Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 5

Questions 61

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Options:
A.

aaa server radius dynamic-author

B.

aaa new-model

C.

auth-type all

D.

ip device-tracking

Cisco 350-701 Premium Access
Questions 62

An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?

Options:
A.

EAPOL

B.

SSH

C.

RADIUS

D.

TACACS+

Questions 63

Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System? (Choose two)

Options:
A.

Port

B.

Rule

C.

Source

D.

Application

E.

Protocol

Questions 64

What is the concept of Cl/CD pipelining?

Options:
A.

The project is split into several phases where one phase cannot start before the previous phase finishes successfully.

B.

The project code is centrally maintained and each code change should trigger an automated build and test sequence

C.

The project is split into time-limited cycles and focuses on pair programming for continuous code review

D.

Each project phase is independent from other phases to maintain adaptiveness and continual improvement

Questions 65

What is a characteristic of Firepower NGIPS inline deployment mode?

Options:
A.

ASA with Firepower module cannot be deployed.

B.

It cannot take actions such as blocking traffic.

C.

It is out-of-band from traffic.

D.

It must have inline interface pairs configured.

Questions 66

Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?

Options:
A.

Configure an advanced custom detection list.

B.

Configure an IP Block & Allow custom detection list

C.

Configure an application custom detection list

D.

Configure a simple custom detection list

Questions 67

What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?

Options:
A.

Secure Endpoint authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.

B.

Secure Endpoint stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.

C.

The Umbrella Roaming Client authenticates users and provides segmentation, and Secure Endpoint allows only for VPN connectivity.

D.

The Umbrella Roaming client stops and tracks malicious activity on hosts, and Secure Endpoint tracks only URL-based threats.

Questions 68

An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?

Options:
A.

Change the IP address of the new Cisco ISE node to the same network as the others.

B.

Make the new Cisco ISE node a secondary PAN before registering it with the primary.

C.

Open port 8905 on the firewall between the Cisco ISE nodes

D.

Add the DNS entry for the new Cisco ISE node into the DNS server

Questions 69

When NetFlow is applied to an interface, which component creates the flow monitor cache that is used

to collect traffic based on the key and nonkey fields in the configured record?

Options:
A.

records

B.

flow exporter

C.

flow sampler

D.

flow monitor

Questions 70

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

Options:
A.

biometric factor

B.

time factor

C.

confidentiality factor

D.

knowledge factor

E.

encryption factor

Questions 71

Which system performs compliance checks and remote wiping?

Options:
A.

MDM

B.

ISE

C.

AMP

D.

OTP

Questions 72

Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention

System? (Choose two)

Options:
A.

packet decoder

B.

SIP

C.

modbus

D.

inline normalization

E.

SSL

Questions 73

What is a language format designed to exchange threat intelligence that can be transported over the TAXII

protocol?

Options:
A.

STIX

B.

XMPP

C.

pxGrid

D.

SMTP

Questions 74

A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network

is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

Options:
A.

AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

B.

The file is queued for upload when connectivity is restored.

C.

The file upload is abandoned.

D.

The ESA immediately makes another attempt to upload the file.

Questions 75

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

Options:
A.

RSA SecureID

B.

Internal Database

C.

Active Directory

D.

LDAP

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.