ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Which statement about IOS zone-based firewalls is true?

A.

An unassigned interface can communicate with assigned interfaces

A.

An unassigned interface can communicate with assigned interfaces

Answers
B.

Only one interface can be assigned to a zone.

B.

Only one interface can be assigned to a zone.

Answers
C.

An interface can be assigned to multiple zones.

C.

An interface can be assigned to multiple zones.

Answers
D.

An interface can be assigned only to one zone.

D.

An interface can be assigned only to one zone.

Answers
Suggested answer: D

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

A.

It tracks flow-create, flow-teardown, and flow-denied events.

A.

It tracks flow-create, flow-teardown, and flow-denied events.

Answers
B.

It provides stateless IP flow tracking that exports all records of a specific flow.

B.

It provides stateless IP flow tracking that exports all records of a specific flow.

Answers
C.

It tracks the flow continuously and provides updates every 10 seconds.

C.

It tracks the flow continuously and provides updates every 10 seconds.

Answers
D.

Its events match all traffic classes in parallel.

D.

Its events match all traffic classes in parallel.

Answers
Suggested answer: A

Explanation:

The ASA and ASASM implementations of NetFlow Secure Event Logging (NSEL) provide a stateful, IP flow tracking method that exports only those records that indicate significant events in a flow.

The significant events that are tracked include flow-create, flow-teardown, and flow-denied (excluding those flows that are denied by EtherType ACLs).

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asageneral-cli/ monitor-nsel.html

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

A.

configure system add <host><key>

A.

configure system add <host><key>

Answers
B.

configure manager <key> add host

B.

configure manager <key> add host

Answers
C.

configure manager delete

C.

configure manager delete

Answers
D.

configure manager add <host><key

D.

configure manager add <host><key

Answers
Suggested answer: D

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

A.

Correlation

A.

Correlation

Answers
B.

Intrusion

B.

Intrusion

Answers
C.

Access Control

C.

Access Control

Answers
D.

Network Discovery

D.

Network Discovery

Answers
Suggested answer: D

Explanation:

The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your network. You can use certain types of discovery and identity data to build a comprehensive map of your network assets, perform forensic analysis, behavioral profiling, access control, and mitigate and respond to the vulnerabilities and exploits to which your organization is susceptible.

You can configure your network discovery policy to perform host and application detection.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmcconfigguide-v64/introduction_to_network_discovery_and_identity.html

Which ASA deployment mode can provide separation of management on a shared appliance?

A.

DMZ multiple zone mode

A.

DMZ multiple zone mode

Answers
B.

transparent firewall mode

B.

transparent firewall mode

Answers
C.

multiple context mode

C.

multiple context mode

Answers
D.

routed mode

D.

routed mode

Answers
Suggested answer: C

Refer to the exhibit.

What is a result of the configuration?

A.

Traffic from the DMZ network is redirected

A.

Traffic from the DMZ network is redirected

Answers
B.

Traffic from the inside network is redirected

B.

Traffic from the inside network is redirected

Answers
C.

All TCP traffic is redirected

C.

All TCP traffic is redirected

Answers
D.

Traffic from the inside and DMZ networks is redirected

D.

Traffic from the inside and DMZ networks is redirected

Answers
Suggested answer: D

Explanation:

The purpose of above commands is to redirect traffic that matches the ACL "redirect-acl" to the Cisco FirePOWER (SFR) module in the inline (normal) mode. In this mode, after the undesired traffic is dropped and any other actions that are applied by policy are performed, the traffic is returned to the ASA for further processing and ultimate transmission.

The command "service-policy global_policy global" applies the policy to all of the interfaces.

Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

A.

Group Policy

A.

Group Policy

Answers
B.

Access Control Policy

B.

Access Control Policy

Answers
C.

Device Management Policy

C.

Device Management Policy

Answers
D.

Platform Service Policy

D.

Platform Service Policy

Answers
Suggested answer: D

Explanation:

Cisco Firepower deployments can take advantage of platform settings policies. A platform settings policy is a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in your deployment, such as time settings and external authentication. Examples of these platform settings policies are time and date settings, external authentication, and other common administrative features.

A shared policy makes it possible to configure multiple managed devices at once, which provides consistency in your deployment and streamlines your management efforts. Any changes to a platform settings policy affects all the managed devices where you applied the policy. Even if you want different settings per device, you must create a shared policy and apply it to the desired device.

For example, your organization's security policies may require that your appliances have a "No Unauthorized Use" message when a user logs in. With platform settings, you can set the login banner once in a platform settings policy.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfigguide-v62/platform_settings_policies_for_managed_devices.htmlTherefore the answer should be "Platform Settings Policy", not "Platform Service

Policy" but it is thebestanswer here so we have to choose it.

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

A.

Enable NetFlow Version 9.

A.

Enable NetFlow Version 9.

Answers
B.

Create an ACL to allow UDP traffic on port 9996.

B.

Create an ACL to allow UDP traffic on port 9996.

Answers
C.

Apply NetFlow Exporter to the outside interface in the inbound direction.

C.

Apply NetFlow Exporter to the outside interface in the inbound direction.

Answers
D.

Create a class map to match interesting traffic.

D.

Create a class map to match interesting traffic.

Answers
E.

Define a NetFlow collector by using the flow-export command

E.

Define a NetFlow collector by using the flow-export command

Answers
Suggested answer: C, E

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

A.

routed mode

A.

routed mode

Answers
B.

transparent mode

B.

transparent mode

Answers
C.

multiple context mode

C.

multiple context mode

Answers
D.

multiple zone mode

D.

multiple zone mode

Answers
Suggested answer: C

What is a characteristic of Firepower NGIPS inline deployment mode?

A.

ASA with Firepower module cannot be deployed.

A.

ASA with Firepower module cannot be deployed.

Answers
B.

It cannot take actions such as blocking traffic.

B.

It cannot take actions such as blocking traffic.

Answers
C.

It is out-of-band from traffic.

C.

It is out-of-band from traffic.

Answers
D.

It must have inline interface pairs configured.

D.

It must have inline interface pairs configured.

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64