Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 7

Questions 91

An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?

Options:
A.

MDA on the router

B.

PBR on Cisco WSA

C.

WCCP on switch

D.

DNS resolution on Cisco WSA

Cisco 350-701 Premium Access
Questions 92

Why is it important to implement MFA inside of an organization?

Options:
A.

To prevent man-the-middle attacks from being successful.

B.

To prevent DoS attacks from being successful.

C.

To prevent brute force attacks from being successful.

D.

To prevent phishing attacks from being successful.

Questions 93

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Options:
A.

Only the IKE configuration that is set up on the active device must be duplicated on the standby device; theIPsec configuration is copied automatically

B.

The active and standby devices can run different versions of the Cisco IOS software but must be the sametype of device.

C.

The IPsec configuration that is set up on the active device must be duplicated on the standby device

D.

Only the IPsec configuration that is set up on the active device must be duplicated on the standby device;the IKE configuration is copied automatically.

E.

The active and standby devices must run the same version of the Cisco IOS software and must be thesame type of device

Questions 94

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

Options:
A.

AMP

B.

AnyConnect

C.

DynDNS

D.

Talos

Questions 95

Drag and drop the capabilities from the left onto the correct technologies on the right.

350-701 Question 95

Options:
Questions 96

Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)

Options:
A.

TACACS+

B.

CHAP

C.

NTLMSSP

D.

RADIUS

E.

Kerberos

Questions 97

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a

connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

Options:
A.

Cisco Firepower

B.

Cisco Umbrella

C.

ISE

D.

AMP

Questions 98

In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

Options:
A.

LDAP injection

B.

man-in-the-middle

C.

cross-site scripting

D.

insecure API

Questions 99

Which type of attack is MFA an effective deterrent for?

Options:
A.

ping of death

B.

phishing

C.

teardrop

D.

syn flood

Questions 100

Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps.

Which two actions must be taken to ensure that interfaces are put back into service? (Choose two)

Options:
A.

Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the preconfigured interval.

B.

Use EEM to have the ports return to service automatically in less than 300 seconds.

C.

Enter the shutdown and no shutdown commands on the interfaces.

D.

Enable the snmp-server enable traps command and wait 300 seconds

E.

Ensure that interfaces are configured with the error-disable detection and recovery feature

Questions 101

How does Cisco Workload Optimization Manager help mitigate application performance issues?

Options:
A.

It deploys an AWS Lambda system

B.

It automates resource resizing

C.

It optimizes a flow path

D.

It sets up a workload forensic score

Questions 102

Drag and drop the deployment models from the left onto the explanations on the right.

350-701 Question 102

Options:
Questions 103

A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.

They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?

Options:
A.

DMVPN because it supports IKEv2 and FlexVPN does not

B.

FlexVPN because it supports IKEv2 and DMVPN does not

C.

FlexVPN because it uses multiple SAs and DMVPN does not

D.

DMVPN because it uses multiple SAs and FlexVPN does not

Questions 104

In an IaaS cloud services model, which security function is the provider responsible for managing?

Options:
A.

Internet proxy

B.

firewalling virtual machines

C.

CASB

D.

hypervisor OS hardening

Questions 105

Which function is included when Cisco AMP is added to web security?

Options:
A.

multifactor, authentication-based user identity

B.

detailed analytics of the unknown file's behavior

C.

phishing detection on emails

D.

threat prevention on an infected endpoint

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.