ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 63

Question list
Search
Search

List of questions

Search

What is the purpose of a denial-of-service attack?

A.

to disrupt the normal operation of a targeted system by overwhelming It

A.

to disrupt the normal operation of a targeted system by overwhelming It

Answers
B.

to exploit a security vulnerability on a computer system to steal sensitive information

B.

to exploit a security vulnerability on a computer system to steal sensitive information

Answers
C.

to prevent or limit access to data on a computer system by encrypting It

C.

to prevent or limit access to data on a computer system by encrypting It

Answers
D.

to spread throughout a computer system by self-replicating to additional hosts

D.

to spread throughout a computer system by self-replicating to additional hosts

Answers
Suggested answer: A

Explanation:

The purpose of a Denial-of-Service (DoS) attack is to disrupt the normal operation of a targeted system, server, or network by overwhelming it with a flood of internet traffic. This is achieved by utilizing multiple compromised computer systems as sources of attack traffic. The overwhelming amount of traffic can cause the targeted system to slow down significantly or even crash and become unavailable to legitimate users, thereby denying service to intended users.

A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?

A.

SFTP using the FMCCLI

A.

SFTP using the FMCCLI

Answers
B.

syslog using the Secure Event Connector

B.

syslog using the Secure Event Connector

Answers
C.

direct connection using SNMP traps

C.

direct connection using SNMP traps

Answers
D.

HTTP POST using the Security Analytics FMC plugin

D.

HTTP POST using the Security Analytics FMC plugin

Answers
Suggested answer: B

Explanation:

The Secure Event Connector is a component of the Security Analytics and Logging (SaaS) solution that enables the FMC to send logs to the cloud-based service. The Secure Event Connector uses syslog to forward events from the FMC and the managed devices to the cloud. This method reduces the load on the firewall resources, as the events are sent in batches and compressed before transmission. The Secure Event Connector also provides encryption, authentication, and reliability for the log data.The other methods are not supported by the Security Analytics and Logging (SaaS) solution12Reference:=1: Cisco Security Analytics and Logging (On Premises)

What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?

A.

public collection of threat intelligence feeds

A.

public collection of threat intelligence feeds

Answers
B.

threat intelligence sharing organization

B.

threat intelligence sharing organization

Answers
C.

language used to represent security information

C.

language used to represent security information

Answers
D.

service used to exchange security information

D.

service used to exchange security information

Answers
Suggested answer: D

Explanation:

Trusted Automated eXchange of Intelligence Information (TAXII) is a collection of services and message exchanges that enable the sharing of cyber threat intelligence across product, service, and organizational boundaries. It is designed to support the exchange of CTI represented in STIX, but is not limited to STIX. TAXII defines an API that aligns with common sharing models, such as hub-and-spoke, peer-to-peer, and subscribe/publish. TAXII is not a public collection of threat intelligence feeds, a threat intelligence sharing organization, or a language used to represent security information. Those are possible descriptions of STIX, which is a complementary standard to TAXII.Reference:STIX and TAXII Approved as OASIS Standards to Enable Automated Exchange of Cyber Threat Intelligence,STIX V2.1 and TAXII V2.1 OASIS Standards are published,What is STIX/TAXII? | Cloudflare,What is STIX / TAXII? Learn about the industry standards for Cyber ...,What are STIX/TAXII Standards I Resources I Anomali

Which action configures the IEEE 802.1X Flexible Authentication feature lo support Layer 3 authentication mechanisms?

A.

Identity the devices using this feature and create a policy that allows them to pass Layer 2 authentication.

A.

Identity the devices using this feature and create a policy that allows them to pass Layer 2 authentication.

Answers
B.

Configure WebAuth so the hosts are redirected to a web page for authentication.

B.

Configure WebAuth so the hosts are redirected to a web page for authentication.

Answers
C.

Modify the Dot1x configuration on the VPN server lo send Layer 3 authentications to an external authentication database

C.

Modify the Dot1x configuration on the VPN server lo send Layer 3 authentications to an external authentication database

Answers
D.

Add MAB into the switch to allow redirection to a Layer 3 device for authentication.

D.

Add MAB into the switch to allow redirection to a Layer 3 device for authentication.

Answers
Suggested answer: D

Explanation:

Configuring the IEEE 802.1X Flexible Authentication feature to support Layer 3 authentication mechanisms involves adding MAC Authentication Bypass (MAB) into the switch configuration. This allows devices that do not support 802.1X to be authenticated using their MAC address. Once MAB identifies the device, it can then be redirected to a Layer 3 device for further authentication, thus providing a mechanism to support devices requiring Layer 3 authentication methods.

Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?

A.

Cisco Threat Indication Database

A.

Cisco Threat Indication Database

Answers
B.

Cisco Advanced Malware Investigate

B.

Cisco Advanced Malware Investigate

Answers
C.

Cisco Umbrella Investigate

C.

Cisco Umbrella Investigate

Answers
D.

Cisco Secure Workload Cloud

D.

Cisco Secure Workload Cloud

Answers
Suggested answer: C

Explanation:

Cisco Umbrella Investigate provides a comprehensive view of Internet domains, IP addresses, and autonomous systems, offering a wealth of information about the infrastructure of the internet. It helps security analysts and threat investigators to pinpoint current and emerging threats by providing access to data from Cisco's global network, thereby enabling the identification of attackers and malicious infrastructures.

Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?

A.

Cisco Secure Network Analytics

A.

Cisco Secure Network Analytics

Answers
B.

Cisco Secure Cloud Analytics

B.

Cisco Secure Cloud Analytics

Answers
C.

Cisco Umbrella Investigate

C.

Cisco Umbrella Investigate

Answers
D.

Cisco pxGrid

D.

Cisco pxGrid

Answers
Suggested answer: C

An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?

A.

NAT exemption

A.

NAT exemption

Answers
B.

encryption domain

B.

encryption domain

Answers
C.

routing table

C.

routing table

Answers
D.

group policy

D.

group policy

Answers
Suggested answer: D

Explanation:

To achieve the goal of excluding some servers from the VPN tunnel and accessing them directly, the engineer must modify the group policy that is applied to the remote access VPN users. The group policy contains the settings for split tunneling, which is a feature that allows the VPN client to route some traffic through the VPN tunnel and some traffic directly to the internet. Split tunneling can be configured based on the destination IP address, the application, or the domain name of the traffic. By modifying the group policy, the engineer can specify which servers or networks should be excluded from the VPN tunnel and accessed directly by the VPN client. This can improve the performance and efficiency of the VPN connection, as well as reduce the load on the VPN gateway and the corporate network. However, split tunneling also introduces some security risks, such as exposing the VPN client to internet threats, bypassing the corporate firewall and security policies, and leaking sensitive data. Therefore, the engineer must carefully evaluate the trade-offs and best practices of using split tunneling for remote access VPNs.Reference:=

Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0, Module 3: Secure Connectivity, Lesson 3.1: Implementing and Troubleshooting Remote Access VPN, Topic 3.1.4: Configure and Verify Remote Access VPN, Subtopic 3.1.4.2: Configure and Verify Split Tunneling

VPN Split Tunneling: What It Is & Pros and Cons

Cisco ASA - Enable Split Tunnel for Remote VPN Clients

A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
E.

Option A

E.

Option A

Answers
F.

Option B

F.

Option B

Answers
G.

Option C

G.

Option C

Answers
H.

Option D

H.

Option D

Answers
Suggested answer: B

Which problem Is solved by deploying a multicontext firewall?

A.

overlapping IP addressing plan

A.

overlapping IP addressing plan

Answers
B.

more secure policy

B.

more secure policy

Answers
C.

resilient high availability design

C.

resilient high availability design

Answers
D.

faster inspection

D.

faster inspection

Answers
Suggested answer: A

Explanation:

A multicontext firewall is a feature that allows a single physical firewall to be divided into multiple virtual firewalls, also known as security contexts. Each context operates as an independent device, with its own security policy, interfaces, and administrators. This feature is useful for service providers, large enterprises, or any network that requires more than one firewall. One of the problems that a multicontext firewall can solve is an overlapping IP addressing plan. This means that different contexts can use the same IP addresses without causing conflicts, as long as they are separated by different interfaces or VLANs. This allows for more efficient use of IP address space and easier management of multiple networks.A multicontext firewall can also support dynamic routing protocols and VPNs within each context, providing more flexibility and functionality12Reference:=1: What Are Multi-Context Firewalls?- Franklin Fitch2: Multiple Context Mode - Cisco

An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

A.

Configure Cisco Secure Workload to detect anomalies and vulnerabilities.

A.

Configure Cisco Secure Workload to detect anomalies and vulnerabilities.

Answers
B.

Use Cisco ISE to provide application visibility and restrict access to them.

B.

Use Cisco ISE to provide application visibility and restrict access to them.

Answers
C.

Implement Cisco Umbrella lo control the access each application is granted.

C.

Implement Cisco Umbrella lo control the access each application is granted.

Answers
D.

Modify the Cisco Duo configuration to restrict access between applications.

D.

Modify the Cisco Duo configuration to restrict access between applications.

Answers
Suggested answer: A

Explanation:

Cisco Secure Workload (formerly Tetration) is a solution that provides visibility, segmentation, and security for cloud applications. It can monitor application communications, detect abnormal application behavior, and identify vulnerabilities within the applications. Cisco Secure Workload can also enforce granular policies to control the traffic between applications and prevent unauthorized access.Reference:Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0, Module 6: Cloud and Content Security, Lesson 6.2: Cisco Cloud Security Solutions, Topic 6.2.2: Cisco Secure Workload

Total 631 questions
Go to page: of 64