ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

For a given policy in Cisco Umbrella, how should a customer block website based on a custom list?

A.

by specifying blocked domains in me policy settings

A.

by specifying blocked domains in me policy settings

Answers
B.

by specifying the websites in a custom blocked category

B.

by specifying the websites in a custom blocked category

Answers
C.

by adding the websites to a blocked type destination list

C.

by adding the websites to a blocked type destination list

Answers
D.

by adding the website IP addresses to the Cisco Umbrella blocklist

D.

by adding the website IP addresses to the Cisco Umbrella blocklist

Answers
Suggested answer: C

An engineer must set up 200 new laptops on a network and wants to prevent the users from moving their laptops around to simplify administration Which switch port MAC address security setting must be used?

A.

sticky

A.

sticky

Answers
B.

static

B.

static

Answers
C.

aging

C.

aging

Answers
D.

maximum

D.

maximum

Answers
Suggested answer: A

Which Cisco Firewall solution requires zone definition?

A.

CBAC

A.

CBAC

Answers
B.

Cisco AMP

B.

Cisco AMP

Answers
C.

ZBFW

C.

ZBFW

Answers
D.

Cisco ASA

D.

Cisco ASA

Answers
Suggested answer: C

A company recently discovered an attack propagating throughout their Windows network via a file named abc428565580xyz exe The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list Verification testing scans on known infected systems shows that AMP for Endpoints is not detecting the presence of this file as an indicator of compromise What must be performed to ensure detection of the malicious file?

A.

Upload the malicious file to the Blocked Application Control List

A.

Upload the malicious file to the Blocked Application Control List

Answers
B.

Use an Advanced Custom Detection List instead of a Simple Custom Detection List

B.

Use an Advanced Custom Detection List instead of a Simple Custom Detection List

Answers
C.

Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis

C.

Check the box in the policy configuration to send the file to Cisco Threat Grid for dynamic analysis

Answers
D.

Upload the SHA-256 hash for the file to the Simple Custom Detection List

D.

Upload the SHA-256 hash for the file to the Simple Custom Detection List

Answers
Suggested answer: D

Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two)

A.

posture assessment

A.

posture assessment

Answers
B.

aaa authorization exec default local

B.

aaa authorization exec default local

Answers
C.

tacacs-server host 10.1.1.250 key password

C.

tacacs-server host 10.1.1.250 key password

Answers
D.

aaa server radius dynamic-author

D.

aaa server radius dynamic-author

Answers
E.

CoA

E.

CoA

Answers
Suggested answer: D, E

An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?

A.

MDA on the router

A.

MDA on the router

Answers
B.

PBR on Cisco WSA

B.

PBR on Cisco WSA

Answers
C.

WCCP on switch

C.

WCCP on switch

Answers
D.

DNS resolution on Cisco WSA

D.

DNS resolution on Cisco WSA

Answers
Suggested answer: C

Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?

A.

AAA attributes

A.

AAA attributes

Answers
B.

CoA request

B.

CoA request

Answers
C.

AV pair

C.

AV pair

Answers
D.

carrier-grade NAT

D.

carrier-grade NAT

Answers
Suggested answer: B

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices The default management port conflicts with other communications on the network and must be changed. What must be done to ensure that all devices can communicate together?

A.

Set the sftunnel to go through the Cisco FTD

A.

Set the sftunnel to go through the Cisco FTD

Answers
B.

Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTD devices

B.

Change the management port on Cisco FMC so that it pushes the change to all managed Cisco FTD devices

Answers
C.

Set the sftunnel port to 8305.

C.

Set the sftunnel port to 8305.

Answers
D.

Manually change the management port on Cisco FMC and all managed Cisco FTD devices

D.

Manually change the management port on Cisco FMC and all managed Cisco FTD devices

Answers
Suggested answer: D

What is the concept of Cl/CD pipelining?

A.

The project is split into several phases where one phase cannot start before the previous phase finishes successfully.

A.

The project is split into several phases where one phase cannot start before the previous phase finishes successfully.

Answers
B.

The project code is centrally maintained and each code change should trigger an automated build and test sequence

B.

The project code is centrally maintained and each code change should trigger an automated build and test sequence

Answers
C.

The project is split into time-limited cycles and focuses on pair programming for continuous code review

C.

The project is split into time-limited cycles and focuses on pair programming for continuous code review

Answers
D.

Each project phase is independent from other phases to maintain adaptiveness and continual improvement

D.

Each project phase is independent from other phases to maintain adaptiveness and continual improvement

Answers
Suggested answer: A

Why should organizations migrate to a multifactor authentication strategy?

A.

Multifactor authentication methods of authentication are never compromised

A.

Multifactor authentication methods of authentication are never compromised

Answers
B.

Biometrics authentication leads to the need for multifactor authentication due to its ability to be hacked easily

B.

Biometrics authentication leads to the need for multifactor authentication due to its ability to be hacked easily

Answers
C.

Multifactor authentication does not require any piece of evidence for an authentication mechanism

C.

Multifactor authentication does not require any piece of evidence for an authentication mechanism

Answers
D.

Single methods of authentication can be compromised more easily than multifactor authentication

D.

Single methods of authentication can be compromised more easily than multifactor authentication

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64