ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

What is the function of the Python script code snippet for the Cisco ASA REST API?

A.

adds a global rule into policies

A.

adds a global rule into policies

Answers
B.

changes the hostname of the Cisco ASA

B.

changes the hostname of the Cisco ASA

Answers
C.

deletes a global rule from policies

C.

deletes a global rule from policies

Answers
D.

obtains the saved configuration of the Cisco ASA firewall

D.

obtains the saved configuration of the Cisco ASA firewall

Answers
Suggested answer: A

An engineer must modify a policy to block specific addresses using Cisco Umbrell a. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?

A.

Add the specified addresses to the identities list and create a block action.

A.

Add the specified addresses to the identities list and create a block action.

Answers
B.

Create a destination list for addresses to be allowed or blocked.

B.

Create a destination list for addresses to be allowed or blocked.

Answers
C.

Use content categories to block or allow specific addresses.

C.

Use content categories to block or allow specific addresses.

Answers
D.

Modify the application settings to allow only applications to connect to required addresses.

D.

Modify the application settings to allow only applications to connect to required addresses.

Answers
Suggested answer: B

An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?

A.

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.

A.

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.

Answers
B.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.

B.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.

Answers
C.

GRE over IPsec adds its own header, and L2TP does not.

C.

GRE over IPsec adds its own header, and L2TP does not.

Answers
D.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.

D.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.

Answers
Suggested answer: D

What is a benefit of using a multifactor authentication strategy?

A.

It provides visibility into devices to establish device trust.

A.

It provides visibility into devices to establish device trust.

Answers
B.

It provides secure remote access for applications.

B.

It provides secure remote access for applications.

Answers
C.

It provides an easy, single sign-on experience against multiple applications

C.

It provides an easy, single sign-on experience against multiple applications

Answers
D.

lt protects data by enabling the use of a second validation of identity.

D.

lt protects data by enabling the use of a second validation of identity.

Answers
Suggested answer: D

A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization.

While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?

A.

Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

A.

Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Answers
B.

Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit.

B.

Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Answers
C.

Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit.

C.

Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit.

Answers
D.

Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

D.

Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.

Answers
Suggested answer: D

Which two solutions help combat social engineering and phishing at the endpoint level? (Choose two.)

A.

Cisco Umbrella

A.

Cisco Umbrella

Answers
B.

Cisco ISE

B.

Cisco ISE

Answers
C.

Cisco DNA Center

C.

Cisco DNA Center

Answers
D.

Cisco TrustSec

D.

Cisco TrustSec

Answers
E.

Cisco Duo Security

E.

Cisco Duo Security

Answers
Suggested answer: A, E

Which role is a default guest type in Cisco ISE?

A.

Monthly

A.

Monthly

Answers
B.

Yearly

B.

Yearly

Answers
C.

Contractor

C.

Contractor

Answers
D.

Full-Time

D.

Full-Time

Answers
Suggested answer: C

Explanation:


Which two methods must be used to add switches into the fabric so that administrators can control how switches are added into DCNM for private cloud management? (Choose two.)

A.

Cisco Cloud Director

A.

Cisco Cloud Director

Answers
B.

Cisco Prime Infrastructure

B.

Cisco Prime Infrastructure

Answers
C.

PowerOn Auto Provisioning

C.

PowerOn Auto Provisioning

Answers
D.

Seed IP

D.

Seed IP

Answers
E.

CDP AutoDiscovery

E.

CDP AutoDiscovery

Answers
Suggested answer: C, D

Refer to the exhibit.


All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2 must communicate with each other, and communicate with default gateway multilayer switch. Which type of private VLAN ports should be configured to prevent communication and the file server?

A.

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, GigabitEthernet0/3 and GigabrtEthernet0/4 as isolated ports

A.

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as promiscuous port, GigabitEthernet0/3 and GigabrtEthernet0/4 as isolated ports

Answers
B.

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports

B.

Configure GigabitEthernet0/1 as community port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as promiscuous ports

Answers
C.

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as community port, and GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports

C.

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as community port, and GigabitEthernet0/3 and GigabitEthernet0/4 as isolated ports

Answers
D.

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as community ports

D.

Configure GigabitEthernet0/1 as promiscuous port, GigabitEthernet0/2 as isolated port, and GigabitEthernet0/3 and GigabitEthernet0/4 as community ports

Answers
Suggested answer: D

Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds certain categories and individual URLs to block. What is the result of the configuration?

A.

Only URLs for botnets with reputation scores of 1-3 will be blocked.

A.

Only URLs for botnets with reputation scores of 1-3 will be blocked.

Answers
B.

Only URLs for botnets with a reputation score of 3 will be blocked.

B.

Only URLs for botnets with a reputation score of 3 will be blocked.

Answers
C.

Only URLs for botnets with reputation scores of 3-5 will be blocked.

C.

Only URLs for botnets with reputation scores of 3-5 will be blocked.

Answers
D.

Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked.

D.

Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be blocked.

Answers
Suggested answer: A
Total 631 questions
Go to page: of 64