ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 36

Question list
Search
Search

Which open standard creates a framework for sharing threat intelligence in a machine-digestible format?

A.

OpenC2

A.

OpenC2

Answers
B.

OpenlOC

B.

OpenlOC

Answers
C.

CybOX

C.

CybOX

Answers
D.

STIX

D.

STIX

Answers
Suggested answer: D

What are two functionalities of SDN Northbound APIs? (Choose two.)

A.

Northbound APIs provide a programmable interface for applications to dynamically configure the network.

A.

Northbound APIs provide a programmable interface for applications to dynamically configure the network.

Answers
B.

Northbound APIs form the interface between the SDN controller and business applications.

B.

Northbound APIs form the interface between the SDN controller and business applications.

Answers
C.

OpenFlow is a standardized northbound API protocol.

C.

OpenFlow is a standardized northbound API protocol.

Answers
D.

Northbound APIs use the NETCONF protocol to communicate with applications.

D.

Northbound APIs use the NETCONF protocol to communicate with applications.

Answers
E.

Northbound APIs form the interface between the SDN controller and the network switches or routers.

E.

Northbound APIs form the interface between the SDN controller and the network switches or routers.

Answers
Suggested answer: A, B

What is an advantage of network telemetry over SNMP pulls?

A.

accuracy

A.

accuracy

Answers
B.

encapsulation

B.

encapsulation

Answers
C.

security

C.

security

Answers
D.

scalability

D.

scalability

Answers
Suggested answer: D

What are two functions of TAXII in threat intelligence sharing? (Choose two.)

A.

determines the "what" of threat intelligence

A.

determines the "what" of threat intelligence

Answers
B.

Supports STIX information

B.

Supports STIX information

Answers
C.

allows users to describe threat motivations and abilities

C.

allows users to describe threat motivations and abilities

Answers
D.

exchanges trusted anomaly intelligence information

D.

exchanges trusted anomaly intelligence information

Answers
E.

determines how threat intelligence information is relayed

E.

determines how threat intelligence information is relayed

Answers
Suggested answer: B, E

A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?

A.

The hosts must run Cisco AsyncOS 10.0 or greater.

A.

The hosts must run Cisco AsyncOS 10.0 or greater.

Answers
B.

The hosts must run different versions of Cisco AsyncOS.

B.

The hosts must run different versions of Cisco AsyncOS.

Answers
C.

The hosts must have access to the same defined network.

C.

The hosts must have access to the same defined network.

Answers
D.

The hosts must use a different datastore than the virtual appliance.

D.

The hosts must use a different datastore than the virtual appliance.

Answers
Suggested answer: C

What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?

A.

Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.

A.

Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.

Answers
B.

Cisco AMP for Endpoints prevents connections to malicious destinations, and C malware.

B.

Cisco AMP for Endpoints prevents connections to malicious destinations, and C malware.

Answers
C.

Cisco AMP for Endpoints automatically researches indicators of compromise ..

C.

Cisco AMP for Endpoints automatically researches indicators of compromise ..

Answers
D.

Cisco AMP for Endpoints prevents, detects, and responds to attacks before and against Internet threats.

D.

Cisco AMP for Endpoints prevents, detects, and responds to attacks before and against Internet threats.

Answers
Suggested answer: D

Explanation:

https://www.cisco.com/site/us/en/products/security/endpoint-security/secure- endpoint/index.html#:~:text=Powerful%20EDR%20capabilities,from%20Kenna%20Security. Cisco Advanced Malware Protection (AMP) for endpoints can be seen as a replacement for the traditional antivirus solution. It is a next generation, cloud delivered endpoint protection platform (EPP), andadvanced endpoint detection and response(EDR). Providing Protection -- Detection Response While Cisco Umbrella can enforce security at the DNS-, IP-, and HTTP/S-layer, this report does not require that blocking is enabled and only monitors your DNS activity. Any malicious domains requested and IPs resolved are indicators of compromise (IOC). Any malicious domains requested and IPs resolved areindicators of compromise(IOC


What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command on a Cisco IOS router?

A.

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.

A.

lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.

Answers
B.

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL

B.

After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP addresses are permitted in ACL

Answers
C.

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1

C.

After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP addresses are permitted in ACL1

Answers
D.

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.

D.

If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.

Answers
Suggested answer: D

An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must route inbound email to Cisco CE.. record must be modified to accomplish this task?

A.

CNAME

A.

CNAME

Answers
B.

MX

B.

MX

Answers
C.

SPF

C.

SPF

Answers
D.

DKIM

D.

DKIM

Answers
Suggested answer: B

What are two functionalities of northbound and southbound APIs within Cisco SDN architecture?

(Choose two.)

A.

Southbound APIs are used to define how SDN controllers integrate with applications.

A.

Southbound APIs are used to define how SDN controllers integrate with applications.

Answers
B.

Southbound interfaces utilize device configurations such as VLANs and IP addresses.

B.

Southbound interfaces utilize device configurations such as VLANs and IP addresses.

Answers
C.

Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE.

C.

Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE.

Answers
D.

Southbound APIs utilize CLI, SNMP, and RESTCONF.

D.

Southbound APIs utilize CLI, SNMP, and RESTCONF.

Answers
E.

Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices.

E.

Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices.

Answers
Suggested answer: C, D

Which configuration item makes it possible to have the AAA session on the network?

A.

aaa authentication login console ise

A.

aaa authentication login console ise

Answers
B.

aaa authentication enable default enable

B.

aaa authentication enable default enable

Answers
C.

aaa authorization network default group ise

C.

aaa authorization network default group ise

Answers
D.

aaa authorization exec default ise

D.

aaa authorization exec default ise

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64