ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 59

Question list
Search
Search

DRAG DROP

A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right


Question 581
Correct answer: Question 581

Explanation:


Which DoS attack uses fragmented packets in an attempt to crash a target machine?

A.

teardrop

A.

teardrop

Answers
B.

smurf

B.

smurf

Answers
C.

LAND

C.

LAND

Answers
D.

SYN flood

D.

SYN flood

Answers
Suggested answer: A

An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?

A.

Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI.

A.

Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI.

Answers
B.

Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI.

B.

Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI.

Answers
C.

Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI

C.

Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI

Answers
D.

Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI.

D.

Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI.

Answers
Suggested answer: C

What are two workload security models? (Choose two.)

A.

SaaS

A.

SaaS

Answers
B.

PaaS

B.

PaaS

Answers
C.

off-premises

C.

off-premises

Answers
D.

on-premises

D.

on-premises

Answers
E.

IaaS

E.

IaaS

Answers
Suggested answer: C, D

Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?

A.

Link Aggregation

A.

Link Aggregation

Answers
B.

Reverse ARP

B.

Reverse ARP

Answers
C.

private VLANs

C.

private VLANs

Answers
D.

Dynamic ARP Inspection

D.

Dynamic ARP Inspection

Answers
Suggested answer: D

What does Cisco ISE use to collect endpoint attributes that are used in profiling?

A.

probes

A.

probes

Answers
B.

posture assessment

B.

posture assessment

Answers
C.

Cisco AnyConnect Secure Mobility Client

C.

Cisco AnyConnect Secure Mobility Client

Answers
D.

Cisco pxGrid

D.

Cisco pxGrid

Answers
Suggested answer: A

Which threat intelligence standard contains malware hashes?

A.

advanced persistent threat

A.

advanced persistent threat

Answers
B.

open command and control

B.

open command and control

Answers
C.

structured threat information expression

C.

structured threat information expression

Answers
D.

trusted automated exchange of indicator information

D.

trusted automated exchange of indicator information

Answers
Suggested answer: C

Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)

A.

flow-export event-type

A.

flow-export event-type

Answers
B.

policy-map

B.

policy-map

Answers
C.

access-list

C.

access-list

Answers
D.

flow-export template timeout-rate 15

D.

flow-export template timeout-rate 15

Answers
E.

access-group

E.

access-group

Answers
Suggested answer: A, B

Which Cisco security solution secures public, private, hybrid, and community clouds?

A.

Cisco ISE

A.

Cisco ISE

Answers
B.

Cisco ASAv

B.

Cisco ASAv

Answers
C.

Cisco Cloudlock

C.

Cisco Cloudlock

Answers
D.

Cisco pxGrid

D.

Cisco pxGrid

Answers
Suggested answer: C

A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?

A.

file prevalence

A.

file prevalence

Answers
B.

file discovery

B.

file discovery

Answers
C.

file conviction

C.

file conviction

Answers
D.

file manager

D.

file manager

Answers
Suggested answer: A
Total 631 questions
Go to page: of 64