Cisco 350-701 Practice Test - Questions Answers, Page 5
Related questions
On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed devices?
health policy
system policy
correlation policy
access control policy
health awareness policy
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion Prevention System?
control
malware
URL filtering
protect
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System?
(Choose two)
Port
Rule
Source
Application
Protocol
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
quality of service
time synchronization
network address translations
intrusion policy
Which information is required when adding a device to Firepower Management Center?
username and password
encryption method
device serial number
registration key
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
transparent mode
routed mode
inline mode
active mode
passive monitor-only mode
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
Certificate Trust List
Endpoint Trust List
Enterprise Proxy Service
Secured Collaboration Proxy
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
A sysopt command can be used to enable NSEL on a specific interface.
NSEL can be used without a collector configured.
A flow-export event type must be defined under a policy
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
multiple context mode
user deployment of Layer 3 networks
IPv6
clustering
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
It allows traffic if it does not meet the profile.
It defines a traffic baseline for traffic anomaly deduction.
It inspects hosts that meet the profile with more intrusion rules.
It blocks traffic if it does not meet the profile.
Question