Exam Questions 350-701: Implementing and Operating Cisco Security Core Technologies
Exam Questions 350-701: Implementing and Operating Cisco Security Core Technologies
Exam Questions 350-701: Implementing and Operating Cisco Security Core Technologies
https://www.2passeasy.com/dumps/350-701/
NEW QUESTION 1
Refer to the exhibit.
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
Answer: B
NEW QUESTION 2
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the
corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are
compliant before they are allowed on the network?
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/co
nfigure-posture.html
NEW QUESTION 3
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Answer: BC
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html
NEW QUESTION 4
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Answer: C
Explanation:
Reference: https://tools.cisco.com/security/center/resources/sql_injection
NEW QUESTION 5
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)
A. RADIUS
B. TACACS+
C. DHCP
D. sFlow
E. SMTP
Answer: AC
Explanation:
Reference: https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
NEW QUESTION 6
DRAG DROP
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/detecting_specific_threats.html
NEW QUESTION 7
Which technology is used to improve web traffic performance by proxy caching?
A. WSA
B. Firepower
C. FireSIGHT
D. ASA
Answer: A
NEW QUESTION 8
Which benefit does endpoint security provide the overall security posture of an organization?
A. It streamlines the incident response process to automatically perform digital forensics on the endpoint.
B. It allows the organization to mitigate web-based attacks as long as the user is active in the domain.
C. It allows the organization to detect and respond to threats at the edge of the network.
D. It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.
Answer: D
NEW QUESTION 9
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
A. STIX
B. XMPP
C. pxGrid
D. SMTP
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/b_ScanCenter_Admi
nistrator_Guide_chapter_0100011.pdf
NEW QUESTION 10
What is a characteristic of Dynamic ARP Inspection?
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted.
C. DAI associates a trust state with each switch.
D. DAI intercepts all ARP requests and responses on trusted ports only.
Answer: A
NEW QUESTION 10
DRAG DROP
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
[MISSING]
A. Mastered
B. Not Mastered
Answer: A
Explanation:
[MISSING]
NEW QUESTION 11
Which two activities can be done using Cisco DNA Center? (Choose two.)
A. DHCP
B. design
C. accounting
D. DNS
E. provision
Answer: BE
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-and-management/dna-
center/1-2-1/user_guide/b_dnac_ug_1_2_1/b_dnac_ug_1_2_chapter_00.pdf
NEW QUESTION 12
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
Answer: AC
Explanation:
Reference: https://www.lookingpoint.com/blog/ise-series-802.1x
NEW QUESTION 17
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)
Answer: AB
NEW QUESTION 21
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
Answer: DE
NEW QUESTION 25
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable
to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
A. Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing access on the network.
B. Set up a profiling policy in Cisco Identity Service Engine to check and endpoint patch level before allowing access on the network.
C. Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met before allowing access on the network.
D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network.
E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities patched in a timely fashion.
Answer: AC
NEW QUESTION 27
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
Answer: D
NEW QUESTION 29
How is Cisco Umbrella configured to log only security events?
A. per policy
B. in the Reporting settings
C. in the Security Settings section
D. per network in the Deployments section
Answer: A
Explanation:
Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
NEW QUESTION 32
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
A. EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
B. EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.
C. EPP focuses on network security, and EDR focuses on device security.
D. EDR focuses on network security, and EPP focuses on device security.
Answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html
NEW QUESTION 33
Which functions of an SDN architecture require southbound APIs to enable communication?
Answer: A
NEW QUESTION 36
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?
Answer: C
NEW QUESTION 39
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two.)
A. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B. Cisco FTDv with one management interface and two traffic interfaces configured
C. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D. Cisco FTDv with two management interfaces and one traffic interface configured
E. Cisco FTDv configured in routed mode and IPv6 configured
Answer: AC
Explanation:
Reference: https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-asav/white-paper-c11-740505.html
NEW QUESTION 43
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate
responses to those threats?
A. Cisco Umbrella
B. External Threat Feeds
C. Cisco Threat Grid
D. Cisco Stealthwatch
Answer: C
NEW QUESTION 48
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B. water holing
C. DDoS
D. buffer overflow
Answer: D
Explanation:
Reference: https://en.wikipedia.org/wiki/Buffer_overflow
NEW QUESTION 49
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
Answer: D
NEW QUESTION 53
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
A. phishing
B. brute force
C. man-in-the-middle
D. DDOS
E. tear drop
Answer: BC
NEW QUESTION 55
......
Visit Our Site to Purchase the Full Set of Actual 350-701 Exam Questions With Answers.
We Also Provide Practice Exam Software That Simulates Real Exam Environment And Has Many Self-Assessment Features. Order the
350-701 Product From:
https://www.2passeasy.com/dumps/350-701/
* 350-701 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* 350-701 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year