ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 7

List of questions

Question 61

Report Export Collapse

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?

flow-export destination inside 1.1.1.1 2055

flow-export destination inside 1.1.1.1 2055

ip flow monitor input

ip flow monitor input

ip flow-export destination 1.1.1.1 2055

ip flow-export destination 1.1.1.1 2055

flow exporter

flow exporter

Suggested answer: C
asked 10/10/2024
Marcos Davila
35 questions

Question 62

Report Export Collapse

How many interfaces per bridge group does an ASA bridge group deployment support?

up to 2

up to 2

up to 4

up to 4

up to 8

up to 8

up to 16

up to 16

Suggested answer: B
Explanation:

Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these groups acts as an independent transparent firewall. It is not possible for one bridge group to communicate with another bridge group without assistance from an external router.

As of 8.4(1) upto 8 bridge groups are supported with 2-4 interface in each group. Prior to this only one bridge group was supported and only 2 interfaces.

Up to 4 interfaces are permitted per bridge–group (inside, outside, DMZ1, DMZ2)

asked 10/10/2024
Beatriz Mejia
48 questions

Question 63

Report Export Collapse

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)

packet decoder

packet decoder

SIP

SIP

modbus

modbus

inline normalization

inline normalization

SSL

SSL

Suggested answer: B, E
Explanation:

Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer protocol decoders that normalize specific types of packet data into formats that the intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the rules engine to effectively apply the same content-related rules to packets whose data is represented differently and obtain meaningful results.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Application_Layer_Preprocessors.html#ID-2244-0000080cFirePower uses many preprocessors, including DNS, FTP/Telnet, SIP, SSL,

SMTP, SSH preprocessors.

asked 10/10/2024
AN KANGWOOK
51 questions

Question 64

Report Export Collapse

Which two features of Cisco Email Security can protect your organization against email threats?

(Choose two)

Time-based one-time passwords

Time-based one-time passwords

Data loss prevention

Data loss prevention

Heuristic-based filtering

Heuristic-based filtering

Geolocation-based filtering

Geolocation-based filtering

NetFlow

NetFlow

Suggested answer: B, D
Explanation:

Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption, all in one solution.

Cisco Email Security appliance can now handle incoming mail connections and incoming messages from specific geolocations and perform appropriate actions on them, for example:

– Prevent email threats coming from specific geographic regions.

– Allow or disallow emails coming from specific geographic regions.

Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html

asked 10/10/2024
I Haq
39 questions

Question 65

Report Export Collapse

Why would a user choose an on-premises ESA versus the CES solution?

Sensitive data must remain onsite.

Sensitive data must remain onsite.

Demand is unpredictable.

Demand is unpredictable.

The server team wants to outsource this service.

The server team wants to outsource this service.

ESA is deployed inline.

ESA is deployed inline.

Suggested answer: A
asked 10/10/2024
Azfar khan
46 questions

Question 66

Report Export Collapse

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?

(Choose two)

Sophos engine

Sophos engine

white list

white list

RAT

RAT

outbreak filters

outbreak filters

DLP

DLP

Suggested answer: A, D
asked 10/10/2024
Carlos Eduardo Araujo Fonseca
43 questions

Question 67

Report Export Collapse

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

It decrypts HTTPS application traffic for unauthenticated users.

It decrypts HTTPS application traffic for unauthenticated users.

It alerts users when the WSA decrypts their traffic.

It alerts users when the WSA decrypts their traffic.

It decrypts HTTPS application traffic for authenticated users.

It decrypts HTTPS application traffic for authenticated users.

It provides enhanced HTTPS application detection for AsyncOS.

It provides enhanced HTTPS application detection for AsyncOS.

Suggested answer: D
asked 10/10/2024
Evelina Turco
40 questions

Question 68

Report Export Collapse

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

It can handle explicit HTTP requests.

It can handle explicit HTTP requests.

It requires a PAC file for the client web browser.

It requires a PAC file for the client web browser.

It requires a proxy for the client web browser.

It requires a proxy for the client web browser.

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.

Layer 4 switches can automatically redirect traffic destined to port 80.

Layer 4 switches can automatically redirect traffic destined to port 80.

Suggested answer: D, E
asked 10/10/2024
Juan Pablo Mateos Ornelas
52 questions

Question 69

Report Export Collapse

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

Configure the datasecurityconfig command

Configure the datasecurityconfig command

Configure the advancedproxyconfig command with the HTTPS subcommand

Configure the advancedproxyconfig command with the HTTPS subcommand

Configure a small log-entry size.

Configure a small log-entry size.

Configure a maximum packet size.

Configure a maximum packet size.

Suggested answer: B
asked 10/10/2024
Simone Somacal
33 questions

Question 70

Report Export Collapse

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?

SAT

SAT

BAT

BAT

HAT

HAT

RAT

RAT

Suggested answer: D
asked 10/10/2024
Geert De Ridder
37 questions
Total 631 questions
Go to page: of 64

Related questions