ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 6

List of questions

Question 51

Report Export Collapse

Which statement about IOS zone-based firewalls is true?

An unassigned interface can communicate with assigned interfaces

An unassigned interface can communicate with assigned interfaces

Only one interface can be assigned to a zone.

Only one interface can be assigned to a zone.

An interface can be assigned to multiple zones.

An interface can be assigned to multiple zones.

An interface can be assigned only to one zone.

An interface can be assigned only to one zone.

Suggested answer: D
asked 10/10/2024
Frederico DionΓƒ­sio
45 questions

Question 52

Report Export Collapse

What is a characteristic of Cisco ASA Netflow v9 Secure Event Logging?

It tracks flow-create, flow-teardown, and flow-denied events.

It tracks flow-create, flow-teardown, and flow-denied events.

It provides stateless IP flow tracking that exports all records of a specific flow.

It provides stateless IP flow tracking that exports all records of a specific flow.

It tracks the flow continuously and provides updates every 10 seconds.

It tracks the flow continuously and provides updates every 10 seconds.

Its events match all traffic classes in parallel.

Its events match all traffic classes in parallel.

Suggested answer: A
Explanation:

The ASA and ASASM implementations of NetFlow Secure Event Logging (NSEL) provide a stateful, IP flow tracking method that exports only those records that indicate significant events in a flow.

The significant events that are tracked include flow-create, flow-teardown, and flow-denied (excluding those flows that are denied by EtherType ACLs).

Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asageneral-cli/ monitor-nsel.html

asked 10/10/2024
Cesar Augusto Veliz Reyes
52 questions

Question 53

Report Export Collapse

Which CLI command is used to register a Cisco FirePower sensor to Firepower Management Center?

configure system add <host><key>

configure system add <host><key>

configure manager <key> add host

configure manager <key> add host

configure manager delete

configure manager delete

configure manager add <host><key

configure manager add <host><key

Suggested answer: D
asked 10/10/2024
Mark Hughes
36 questions

Question 54

Report Export Collapse

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

Correlation

Correlation

Intrusion

Intrusion

Access Control

Access Control

Network Discovery

Network Discovery

Suggested answer: D
Explanation:

The Firepower System uses network discovery and identity policies to collect host, application, and user data for traffic on your network. You can use certain types of discovery and identity data to build a comprehensive map of your network assets, perform forensic analysis, behavioral profiling, access control, and mitigate and respond to the vulnerabilities and exploits to which your organization is susceptible.

You can configure your network discovery policy to perform host and application detection.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmcconfigguide-v64/introduction_to_network_discovery_and_identity.html

asked 10/10/2024
Heidar Heidari nia
41 questions

Question 55

Report Export Collapse

Which ASA deployment mode can provide separation of management on a shared appliance?

DMZ multiple zone mode

DMZ multiple zone mode

transparent firewall mode

transparent firewall mode

multiple context mode

multiple context mode

routed mode

routed mode

Suggested answer: C
asked 10/10/2024
Vagner Nicodemo
35 questions

Question 56

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 56 117277 10102024233051000000

What is a result of the configuration?

Traffic from the DMZ network is redirected

Traffic from the DMZ network is redirected

Traffic from the inside network is redirected

Traffic from the inside network is redirected

All TCP traffic is redirected

All TCP traffic is redirected

Traffic from the inside and DMZ networks is redirected

Traffic from the inside and DMZ networks is redirected

Suggested answer: D
Explanation:

The purpose of above commands is to redirect traffic that matches the ACL "redirect-acl" to the Cisco FirePOWER (SFR) module in the inline (normal) mode. In this mode, after the undesired traffic is dropped and any other actions that are applied by policy are performed, the traffic is returned to the ASA for further processing and ultimate transmission.

The command "service-policy global_policy global" applies the policy to all of the interfaces.

Reference: https://www.cisco.com/c/en/us/support/docs/security/asa-firepower-services/118644-configurefirepower-00.html

asked 10/10/2024
istvan Balla
45 questions

Question 57

Report Export Collapse

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

Group Policy

Group Policy

Access Control Policy

Access Control Policy

Device Management Policy

Device Management Policy

Platform Service Policy

Platform Service Policy

Suggested answer: D
Explanation:

Cisco Firepower deployments can take advantage of platform settings policies. A platform settings policy is a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in your deployment, such as time settings and external authentication. Examples of these platform settings policies are time and date settings, external authentication, and other common administrative features.

A shared policy makes it possible to configure multiple managed devices at once, which provides consistency in your deployment and streamlines your management efforts. Any changes to a platform settings policy affects all the managed devices where you applied the policy. Even if you want different settings per device, you must create a shared policy and apply it to the desired device.

For example, your organization's security policies may require that your appliances have a "No Unauthorized Use" message when a user logs in. With platform settings, you can set the login banner once in a platform settings policy.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfigguide-v62/platform_settings_policies_for_managed_devices.htmlTherefore the answer should be "Platform Settings Policy", not "Platform Service

Policy" but it is thebestanswer here so we have to choose it.

asked 10/10/2024
Maria Gervasi
41 questions

Question 58

Report Export Collapse

Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)

Enable NetFlow Version 9.

Enable NetFlow Version 9.

Create an ACL to allow UDP traffic on port 9996.

Create an ACL to allow UDP traffic on port 9996.

Apply NetFlow Exporter to the outside interface in the inbound direction.

Apply NetFlow Exporter to the outside interface in the inbound direction.

Create a class map to match interesting traffic.

Create a class map to match interesting traffic.

Define a NetFlow collector by using the flow-export command

Define a NetFlow collector by using the flow-export command

Suggested answer: C, E
asked 10/10/2024
Ricardo Monsalve
40 questions

Question 59

Report Export Collapse

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

routed mode

routed mode

transparent mode

transparent mode

multiple context mode

multiple context mode

multiple zone mode

multiple zone mode

Suggested answer: C
asked 10/10/2024
Siraj Moosa
41 questions

Question 60

Report Export Collapse

What is a characteristic of Firepower NGIPS inline deployment mode?

ASA with Firepower module cannot be deployed.

ASA with Firepower module cannot be deployed.

It cannot take actions such as blocking traffic.

It cannot take actions such as blocking traffic.

It is out-of-band from traffic.

It is out-of-band from traffic.

It must have inline interface pairs configured.

It must have inline interface pairs configured.

Suggested answer: D
asked 10/10/2024
rene laas
56 questions
Total 631 questions
Go to page: of 64

Related questions