Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 12

Questions 166

What is the purpose of the My Devices Portal in a Cisco ISE environment?

Options:
A.

to register new laptops and mobile devices

B.

to request a newly provisioned mobile device

C.

to provision userless and agentless systems

D.

to manage and deploy antivirus definitions and patches on systems owned by the end user

Cisco 350-701 Premium Access
Questions 167

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally

manage cloud policies across these platforms. Which software should be used to accomplish this goal?

Options:
A.

Cisco Defense Orchestrator

B.

Cisco Secureworks

C.

Cisco DNA Center

D.

Cisco Configuration Professional

Questions 168

In a PaaS model, which layer is the tenant responsible for maintaining and patching?

Options:
A.

hypervisor

B.

virtual machine

C.

network

D.

application

Questions 169

Under which two circumstances is a CoA issued? (Choose two)

Options:
A.

A new authentication rule was added to the policy on the Policy Service node.

B.

An endpoint is deleted on the Identity Service Engine server.

C.

A new Identity Source Sequence is created and referenced in the authentication policy.

D.

An endpoint is profiled for the first time.

E.

A new Identity Service Engine server is added to the deployment with the Administration persona

Questions 170

Drag and drop the descriptions from the left onto the encryption algorithms on the right.

350-701 Question 170

Options:
Questions 171

Drag and drop the security solutions from the left onto the benefits they provide on the right.

350-701 Question 171

Options:
Questions 172

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

Options:
A.

Create an IP block list for the website from which the file was downloaded

B.

Block the application that the file was using to open

C.

Upload the hash for the file into the policy

D.

Send the file to Cisco Threat Grid for dynamic analysis

Questions 173

On Cisco Firepower Management Center, which policy is used to collect health modules alerts from managed

devices?

Options:
A.

health policy

B.

system policy

C.

correlation policy

D.

access control policy

E.

health awareness policy

Questions 174

350-701 Question 174

Refer to the exhibit. What is the result of using this authentication protocol in the configuration?

Options:
A.

The authentication request contains only a username.

B.

The authentication request contains only a password.

C.

There are separate authentication and authorization request packets.

D.

The authentication and authorization requests are grouped in a single packet.

Questions 175

What is a functional difference between a Cisco ASA and a Cisco IOS router with Zone-based policy firewall?

Options:
A.

The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-Based Policy Firewall starts out by allowing all traffic, even on untrusted interfaces

B.

The Cisco IOS router with Zone-Based Policy Firewall can be configured for high availability, whereas the Cisco ASA cannot

C.

The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default, whereas the Cisco ASA starts out by allowing all traffic until rules are added

D.

The Cisco ASA can be configured for high availability whereas the Cisco IOS router with Zone-Based Policy Firewall cannot

Questions 176

Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)

Options:
A.

accounting

B.

assurance

C.

automation

D.

authentication

E.

encryption

Questions 177

Refer to the exhibit.

350-701 Question 177

An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is

complaining that an IP address is not being obtained. Which command should be configured on the switch

interface in order to provide the user with network connectivity?

Options:
A.

ip dhcp snooping verify mac-address

B.

ip dhcp snooping limit 41

C.

ip dhcp snooping vlan 41

D.

ip dhcp snooping trust

Questions 178

An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN implementation. What must be un solution?

Options:
A.

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.

B.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.

C.

GRE over IPsec adds its own header, and L2TP does not.

D.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.

Questions 179

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

Options:
A.

blocked ports

B.

simple custom detections

C.

command and control

D.

allowed applications

E.

URL

Questions 180

Which capability is provided by application visibility and control?

Options:
A.

reputation filtering

B.

data obfuscation

C.

data encryption

D.

deep packet inspection

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.