Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 8

Questions 106

What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?

Options:
A.

trusted automated exchange

B.

Indicators of Compromise

C.

The Exploit Database

D.

threat intelligence

Cisco 350-701 Premium Access
Questions 107

An administrator is implementing management plane protection and must configure an interface on a Cisco router to only terminate management packets that are destined for the router. Which set of IOS commands must be used to complete the implementation?

Options:
A.

350-701 Question 107 Option 1

B.

107

C.

107

D.

107

Questions 108

Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the

network?

Options:
A.

Posture

B.

Profiling

C.

pxGrid

D.

MAB

Questions 109

For which type of attack is multifactor authentication an effective deterrent?

Options:
A.

Ping of death

B.

Teardrop

C.

SYN flood

D.

Phishing

Questions 110

What is the difference between deceptive phishing and spear phishing?

Options:
A.

Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.

B.

A spear phishing campaign is aimed at a specific person versus a group of people.

C.

Spear phishing is when the attack is aimed at the C-level executives of an organization.

D.

Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.

Questions 111

An engineer must configure AsyncOS for Cisco Secure Web Appliance to push log files to a syslog server using the SCP retrieval method. Drag and drop the steps from the left into the sequence on the right to complete the configuration.

350-701 Question 111

Options:
Questions 112

What is the difference between EPP and EDR?

Options:
A.

EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.

B.

Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.

C.

EDR focuses solely on prevention at the perimeter.

D.

Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.

Questions 113

A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network

is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

Options:
A.

AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

B.

The file is queued for upload when connectivity is restored.

C.

The file upload is abandoned.

D.

The ESA immediately makes another attempt to upload the file.

Questions 114

What is a language format designed to exchange threat intelligence that can be transported over the TAXII

protocol?

Options:
A.

STIX

B.

XMPP

C.

pxGrid

D.

SMTP

Questions 115

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

Options:
A.

multiple context mode

B.

user deployment of Layer 3 networks

C.

IPv6

D.

clustering

Questions 116

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

Options:
A.

File Analysis

B.

SafeSearch

C.

SSL Decryption

D.

Destination Lists

Questions 117

What are two benefits of workload security? (Choose two.)

Options:
A.

Tracked application security

B.

Automated patching

C.

Reduced attack surface

D.

Scalable security policies

E.

Workload modeling

Questions 118

What are two functions of IKEv1 but not IKEv2? (Choose two)

Options:
A.

NAT-T is supported in IKEv1 but rot in IKEv2.

B.

With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext

C.

With IKEv1, mode negotiates faster than main mode

D.

IKEv1 uses EAP authentication

E.

IKEv1 conversations are initiated by the IKE_SA_INIT message

Questions 119

What Cisco command shows you the status of an 802.1X connection on interface gi0/1?

Options:
A.

show authorization status

B.

show authen sess int gi0/1

C.

show connection status gi0/1

D.

show ver gi0/1

Questions 120

For a given policy in Cisco Umbrella, how should a customer block website based on a custom list?

Options:
A.

by specifying blocked domains in me policy settings

B.

by specifying the websites in a custom blocked category

C.

by adding the websites to a blocked type destination list

D.

by adding the website IP addresses to the Cisco Umbrella blocklist

Cisco Related Exams

How to pass Cisco 300-710 - Securing Networks with Cisco Firepower (300-710 SNCF) Exam
How to pass Cisco 300-715 - Implementing and Configuring Cisco Identity Services Engine (SISE) v4.0 (300-715 SISE) Exam
How to pass Cisco 300-720 - Securing Email with Cisco Email Security Appliance (300-720 SESA) Exam
How to pass Cisco 300-725 - Securing the Web with Cisco Web Security Appliance (300-725 SWSA) Exam
How to pass Cisco 300-730 - Implementing Secure Solutions with Virtual Private Networks (SVPN) Exam
How to pass Cisco 300-735 - Automating and Programming Cisco Security Solutions (300-735 SAUTO) Exam
How to pass Cisco 300-740 - Designing and Implementing Secure Cloud Access for Users and Endpoints (SCAZT) Exam

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.