ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 37

List of questions

Question 361

Report Export Collapse

What is the function of the Python script code snippet for the Cisco ASA REST API?

adds a global rule into policies

adds a global rule into policies

changes the hostname of the Cisco ASA

changes the hostname of the Cisco ASA

deletes a global rule from policies

deletes a global rule from policies

obtains the saved configuration of the Cisco ASA firewall

obtains the saved configuration of the Cisco ASA firewall

Suggested answer: A
asked 10/10/2024
giancarlo bagnetti srl
44 questions

Question 362

Report Export Collapse

An engineer must modify a policy to block specific addresses using Cisco Umbrell a. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?

Add the specified addresses to the identities list and create a block action.

Add the specified addresses to the identities list and create a block action.

Create a destination list for addresses to be allowed or blocked.

Create a destination list for addresses to be allowed or blocked.

Use content categories to block or allow specific addresses.

Use content categories to block or allow specific addresses.

Modify the application settings to allow only applications to connect to required addresses.

Modify the application settings to allow only applications to connect to required addresses.

Suggested answer: B
asked 10/10/2024
Olanrewaju Abolanle
36 questions

Question 363

Report Export Collapse

An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.

GRE over IPsec adds its own header, and L2TP does not.

GRE over IPsec adds its own header, and L2TP does not.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.

Suggested answer: D
asked 10/10/2024
H Barral Vila
35 questions

Question 364

Report Export Collapse

What is a benefit of using a multifactor authentication strategy?

It provides visibility into devices to establish device trust.

It provides visibility into devices to establish device trust.

It provides secure remote access for applications.

It provides secure remote access for applications.

It provides an easy, single sign-on experience against multiple applications

It provides an easy, single sign-on experience against multiple applications

lt protects data by enabling the use of a second validation of identity.

lt protects data by enabling the use of a second validation of identity.

Suggested answer: D
asked 10/10/2024
Meriem Jlassi
40 questions

Question 365

Report Export Collapse

A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization.

While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?

Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Suggested answer: D
asked 10/10/2024
Szymon Strzep
45 questions

Question 366

Report Export Collapse

Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two.)

Cisco Umbrella

Cisco Umbrella

Cisco ISE

Cisco ISE

Cisco DNA Center

Cisco DNA Center

Cisco TrustSec

Cisco TrustSec

Cisco Duo Security

Cisco Duo Security

Suggested answer: A, E
asked 10/10/2024
Richard Fuller
31 questions

Question 367

Report Export Collapse

Which role is a default guest type in Cisco ISE?

Monthly

Monthly

Yearly

Yearly

Contractor

Contractor

Full-Time

Full-Time

Suggested answer: C
Explanation:


asked 10/10/2024
Harikrishnan Santhanadas
45 questions

Question 368

Report Export Collapse

Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)

Cisco Cloud Director

Cisco Cloud Director

Cisco Prime Infrastructure

Cisco Prime Infrastructure

PowerOn Auto Provisioning

PowerOn Auto Provisioning

Seed IP

Seed IP

CDP AutoDiscovery

CDP AutoDiscovery

Suggested answer: C, D
asked 10/10/2024
Jessica Redmond
36 questions

Question 369

Report Export Collapse

Refer to the exhibit.


Cisco 350-701 image Question 369 117590 10102024233052000000

All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication and the file server?

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, GigabitEthernet0/3 and GigabrtEthernet0/4 as isolated ports

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, GigabitEthernet0/3 and GigabrtEthernet0/4 as isolated ports

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as community port, and GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as community port, and GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as community ports

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as community ports

Suggested answer: D
asked 10/10/2024
Ivan Mazala
50 questions

Question 370

Report Export Collapse

Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?

Only URLs for botnets with reputation scores of 1-3 will be blocked.

Only URLs for botnets with reputation scores of 1-3 will be blocked.

Only URLs for botnets with a reputation score of 3 will be blocked.

Only URLs for botnets with a reputation score of 3 will be blocked.

Only URLs for botnets with reputation scores of 3-5 will be blocked.

Only URLs for botnets with reputation scores of 3-5 will be blocked.

Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked.

Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked.

Suggested answer: A
asked 10/10/2024
SAI CHARAN TANGELLA
40 questions
Total 631 questions
Go to page: of 64
Search

Related questions