ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 36

Add to Whishlist

List of questions

Question 351

Report Export Collapse

Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?

OpenC2

OpenC2

OpenlOC

OpenlOC

CybOX

CybOX

STIX

STIX

Suggested answer: D
asked 10/10/2024
Gerrit Struik
59 questions

Question 352

Report Export Collapse

What are two functionalities of SDN Northbound APIs? (Choose two.)

Northbound APIs provide a programmable interface for applications to dynamically configure the network.

Northbound APIs provide a programmable interface for applications to dynamically configure the network.

Northbound APIs form the interface between the SDN controller and business applications.

Northbound APIs form the interface between the SDN controller and business applications.

OpenFlow is a standardized northbound API protocol.

OpenFlow is a standardized northbound API protocol.

Northbound APIs use the NETCONF protocol to communicate with applications.

Northbound APIs use the NETCONF protocol to communicate with applications.

Northbound APIs form the interface between the SDN controller and the network switches or routers.

Northbound APIs form the interface between the SDN controller and the network switches or routers.

Suggested answer: A, B
asked 10/10/2024
Carol Phelps
44 questions

Question 353

Report Export Collapse

What is an advantage of network telemetry over SNMP pulls?

accuracy

accuracy

encapsulation

encapsulation

security

security

scalability

scalability

Suggested answer: D
asked 10/10/2024
Exam Prepping
29 questions

Question 354

Report Export Collapse

What are two functions of TAXII in threat intelligence sharing? (Choose two.)

determines the "what" of threat intelligence

determines the "what" of threat intelligence

Supports STIX information

Supports STIX information

allows users to describe threat motivations and abilities

allows users to describe threat motivations and abilities

exchanges trusted anomaly intelligence information

exchanges trusted anomaly intelligence information

determines how threat intelligence information is relayed

determines how threat intelligence information is relayed

Suggested answer: B, E
asked 10/10/2024
Meriem Jlassi
40 questions

Question 355

Report Export Collapse

A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?

The hosts must run Cisco AsyncOS 10.0 or greater.

The hosts must run Cisco AsyncOS 10.0 or greater.

The hosts must run different versions of Cisco AsyncOS.

The hosts must run different versions of Cisco AsyncOS.

The hosts must have access to the same defined network.

The hosts must have access to the same defined network.

The hosts must use a different datastore than the virtual appliance.

The hosts must use a different datastore than the virtual appliance.

Suggested answer: C
asked 10/10/2024
Arpita Pattnayak
54 questions

Question 356

Report Export Collapse

What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?

Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.

Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.

Cisco AMP for Endpoints prevents connections to malicious destinations, and C malware.

Cisco AMP for Endpoints prevents connections to malicious destinations, and C malware.

Cisco AMP for Endpoints automatically researches indicators of compromise ..

Cisco AMP for Endpoints automatically researches indicators of compromise ..

Cisco AMP for Endpoints prevents, detects, and responds to attacks before and against Internet threats.

Cisco AMP for Endpoints prevents, detects, and responds to attacks before and against Internet threats.

Suggested answer: D
Explanation:

https://www.cisco.com/site/us/en/products/security/endpoint-security/secure- endpoint/index.html#:~:text=Powerful%20EDR%20capabilities,from%20Kenna%20Security. Cisco Advanced Malware Protection (AMP) for endpoints can be seen as a replacement for the traditional antivirus solution. It is a next generation, cloud delivered endpoint protection platform (EPP), andadvanced endpoint detection and response(EDR). Providing Protection -- Detection Response While Cisco Umbrella can enforce security at the DNS-, IP-, and HTTP/S-layer, this report does not require that blocking is enabled and only monitors your DNS activity. Any malicious domains requested and IPs resolved are indicators of compromise (IOC). Any malicious domains requested and IPs resolved areindicators of compromise(IOC


asked 10/10/2024
Selladurai Ravi
49 questions

Question 357

Report Export Collapse

What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.

Suggested answer: D
asked 10/10/2024
Claudious Utete
45 questions

Question 358

Report Export Collapse

An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?

CNAME

CNAME

MX

MX

SPF

SPF

DKIM

DKIM

Suggested answer: B
asked 10/10/2024
Alper Atar
38 questions

Question 359

Report Export Collapse

What are two functionalities of northbound and southbound APIs within Cisco SDN architecture?

(Choose two.)

Southbound APIs are used to define how SDN controllers integrate with applications.

Southbound APIs are used to define how SDN controllers integrate with applications.

Southbound interfaces utilize device configurations such as VLANs and IP addresses.

Southbound interfaces utilize device configurations such as VLANs and IP addresses.

Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE.

Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE.

Southbound APIs utilize CLI, SNMP, and RESTCONF.

Southbound APIs utilize CLI, SNMP, and RESTCONF.

Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices.

Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices.

Suggested answer: C, D
asked 10/10/2024
Pawel Szalek
41 questions

Question 360

Report Export Collapse

Which configuration item makes it possible to have the AAA session on the network?

aaa authentication login console ise

aaa authentication login console ise

aaa authentication enable default enable

aaa authentication enable default enable

aaa authorization network default group ise

aaa authorization network default group ise

aaa authorization exec default ise

aaa authorization exec default ise

Suggested answer: C
asked 10/10/2024
EMELINE LE QUENTREC
30 questions
Total 631 questions
Go to page: of 64

Related questions