Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Cisco 350-701 Practice Exam with Questions & Answers | Set: 9

Questions 121

What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?

Options:
A.

Use the simple custom detection feature and add each detection to the list.

B.

Add a network IP block allowed list to the configuration and add the blocked files.

C.

Create an advanced custom detection and upload the hash of each file

D.

Configure an application control allowed applications list to block the files

Cisco 350-701 Premium Access
Questions 122

A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?

Options:
A.

denial -of-service

B.

cross-site request forgery

C.

man-in-the-middle

D.

SQL injection

Questions 123

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

Options:
A.

file access from a different user

B.

interesting file access

C.

user login suspicious behavior

D.

privilege escalation

Questions 124

350-701 Question 124

Refer to the exhibit. What does this Python script accomplish?

Options:
A.

It allows authentication with TLSv1 SSL protocol

B.

It authenticates to a Cisco ISE with an SSH connection.

C.

lt authenticates to a Cisco ISE server using the username of ersad

D.

It lists the LDAP users from the external identity store configured on Cisco ISE

Questions 125

Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?

Options:
A.

VMware APIC

B.

VMwarevRealize

C.

VMware fusion

D.

VMware horizons

Questions 126

Which policy does a Cisco Secure Web Appliance use to block or monitor URL requests based on the reputation score?

Options:
A.

Encryption

B.

Enforcement Security

C.

Cisco Data Security

D.

Outbound Malware Scanning

Questions 127

What is a characteristic of Dynamic ARP Inspection?

Options:
A.

DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCPsnooping binding database.

B.

In a typical network, make all ports as trusted except for the ports connecting to switches, which areuntrusted

C.

DAI associates a trust state with each switch.

D.

DAI intercepts all ARP requests and responses on trusted ports only.

Questions 128

What is the purpose of joining Cisco WSAs to an appliance group?

Options:
A.

All WSAs in the group can view file analysis results.

B.

The group supports improved redundancy

C.

It supports cluster operations to expedite the malware analysis process.

D.

It simplifies the task of patching multiple appliances.

Questions 129

What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)

Options:
A.

Use intrusion prevention system.

B.

Block all TXT DNS records.

C.

Enforce security over port 53.

D.

Use next generation firewalls.

E.

Use Cisco Umbrella.

Questions 130

What is the purpose of the Trusted Automated exchange cyber threat intelligence industry standard?

Options:
A.

public collection of threat intelligence feeds

B.

threat intelligence sharing organization

C.

language used to represent security information

D.

service used to exchange security information

Questions 131

An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the

organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which

mechanism should the engineer configure to accomplish this goal?

Options:
A.

mirror port

B.

Flow

C.

NetFlow

D.

VPC flow logs

Questions 132

What is a difference between DMVPN and sVTI?

Options:
A.

DMVPN supports tunnel encryption, whereas sVTI does not.

B.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

C.

DMVPN supports static tunnel establishment, whereas sVTI does not.

D.

DMVPN provides interoperability with other vendors, whereas sVTI does not.

Questions 133

A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?

Options:
A.

The changes are applied immediately it the destination list is part or a policy.

B.

The destination list must be removed from the policy before changes are made to It.

C.

The changes are applied only after the configuration is saved in Cisco Umbrella.

D.

The user role of Block Page Bypass or higher is needed to perform these changes.

Questions 134

A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256

cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which

command achieves this goal?

Options:
A.

snmp-server host inside 10.255.255.1 version 3 myv7

B.

snmp-server host inside 10.255.255.1 snmpv3 myv7

C.

snmp-server host inside 10.255.255.1 version 3 asmith

D.

snmp-server host inside 10.255.255.1 snmpv3 asmith

Questions 135

Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is

authenticated?

Options:
A.

Authorization

B.

Accounting

C.

Authentication

D.

CoA

Cisco Related Exams

Cisco Free Exams

Cisco Free Exams
Examstrack offers free Cisco exam materials and practice tests to aid your Cisco certification journey.