ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 42

Question list
Search
Search

An engineer is configuring device-hardening on a router in order to prevent credentials from being seen if the router configuration was compromised. Which command should be used?

A.

service password-encryption

A.

service password-encryption

Answers
B.

username <username> privilege 15 password <password>

B.

username <username> privilege 15 password <password>

Answers
C.

service password-recovery

C.

service password-recovery

Answers
D.

username < username> password <password>

D.

username < username> password <password>

Answers
Suggested answer: A

Which security solution protects users leveraging DNS-layer security?

A.

Cisco ISE

A.

Cisco ISE

Answers
B.

Cisco FTD

B.

Cisco FTD

Answers
C.

Cisco Umbrella

C.

Cisco Umbrella

Answers
D.

Cisco ASA

D.

Cisco ASA

Answers
Suggested answer: C

Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?

A.

CoA-NCL

A.

CoA-NCL

Answers
B.

CoA-NAK

B.

CoA-NAK

Answers
C.

???-???

C.

???-???

Answers
D.

CoA-ACK

D.

CoA-ACK

Answers
Suggested answer: D

Which security solution uses NetFlow to provide visibility across the network, data center, branch offices, and cloud?

A.

Cisco CTA

A.

Cisco CTA

Answers
B.

Cisco Stealthwatch

B.

Cisco Stealthwatch

Answers
C.

Cisco Encrypted Traffic Analytics

C.

Cisco Encrypted Traffic Analytics

Answers
D.

Cisco Umbrella

D.

Cisco Umbrella

Answers
Suggested answer: B

How does a WCCP-configured router identify if the Cisco WSA is functional?

A.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router.

A.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router.

Answers
B.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the WSA.

B.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the WSA.

Answers
C.

The WSA sends a Here-l-Am message every 10 seconds, and the router acknowledges with an ISee-You message.

C.

The WSA sends a Here-l-Am message every 10 seconds, and the router acknowledges with an ISee-You message.

Answers
D.

The router sends a Here-l-Am message every 10 seconds, and the WSA acknowledges with an ISee-You message.

D.

The router sends a Here-l-Am message every 10 seconds, and the WSA acknowledges with an ISee-You message.

Answers
Suggested answer: C


Which solution supports high availability in routed or transparent mode as well as in northbound and southbound deployments?

A.

Cisco FTD with Cisco ASDM

A.

Cisco FTD with Cisco ASDM

Answers
B.

Cisco FTD with Cisco FMC

B.

Cisco FTD with Cisco FMC

Answers
C.

Cisco Firepower NGFW physical appliance with Cisco. FMC

C.

Cisco Firepower NGFW physical appliance with Cisco. FMC

Answers
D.

Cisco Firepower NGFW Virtual appliance with Cisco FMC

D.

Cisco Firepower NGFW Virtual appliance with Cisco FMC

Answers
Suggested answer: B

Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?

A.

cluster

A.

cluster

Answers
B.

transparent

B.

transparent

Answers
C.

routed

C.

routed

Answers
D.

multiple context

D.

multiple context

Answers
Suggested answer: B

Which benefit does DMVPN provide over GETVPN?

A.

DMVPN supports QoS, multicast, and routing, and GETVPN supports only QoS.

A.

DMVPN supports QoS, multicast, and routing, and GETVPN supports only QoS.

Answers
B.

DMVPN is a tunnel-less VPN, and GETVPN is tunnel-based.

B.

DMVPN is a tunnel-less VPN, and GETVPN is tunnel-based.

Answers
C.

DMVPN supports non-IP protocols, and GETVPN supports only IP protocols.

C.

DMVPN supports non-IP protocols, and GETVPN supports only IP protocols.

Answers
D.

DMVPN can be used over the public Internet, and GETVPN requires a private network.

D.

DMVPN can be used over the public Internet, and GETVPN requires a private network.

Answers
Suggested answer: D

An organization has DHCP servers set up to allocate IP addresses to clients on the LAN. What must be done to ensure the LAN switches prevent malicious DHCP traffic while also distributing IP addresses to the correct endpoints?

A.

Configure Dynamic ARP inspection and add entries in the DHCP snooping database.


A.

Configure Dynamic ARP inspection and add entries in the DHCP snooping database.


Answers
B.

Configure DHCP snooping and set trusted interfaces for all client connections.


B.

Configure DHCP snooping and set trusted interfaces for all client connections.


Answers
C.

Configure Dynamic ARP inspection and antispoofing ACLs in the DHCP snooping database.


C.

Configure Dynamic ARP inspection and antispoofing ACLs in the DHCP snooping database.


Answers
D.

Configure DHCP snooping and set a trusted interface for the DHCP server

D.

Configure DHCP snooping and set a trusted interface for the DHCP server

Answers
Suggested answer: B

Which two parameters are used to prevent a data breach in the cloud? (Choose two.)

A.

DLP solutions

A.

DLP solutions

Answers
B.

strong user authentication

B.

strong user authentication

Answers
C.

encryption

C.

encryption

Answers
D.

complex cloud-based web proxies

D.

complex cloud-based web proxies

Answers
E.

antispoofing programs

E.

antispoofing programs

Answers
Suggested answer: A, B
Total 631 questions
Go to page: of 64