Cisco 350-701 Practice Test - Questions Answers, Page 63
List of questions
Related questions
What is the purpose of a denial-of-service attack?
to disrupt the normal operation of a targeted system by overwhelming It
to exploit a security vulnerability on a computer system to steal sensitive information
to prevent or limit access to data on a computer system by encrypting It
to spread throughout a computer system by self-replicating to additional hosts
A network administrator is setting up Cisco FMC to send logs to Cisco Security Analytics and Logging (SaaS). The network administrator is anticipating a high volume of logging events from the firewalls and wants lo limit the strain on firewall resources. Which method must the administrator use to send these logs to Cisco Security Analytics and Logging?
SFTP using the FMCCLI
syslog using the Secure Event Connector
direct connection using SNMP traps
HTTP POST using the Security Analytics FMC plugin
What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?
public collection of threat intelligence feeds
threat intelligence sharing organization
language used to represent security information
service used to exchange security information
Which action configures the IEEE 802.1X Flexible Authentication feature lo support Layer 3 authentication mechanisms?
Identity the devices using this feature and create a policy that allows them to pass Layer 2 authentication.
Configure WebAuth so the hosts are redirected to a web page for authentication.
Modify the Dot1x configuration on the VPN server lo send Layer 3 authentications to an external authentication database
Add MAB into the switch to allow redirection to a Layer 3 device for authentication.
Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?
Cisco Threat Indication Database
Cisco Advanced Malware Investigate
Cisco Umbrella Investigate
Cisco Secure Workload Cloud
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
Cisco Secure Network Analytics
Cisco Secure Cloud Analytics
Cisco Umbrella Investigate
Cisco pxGrid
An engineer must modify an existing remote access VPN using a Cisco AnyConnect Secure Mobility client solution and a Cisco Secure Firewall. Currently, all the traffic generate by the user Is sent to the VPN tunnel and the engineer must now exclude some servers and access them directly instead. Which element must be modified to achieve this goat?
NAT exemption
encryption domain
routing table
group policy
A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network 192.168.1.0/24. Which IOS command must oe used to create the access control list?
Option A
Option B
Option C
Option D
Which problem Is solved by deploying a multicontext firewall?
overlapping IP addressing plan
more secure policy
resilient high availability design
faster inspection
An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?
Configure Cisco Secure Workload to detect anomalies and vulnerabilities.
Use Cisco ISE to provide application visibility and restrict access to them.
Implement Cisco Umbrella lo control the access each application is granted.
Modify the Cisco Duo configuration to restrict access between applications.
Question