ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Which technology enables integration between Cisco ISE and other platforms to gather and share network and vulnerability data and SIEM and location information?

A.

pxGrid

A.

pxGrid

Answers
B.

NetFlow

B.

NetFlow

Answers
C.

SNMP

C.

SNMP

Answers
D.

Cisco Talos

D.

Cisco Talos

Answers
Suggested answer: A

Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA Center?

A.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count

A.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count

Answers
B.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device

B.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device

Answers
C.

GET

https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value¶meter2=value&....

C.

GET

https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value¶meter2=value&....

Answers
D.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice/startIndex/recordsToReturn

D.

GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice/startIndex/recordsToReturn

Answers
Suggested answer: A

An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.

The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection.

Which solution should the organization choose?

A.

Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not

A.

Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not

Answers
B.

Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not.

B.

Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not.

Answers
C.

Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not

C.

Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not

Answers
D.

Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not.

D.

Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not.

Answers
Suggested answer: C

An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway.

The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of certificate should be presented to the end-user to accomplish this goal?

A.

third-party

A.

third-party

Answers
B.

self-signed

B.

self-signed

Answers
C.

organization owned root

C.

organization owned root

Answers
D.

SubCA

D.

SubCA

Answers
Suggested answer: C

An engineer needs to configure an access control policy rule to always send traffic for inspection without using the default action. Which action should be configured for this rule?

A.

monitor

A.

monitor

Answers
B.

allow

B.

allow

Answers
C.

block

C.

block

Answers
D.

trust

D.

trust

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config- guide-v623/access_control_using_intrusion_and_file_policies.html#:~:text=File%20Policies- ,Access%20Control%20Traffic%20Handling%20with%20Intrusion%20and%20File%20Policies,- The%20following%20diagram the first three access control rules in the policy---Monitor, Trust, and Block---cannot inspect matching traffic. Monitor rules track and log but do not inspect network traffic, so the system continues to match traffic against additional rules to determine whether to permit or deny it https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config- guide-v623/access_control_rules.html#:~:text=Rule%20Blocking%20Actions- ,Access%20Control%20Rule%20Allow%20Action,network%20discovery%20policy%3B%20additionally%2 C%20application%20discovery%20is%20limited%20for%20encrypted%20sessions.,-Related%20Concepts


When NetFlow is applied to an interface, which component creates the flow monitor cache that is used to collect traffic based on the key and nonkey fields in the configured record?

A.

records

A.

records

Answers
B.

flow exporter

B.

flow exporter

Answers
C.

flow sampler

C.

flow sampler

Answers
D.

flow monitor

D.

flow monitor

Answers
Suggested answer: D

Which encryption algorithm provides highly secure VPN communications?

A.

3DES

A.

3DES

Answers
B.

AES 256

B.

AES 256

Answers
C.

AES 128

C.

AES 128

Answers
D.

DES

D.

DES

Answers
Suggested answer: B

An administrator needs to configure the Cisco ASA via ASDM such that the network management system can actively monitor the host using SNMPv3. Which two tasks must be performed for this configuration?

(Choose two.)

A.

Specify the SNMP manager and UDP port.

A.

Specify the SNMP manager and UDP port.

Answers
B.

Specify an SNMP user group

B.

Specify an SNMP user group

Answers
C.

Specify a community string.

C.

Specify a community string.

Answers
D.

Add an SNMP USM entry

D.

Add an SNMP USM entry

Answers
E.

Add an SNMP host access entry

E.

Add an SNMP host access entry

Answers
Suggested answer: B, E

Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?

A.

routed mode

A.

routed mode

Answers
B.

transparent mode

B.

transparent mode

Answers
C.

single context mode

C.

single context mode

Answers
D.

multiple context mode

D.

multiple context mode

Answers
Suggested answer: B

Which function is performed by certificate authorities but is a limitation of registration authorities?

A.

accepts enrollment requests

A.

accepts enrollment requests

Answers
B.

certificate re-enrollment

B.

certificate re-enrollment

Answers
C.

verifying user identity

C.

verifying user identity

Answers
D.

CRL publishing

D.

CRL publishing

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64