Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 7

Questions 91

How does the Cisco WSA enforce bandwidth restrictions for web applications?

Options:
A.

It implements a policy route to redirect application traffic to a lower-bandwidth link.

B.

It dynamically creates a scavenger class QoS policy and applies it to each client that connects through the WSA.

C.

It sends commands to the uplink router to apply traffic policing to the application traffic.

D.

It simulates a slower link by introducing latency into application traffic.

Cisco 350-701 Premium Access
Questions 92

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally

manage cloud policies across these platforms. Which software should be used to accomplish this goal?

Options:
A.

Cisco Defense Orchestrator

B.

Cisco Secureworks

C.

Cisco DNA Center

D.

Cisco Configuration Professional

Questions 93

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

Options:
A.

Cisco Cloudlock

B.

Cisco Umbrella

C.

Cisco AMP

D.

Cisco App Dynamics

Questions 94

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key

establishment?

Options:
A.

RSA is an asymmetric key establishment algorithm intended to output symmetric keys

B.

RSA is a symmetric key establishment algorithm intended to output asymmetric keys

C.

DH is a symmetric key establishment algorithm intended to output asymmetric keys

D.

DH is an asymmetric key establishment algorithm intended to output symmetric keys

Questions 95

How does a WCCP-configured router identify if the Cisco WSA is functional?

Options:
A.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer transmitted to the router.

B.

If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longertransmitted to the WSA.

C.

The WSA sends a Here-l-Am message every 10 seconds, and the router acknowledges with an ISee-You message.

D.

The router sends a Here-l-Am message every 10 seconds, and the WSA acknowledges with an ISee-You message.

Questions 96

An organization plans to upgrade its current email security solutions, and an engineer must deploy Cisco Secure Email. The requirements for the upgrade are:

    Implement Data Loss Prevention

    Implement mail encryption

    Integrate with an existing Cisco IronPort Secure Email Gateway solution

Which Cisco Secure Email license is needed to accomplish this task?

Options:
A.

Cisco Secure Email Outbound Essentials

B.

Cisco Secure Email Phishing Defense

C.

Cisco Secure Email Domain Protection

D.

Cisco Secure Email Inbound Essentials

Questions 97

Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated?

Options:
A.

Cisco Tajos

B.

Cisco Steaithwatch Cloud

C.

Cisco Cloudlock

D.

Cisco Umbrella Investigate

Questions 98

Refer to the exhibit,

350-701 Question 98

which command results in these messages when attempting to troubleshoot an iPsec VPN connection?

Options:
A.

debug crypto isakmp

B.

debug crypto ipsec endpoint

C.

debug crypto Ipsec

D.

debug crypto isakmp connection

Questions 99

Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation Intrusion

Prevention System?

Options:
A.

control

B.

malware

C.

URL filtering

D.

protect

Questions 100

What is provided by the Secure Hash Algorithm in a VPN?

Options:
A.

integrity

B.

key exchange

C.

encryption

D.

authentication

Questions 101

What is the purpose of the Cisco Endpoint loC feature?

Options:
A.

It provides stealth threat prevention.

B.

lt is a signature-based engine.

C.

lt is an incident response tool

D.

It provides precompromise detection.

Questions 102

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

Options:
A.

NetFlow

B.

desktop client

C.

ASDM

D.

API

Questions 103

Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

Options:
A.

Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS

B.

Cisco FTDv with one management interface and two traffic interfaces configured

C.

Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises

D.

Cisco FTDv with two management interfaces and one traffic interface configured

E.

Cisco FTDv configured in routed mode and IPv6 configured

Questions 104

Which algorithm provides asymmetric encryption?

Options:
A.

RC4

B.

AES

C.

RSA

D.

3DES

Questions 105

An administrator has been tasked with configuring the Cisco Secure Email Gateway to ensure there are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad mail servers must be prevented. Which two actions must be taken in order to meet these requirements? (Choose two.)

Options:
A.

Deploy the Secure Email Gateway in the DMZ.

B.

Use outbreak filters from Cisco Talos.

C.

Configure a recipient access table.

D.

Enable a message tracking service.

E.

Scan quarantined emails using AntiVirus signatures.

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.