

A.

It defines what data is going to be encrypted via the VPN

Answers
B.

lt configures the pre-shared authentication key

B.

lt configures the pre-shared authentication key

Answers
C.

It prevents all IP addresses from connecting to the VPN server.

C.

It prevents all IP addresses from connecting to the VPN server.

Answers
D.

It configures the local address for the VPN server.

D.

It configures the local address for the VPN server.

Answers
Suggested answer: B

An organization wants to improve its cybersecurity processes and to add intelligence to its data The organization wants to utilize the most current intelligence data for URL filtering, reputations, and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA What must be done to accomplish these objectives?

A.

Create a Cisco pxGrid connection to NIST to import this information into the security products for policy use

A.

Create a Cisco pxGrid connection to NIST to import this information into the security products for policy use

Answers
B.

Create an automated download of the Internet Storm Center intelligence feed into the Cisco FTD and Cisco WSA databases to tie to the dynamic access control policies.

B.

Create an automated download of the Internet Storm Center intelligence feed into the Cisco FTD and Cisco WSA databases to tie to the dynamic access control policies.

Answers
C.

Download the threat intelligence feed from the IETF and import it into the Cisco FTD and Cisco WSA databases

C.

Download the threat intelligence feed from the IETF and import it into the Cisco FTD and Cisco WSA databases

Answers
D.

Configure the integrations with Talos Intelligence to take advantage of the threat intelligence that it provides.

D.

Configure the integrations with Talos Intelligence to take advantage of the threat intelligence that it provides.

Answers
Suggested answer: D

Refer to the exhibit.

ntp authentication-key 10 md.5 ciscol23 ntp trusted-key 10

A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced What is the cause of this issue?

A.

The key was configured in plain text.

A.

The key was configured in plain text.

Answers
B.

NTP authentication is not enabled.

B.

NTP authentication is not enabled.

Answers
C.

The hashing algorithm that was used was MD5. which is unsupported.

C.

The hashing algorithm that was used was MD5. which is unsupported.

Answers
D.

The router was not rebooted after the NTP configuration updated.

D.

The router was not rebooted after the NTP configuration updated.

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64