ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 56

Question list
Search
Search

DRAG DROP

Drag and drop the deployment models from the left onto the explanations on the right.

Question 551
Correct answer: Question 551

Explanation:

Explanation:

Which ESA implementation method segregates inbound and outbound email?

A.

one listener on a single physical Interface

A.

one listener on a single physical Interface

Answers
B.

pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address

B.

pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and one IPv6 address

Answers
C.

pair of logical IPv4 listeners and a pair Of IPv6 listeners on two physically separate interfaces

C.

pair of logical IPv4 listeners and a pair Of IPv6 listeners on two physically separate interfaces

Answers
D.

one listener on one logical IPv4 address on a single logical interface

D.

one listener on one logical IPv4 address on a single logical interface

Answers
Suggested answer: D

During a recent security audit a Cisco IOS router with a working IPSEC configuration using IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command The VPN peer is a SOHO router with a dynamically assigned IP address Dynamic DNS has been configured on the SOHO router to map the dynamic IP address to the host name of vpn sohoroutercompany.com In addition to the command crypto isakmp key Cisc425007536 hostname vpn.sohoroutercompany.com what other two commands are now required on the Cisco IOS router for the VPN to continue to function after the wildcard command is removed? (Choose two)

A.

ip host vpn.sohoroutercompany.eom <VPN Peer IP Address>

A.

ip host vpn.sohoroutercompany.eom <VPN Peer IP Address>

Answers
B.

crypto isakmp identity hostname

B.

crypto isakmp identity hostname

Answers
C.

Add the dynamic keyword to the existing crypto map command

C.

Add the dynamic keyword to the existing crypto map command

Answers
D.

fqdn vpn.sohoroutercompany.com <VPN Peer IP Address>

D.

fqdn vpn.sohoroutercompany.com <VPN Peer IP Address>

Answers
E.

ip name-server <DNS Server IP Address>

E.

ip name-server <DNS Server IP Address>

Answers
Suggested answer: B, C

Which command is used to log all events to a destination colector 209.165.201.107?

A.

CiscoASA(config-pmap-c)#flow-export event-type flow-update destination 209.165.201.10

A.

CiscoASA(config-pmap-c)#flow-export event-type flow-update destination 209.165.201.10

Answers
B.

CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.

B.

CiscoASA(config-cmap)# flow-export event-type all destination 209.165.201.

Answers
C.

CiscoASA(config-pmap-c)#flow-export event-type all destination 209.165.201.10

C.

CiscoASA(config-pmap-c)#flow-export event-type all destination 209.165.201.10

Answers
D.

CiscoASA(config-cmap)#flow-export event-type flow-update destination 209.165.201.10

D.

CiscoASA(config-cmap)#flow-export event-type flow-update destination 209.165.201.10

Answers
Suggested answer: C

What is the most commonly used protocol for network telemetry?

A.

SMTP

A.

SMTP

Answers
B.

SNMP

B.

SNMP

Answers
C.

TFTP

C.

TFTP

Answers
D.

NctFlow

D.

NctFlow

Answers
Suggested answer: D

What are two functions of IKEv1 but not IKEv2? (Choose two)

A.

NAT-T is supported in IKEv1 but rot in IKEv2.

A.

NAT-T is supported in IKEv1 but rot in IKEv2.

Answers
B.

With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext

B.

With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext

Answers
C.

With IKEv1, mode negotiates faster than main mode

C.

With IKEv1, mode negotiates faster than main mode

Answers
D.

IKEv1 uses EAP authentication

D.

IKEv1 uses EAP authentication

Answers
E.

IKEv1 conversations are initiated by the IKE_SA_INIT message

E.

IKEv1 conversations are initiated by the IKE_SA_INIT message

Answers
Suggested answer: C, E

Which threat intelligence standard contains malware hashes?

A.

structured threat information expression

A.

structured threat information expression

Answers
B.

advanced persistent threat

B.

advanced persistent threat

Answers
C.

trusted automated exchange or indicator information

C.

trusted automated exchange or indicator information

Answers
D.

open command and control

D.

open command and control

Answers
Suggested answer: A

A company identified a phishing vulnerability during a pentest What are two ways the company can protect employees from the attack? (Choose two.)

A.

using Cisco Umbrella

A.

using Cisco Umbrella

Answers
B.

using Cisco ESA

B.

using Cisco ESA

Answers
C.

using Cisco FTD

C.

using Cisco FTD

Answers
D.

using an inline IPS/IDS in the network

D.

using an inline IPS/IDS in the network

Answers
E.

using Cisco ISE

E.

using Cisco ISE

Answers
Suggested answer: A, B

Which Cisco ISE feature helps to detect missing patches and helps with remediation?

A.

posture assessment

A.

posture assessment

Answers
B.

profiling policy

B.

profiling policy

Answers
C.

authentication policy

C.

authentication policy

Answers
D.

enabling probes

D.

enabling probes

Answers
Suggested answer: B

Refer to the exhibit.

What is the result of using this authentication protocol in the configuration?

A.

The authentication request contains only a username.

A.

The authentication request contains only a username.

Answers
B.

The authentication request contains only a password.

B.

The authentication request contains only a password.

Answers
C.

There are separate authentication and authorization request packets.

C.

There are separate authentication and authorization request packets.

Answers
D.

The authentication and authorization requests are grouped in a single packet.

D.

The authentication and authorization requests are grouped in a single packet.

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64