ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 45

Question list
Search
Search

A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which command achieves this goal?

A.

snmp-server host inside 10.255.255.1 version 3 myv7

A.

snmp-server host inside 10.255.255.1 version 3 myv7

Answers
B.

snmp-server host inside 10.255.255.1 snmpv3 myv7

B.

snmp-server host inside 10.255.255.1 snmpv3 myv7

Answers
C.

snmp-server host inside 10.255.255.1 version 3 asmith

C.

snmp-server host inside 10.255.255.1 version 3 asmith

Answers
D.

snmp-server host inside 10.255.255.1 snmpv3 asmith

D.

snmp-server host inside 10.255.255.1 snmpv3 asmith

Answers
Suggested answer: C

Refer to the exhibit.

What are two indications of the Cisco Firepower Services Module configuration?

(Choose two.)

A.

The module is operating in IDS mode.

A.

The module is operating in IDS mode.

Answers
B.

Traffic is blocked if the module fails.

B.

Traffic is blocked if the module fails.

Answers
C.

Traffic is blocked if the module fails.

C.

Traffic is blocked if the module fails.

Answers
D.

The module is operating in IPS mode.

D.

The module is operating in IPS mode.

Answers
E.

The module is operating in IPS mode.

E.

The module is operating in IPS mode.

Answers
Suggested answer: A, E

Explanation:


Why is it important for the organization to have an endpoint patching strategy?

A.

so the organization can identify endpoint vulnerabilities

A.

so the organization can identify endpoint vulnerabilities

Answers
B.

so the internal PSIRT organization is aware of the latest bugs

B.

so the internal PSIRT organization is aware of the latest bugs

Answers
C.

so the network administrator is notified when an existing bug is encountered

C.

so the network administrator is notified when an existing bug is encountered

Answers
D.

so the latest security fixes are installed on the endpoints

D.

so the latest security fixes are installed on the endpoints

Answers
Suggested answer: D

An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?

A.

File Analysis

A.

File Analysis

Answers
B.

IP Reputation Filtering

B.

IP Reputation Filtering

Answers
C.

Intelligent Multi-Scan

C.

Intelligent Multi-Scan

Answers
D.

Anti-Virus Filtering

D.

Anti-Virus Filtering

Answers
Suggested answer: C

What limits communication between applications or containers on the same node?

A.

microsegmentation

A.

microsegmentation

Answers
B.

container orchestration

B.

container orchestration

Answers
C.

microservicing

C.

microservicing

Answers
D.

Software-Defined Access

D.

Software-Defined Access

Answers
Suggested answer: D

Which open source tool does Cisco use to create graphical visualizations of network telemetry on Cisco IOS XE devices?

A.

InfluxDB

A.

InfluxDB

Answers
B.

Splunk

B.

Splunk

Answers
C.

SNMP

C.

SNMP

Answers
D.

Grafana

D.

Grafana

Answers
Suggested answer: D

How does the Cisco WSA enforce bandwidth restrictions for web applications?

A.

It implements a policy route to redirect application traffic to a lower-bandwidth link.

A.

It implements a policy route to redirect application traffic to a lower-bandwidth link.

Answers
B.

It dynamically creates a scavenger class QoS policy and applies it to each client that connects through the WSA.

B.

It dynamically creates a scavenger class QoS policy and applies it to each client that connects through the WSA.

Answers
C.

It sends commands to the uplink router to apply traffic policing to the application traffic.

C.

It sends commands to the uplink router to apply traffic policing to the application traffic.

Answers
D.

It simulates a slower link by introducing latency into application traffic.

D.

It simulates a slower link by introducing latency into application traffic.

Answers
Suggested answer: C

Which two components do southbound APIs use to communicate with downstream devices?

(Choose two.)

A.

services running over the network

A.

services running over the network

Answers
B.

OpenFlow

B.

OpenFlow

Answers
C.

external application APIs

C.

external application APIs

Answers
D.

applications running over the network

D.

applications running over the network

Answers
E.

OpFlex

E.

OpFlex

Answers
Suggested answer: B, E

What is the term for when an endpoint is associated to a provisioning WLAN that is shared with guest access, and the same guest portal is used as the BYOD portal?

A.

single-SSID BYOD

A.

single-SSID BYOD

Answers
B.

multichannel GUI

B.

multichannel GUI

Answers
C.

dual-SSID BYOD

C.

dual-SSID BYOD

Answers
D.

streamlined access

D.

streamlined access

Answers
Suggested answer: C

Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the network?

A.

Posture

A.

Posture

Answers
B.

Profiling

B.

Profiling

Answers
C.

pxGrid

C.

pxGrid

Answers
D.

MAB

D.

MAB

Answers
Suggested answer: A
Total 631 questions
Go to page: of 64