Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 13

Questions 181

Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?

Options:
A.

supports VMware vMotion on VMware ESXi

B.

requires an additional license

C.

performs transparent redirection

D.

supports SSL decryption

Cisco 350-701 Premium Access
Questions 182

What is a characteristic of a bridge group in ASA Firewall transparent mode?

Options:
A.

It includes multiple interfaces and access rules between interfaces are customizable

B.

It is a Layer 3 segment and includes one port and customizable access rules

C.

It allows ARP traffic with a single access rule

D.

It has an IP address on its BVI interface and is used for management traffic

Questions 183

Drag and drop the posture assessment flow actions from the left into a sequence on the right.

350-701 Question 183

Options:
Questions 184

A network administrator is configuring a role in an access control policy to block certain URLs and selects the "Chat and instant Messaging" category. which reputation score should be selected to accomplish

this goal?

Options:
A.

3

B.

5

C.

10

D.

1

Questions 185

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

Options:
A.

Nexus

B.

Stealthwatch

C.

Firepower

D.

Tetration

Questions 186

Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process

activity on an endpoint?

Options:
A.

endpoint isolation

B.

advanced search

C.

advanced investigation

D.

retrospective security

Questions 187

An organization has a requirement to collect full metadata information about the traffic going through their AWS cloud services They want to use this information for behavior analytics and statistics Which two actions must be taken to implement this requirement? (Choose two.)

Options:
A.

Configure Cisco ACI to ingest AWS information.

B.

Configure Cisco Thousand Eyes to ingest AWS information.

C.

Send syslog from AWS to Cisco Stealthwatch Cloud.

D.

Send VPC Flow Logs to Cisco Stealthwatch Cloud.

E.

Configure Cisco Stealthwatch Cloud to ingest AWS information

Questions 188

Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)

Options:
A.

Time-based one-time passwords

B.

Data loss prevention

C.

Heuristic-based filtering

D.

Geolocation-based filtering

E.

NetFlow

Questions 189

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your

environment?

Options:
A.

Prevalence

B.

File analysis

C.

Detections

D.

Vulnerable software

E.

Threat root cause

Questions 190

How many interfaces per bridge group does an ASA bridge group deployment support?

Options:
A.

up to 2

B.

up to 4

C.

up to 8

D.

up to 16

Questions 191

Which factor must be considered when choosing the on-premise solution over the cloud-based one?

Options:
A.

With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it

B.

With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

C.

With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

D.

With an on-premise solution, the customer is responsible for the installation and maintenance of theproduct, whereas with a cloud-based solution, the provider is responsible for it.

Questions 192

Refer to the exhibit.

350-701 Question 192

An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?

Options:
A.

authentication open

B.

dotlx reauthentication

C.

cisp enable

D.

dot1x pae authenticator

Questions 193

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Options:
A.

DNS tunneling

B.

DNSCrypt

C.

DNS security

D.

DNSSEC

Questions 194

Which two mechanisms are used to control phishing attacks? (Choose two)

Options:
A.

Enable browser alerts for fraudulent websites.

B.

Define security group memberships.

C.

Revoke expired CRL of the websites.

D.

Use antispyware software.

E.

Implement email filtering techniques.

Questions 195

During a recent security audit a Cisco IOS router with a working IPSEC configuration using IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command The VPN peer is a SOHO router with a dynamically assigned IP address Dynamic DNS has been configured on the SOHO router to map the dynamic IP address to the host name of vpn sohoroutercompany.com In addition to the command crypto isakmp key Cisc425007536 hostname vpn.sohoroutercompany.com what other two commands are now required on the Cisco IOS router for the VPN to continue to function after the wildcard command is removed? (Choose two)

Options:
A.

ip host vpn.sohoroutercompany.eom

B.

crypto isakmp identity hostname

C.

Add the dynamic keyword to the existing crypto map command

D.

fqdn vpn.sohoroutercompany.com

E.

ip name-server

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.