ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 7

Question list
Search
Search

An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?

A.

flow-export destination inside 1.1.1.1 2055

A.

flow-export destination inside 1.1.1.1 2055

Answers
B.

ip flow monitor input

B.

ip flow monitor input

Answers
C.

ip flow-export destination 1.1.1.1 2055

C.

ip flow-export destination 1.1.1.1 2055

Answers
D.

flow exporter

D.

flow exporter

Answers
Suggested answer: C

How many interfaces per bridge group does an ASA bridge group deployment support?

A.

up to 2

A.

up to 2

Answers
B.

up to 4

B.

up to 4

Answers
C.

up to 8

C.

up to 8

Answers
D.

up to 16

D.

up to 16

Answers
Suggested answer: B

Explanation:

Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these groups acts as an independent transparent firewall. It is not possible for one bridge group to communicate with another bridge group without assistance from an external router.

As of 8.4(1) upto 8 bridge groups are supported with 2-4 interface in each group. Prior to this only one bridge group was supported and only 2 interfaces.

Up to 4 interfaces are permitted per bridge–group (inside, outside, DMZ1, DMZ2)

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)

A.

packet decoder

A.

packet decoder

Answers
B.

SIP

B.

SIP

Answers
C.

modbus

C.

modbus

Answers
D.

inline normalization

D.

inline normalization

Answers
E.

SSL

E.

SSL

Answers
Suggested answer: B, E

Explanation:

Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer protocol decoders that normalize specific types of packet data into formats that the intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the rules engine to effectively apply the same content-related rules to packets whose data is represented differently and obtain meaningful results.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Application_Layer_Preprocessors.html#ID-2244-0000080cFirePower uses many preprocessors, including DNS, FTP/Telnet, SIP, SSL,

SMTP, SSH preprocessors.

Which two features of Cisco Email Security can protect your organization against email threats?

(Choose two)

A.

Time-based one-time passwords

A.

Time-based one-time passwords

Answers
B.

Data loss prevention

B.

Data loss prevention

Answers
C.

Heuristic-based filtering

C.

Heuristic-based filtering

Answers
D.

Geolocation-based filtering

D.

Geolocation-based filtering

Answers
E.

NetFlow

E.

NetFlow

Answers
Suggested answer: B, D

Explanation:

Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption, all in one solution.

Cisco Email Security appliance can now handle incoming mail connections and incoming messages from specific geolocations and perform appropriate actions on them, for example:

– Prevent email threats coming from specific geographic regions.

– Allow or disallow emails coming from specific geographic regions.

Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html

Why would a user choose an on-premises ESA versus the CES solution?

A.

Sensitive data must remain onsite.

A.

Sensitive data must remain onsite.

Answers
B.

Demand is unpredictable.

B.

Demand is unpredictable.

Answers
C.

The server team wants to outsource this service.

C.

The server team wants to outsource this service.

Answers
D.

ESA is deployed inline.

D.

ESA is deployed inline.

Answers
Suggested answer: A

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?

(Choose two)

A.

Sophos engine

A.

Sophos engine

Answers
B.

white list

B.

white list

Answers
C.

RAT

C.

RAT

Answers
D.

outbreak filters

D.

outbreak filters

Answers
E.

DLP

E.

DLP

Answers
Suggested answer: A, D

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

A.

It decrypts HTTPS application traffic for unauthenticated users.

A.

It decrypts HTTPS application traffic for unauthenticated users.

Answers
B.

It alerts users when the WSA decrypts their traffic.

B.

It alerts users when the WSA decrypts their traffic.

Answers
C.

It decrypts HTTPS application traffic for authenticated users.

C.

It decrypts HTTPS application traffic for authenticated users.

Answers
D.

It provides enhanced HTTPS application detection for AsyncOS.

D.

It provides enhanced HTTPS application detection for AsyncOS.

Answers
Suggested answer: D

Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

A.

It can handle explicit HTTP requests.

A.

It can handle explicit HTTP requests.

Answers
B.

It requires a PAC file for the client web browser.

B.

It requires a PAC file for the client web browser.

Answers
C.

It requires a proxy for the client web browser.

C.

It requires a proxy for the client web browser.

Answers
D.

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.

D.

WCCP v2-enabled devices can automatically redirect traffic destined to port 80.

Answers
E.

Layer 4 switches can automatically redirect traffic destined to port 80.

E.

Layer 4 switches can automatically redirect traffic destined to port 80.

Answers
Suggested answer: D, E

Which action controls the amount of URI text that is stored in Cisco WSA logs files?

A.

Configure the datasecurityconfig command

A.

Configure the datasecurityconfig command

Answers
B.

Configure the advancedproxyconfig command with the HTTPS subcommand

B.

Configure the advancedproxyconfig command with the HTTPS subcommand

Answers
C.

Configure a small log-entry size.

C.

Configure a small log-entry size.

Answers
D.

Configure a maximum packet size.

D.

Configure a maximum packet size.

Answers
Suggested answer: B

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?

A.

SAT

A.

SAT

Answers
B.

BAT

B.

BAT

Answers
C.

HAT

C.

HAT

Answers
D.

RAT

D.

RAT

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64