Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 2

Questions 16

In which scenario is endpoint-based security the solution?

Options:
A.

inspecting encrypted traffic

B.

device profiling and authorization

C.

performing signature-based application control

D.

inspecting a password-protected archive

Cisco 350-701 Premium Access
Questions 17

Which two global commands must the network administrator implement to limit the attack surface of an internet-facing Cisco router? (Choose two.)

Options:
A.

no service password-recovery

B.

no cdp run

C.

service tcp-keepalives-in

D.

no ip http server

E.

ip ssh version 2

Questions 18

Which technology limits communication between nodes on the same network segment to individual applications?

Options:
A.

serverless infrastructure

B.

microsegmentation

C.

SaaS deployment

D.

machine-to-machine firewalling

Questions 19

Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?

Options:
A.

NTP

B.

syslog

C.

SNMP

D.

NetFlow

Questions 20

Which posture assessment requirement provides options to the client for remediation and requires the

remediation within a certain timeframe?

Options:
A.

Audit

B.

Mandatory

C.

Optional

D.

Visibility

Questions 21

An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?

Options:
A.

Cisco CloudLock

B.

Cisco AppDynamics Cloud Monitoring

C.

Cisco Umbrella

D.

Cisco Stealthwatch

Questions 22

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

Options:
A.

TLSv1.2

B.

TLSv1.1

C.

BJTLSv1

D.

DTLSv1

Questions 23

When a Cisco Secure Web Appliance checks a web request, what occurs if it is unable to match a user-defined policy?

Options:
A.

It applies the next identification profile policy.

B.

It applies the advanced policy.

C.

It applies the global policy.

D.

It blocks the request.

Questions 24

Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a session to be adjusted after a policy change is made? (Choose two)

Options:
A.

posture assessment

B.

aaa authorization exec default local

C.

tacacs-server host 10.1.1.250 key password

D.

aaa server radius dynamic-author

E.

CoA

Questions 25

What is the difference between deceptive phishing and spear phishing?

Options:
A.

Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.

B.

A spear phishing campaign is aimed at a specific person versus a group of people.

C.

Spear phishing is when the attack is aimed at the C-level executives of an organization.

D.

Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.

Questions 26

An MDM provides which two advantages to an organization with regards to device management? (Choose two)

Options:
A.

asset inventory management

B.

allowed application management

C.

Active Directory group policy management

D.

network device management

E.

critical device management

Questions 27

An engineer must deploy a Cisco Secure Web Appliance. Antimalware scanning must use the Outbreak Heuristics antimalware category on files identified as malware before performing any other processes. What must be configured on the Secure Web Appliance to meet the requirements?

Options:
A.

Sophos scanning engine

B.

Webroot scanning engine

C.

McAfee scanning engine

D.

Adaptive Scanning

Questions 28

Which two capabilities of Integration APIs are utilized with Cisco Catalyst Center? (Choose two.)

Options:
A.

Create new SSIDs on a wireless LAN controller

B.

Connect to ITSM platforms

C.

Automatically deploy new virtual routers

D.

Upgrade software on switches and routers

E.

Third party reporting

Questions 29

How is a cross-site scripting attack executed?

Options:
A.

Force a currently authenticated end user to execute unwanted actions on a web app

B.

Execute malicious client-side scripts injected to a client via a web app

C.

Inject a database query via the input data from the client to a web app

D.

Intercept communications between a client and a web server

Questions 30

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

Options:
A.

server farm

B.

perimeter

C.

core

D.

East-West gateways

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.