350-701 Unlocked
350-701 Unlocked
350-701 Unlocked
Version: 22.111
Important Notice
Product
Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within
One year after your purchase.
You can login member center and download the latest product anytime. (Product downloaded
from member center is always the latest.)
PS: Ensure you can pass the exam, please check the latest product in 2-3 days before the exam
again.
Feedback
We devote to promote the product quality and the grade of service to ensure customers interest.
If you have any questions about our product, please provide Exam Number, Version, Page
Number, Question Number, and your Login Account to us, please contact us at
[email protected] and our technical experts will provide support in 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently.
If anyone who share the file we will disable the free update and account access.
Any unauthorized changes will be inflicted legal punishment. We will reserve the right of final
explanation for this statement.
A. blocked ports
B. simple custom detections
C. command and control
D. allowed applications
E. URL
Answer: BD
Explanation:
QUESTION 2
Which command enables 802.1X globally on a Cisco switch?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. authentication port-control auto
D. aaa new-model
Answer: A
Explanation:
QUESTION 3
What is the function of Cisco Cloudlock for data security?
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 2
http://www.passleader.com
QUESTION 4
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose
two.)
A. computer identity
B. Windows service
C. user identity
D. Windows firewall
E. default browser
Answer: BD
Explanation:
QUESTION 5
What is a characteristic of Dynamic ARP Inspection?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 3
http://www.passleader.com
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from
the DHCP snooping binding database.
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which
are untrusted.
C. DAI associates a trust state with each switch.
D. DAI intercepts all ARP requests and responses on trusted ports only.
Answer: A
Explanation:
Dynamic ARP Inspection
To prevent ARP poisoning attacks such as the one described in the previous section, a switch
must ensure that only valid ARP requests and responses are relayed. DAI prevents these attacks
by intercepting all ARP requests and responses. Each of these intercepted packets is verified for
valid MAC address to IP address bindings before the local ARP cache is updated or the packet is
forwarded to the appropriate destination. Invalid ARP packets are dropped.
DAI determines the validity of an ARP packet based on valid MAC address to IP address bindings
stored in a trusted database. This database is built at runtime by DHCP snooping, provided that it
is enabled on the VLANs and on the switch in question. In addition, DAI can also validate ARP
packets against user-configured ARP ACLs in order to handle hosts that use statically configured
IP addresses.
DAI can also be configured to drop ARP packets when the IP addresses in the packet are invalid
or when the MAC addresses in the body of the ARP packet do not match the addresses specified
in the Ethernet header.
QUESTION 6
Which Cisco product provides proactive endpoint protection and allows administrators to centrally
manage the deployment?
A. NGFW
B. AMP
C. WSA
D. ESA
Answer: B
Explanation:
QUESTION 7
Where are individual sites specified to be blacklisted in Cisco Umbrella?
A. application settings
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 4
http://www.passleader.com
B. content categories
C. security settings
D. destination lists
Answer: D
Explanation:
To block a URL, simply enter it into a blocked destination list, or create a new blocked destination
list just for URLs. To do this, navigate to Policies > Destination Lists, expand a Destination list,
add a URL and then click Save.
https://support.umbrella.com/hc/en-us/articles/115004518146-Umbrella-Dashboard-New-
Features-Custom-blocked-URLs
QUESTION 8
Which statement about IOS zone-based firewalls is true?
Answer: D
Explanation:
QUESTION 9
Which two activities can be done using Cisco DNA Center? (Choose two.)
A. DHCP
B. design
C. accounting
D. DNS
E. provision
Answer: BE
Explanation:
QUESTION 10
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 5
http://www.passleader.com
A. RSA SecureID
B. Internal Database
C. Active Directory
D. LDAP
Answer: C
Explanation:
QUESTION 11
Which VPN technology can support a multivendor environment and secure traffic between sites?
A. SSL VPN
B. GET VPN
C. FlexVPN
D. DMVPN
Answer: C
Explanation:
Third-party compatibility: As the IT world transitions to cloud- and mobile-based computing, more
and more VPN routers and VPN endpoints from different vendors are required. The Cisco IOS
FlexVPN solution provides compatibility with any IKEv2-based third-party VPN vendors, including
native VPN clients from Apple iOS and Android devices.
QUESTION 12
Which SNMPv3 configuration must be used to support the strongest security possible?
Answer: D
Explanation:
AES allows you to choose a 128-bit, 192-bit or 256-bit key, making it exponentially stronger than
the 56-bit key of DES.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 6
http://www.passleader.com
QUESTION 13
Which solution combines Cisco IOS and IOS XE components to enable administrators to
recognize applications, collect and send network metrics to Cisco Prime and other third-party
management tools, and prioritize application traffic?
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 7
http://www.passleader.com
QUESTION 14
Which two endpoint measures are used to minimize the chances of falling victim to phishing and
social engineering attacks? (Choose two.)
Answer: DE
Explanation:
QUESTION 15
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the
MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.
Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
A. Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before
allowing access on the network.
B. Set up a profiling policy in Cisco Identity Service Engine to check and endpoint patch level before
allowing access on the network.
C. Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level
is met before allowing access on the network.
D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and
replicate throughout the network.
E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical
vulnerabilities patched in a timely fashion.
Answer: AC
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 8
http://www.passleader.com
QUESTION 16
Why would a user choose an on-premises ESA versus the CES solution?
Answer: A
Explanation:
QUESTION 17
Which technology must be used to implement secure VPN connectivity among company
branches over a private IP cloud with any-to-any scalable connectivity?
A. DMVPN
B. FlexVPN
C. IPsec DVTI
D. GET VPN
Answer: D
Explanation:
QUESTION 18
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 9
http://www.passleader.com
Which cloud service model offers an environment for cloud consumers to develop and deploy
applications without needing to manage or maintain the underlying cloud infrastructure?
A. PaaS
B. XaaS
C. IaaS
D. SaaS
Answer: A
Explanation:
Platform-as-a-service (PaaS) is another step further from full, on-premise infrastructure
management. It is where a provider hosts the hardware and software on its own infrastructure
and delivers this platform to the user as an integrated solution, solution stack, or service through
an internet connection.
QUESTION 19
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Answer: D
Explanation:
QUESTION 20
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses
and malware? (Choose two.)
A. Sophos engine
B. white list
C. RAT
D. outbreak filters
E. DLP
Answer: AD
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 10
http://www.passleader.com
QUESTION 21
How is Cisco Umbrella configured to log only security events?
A. per policy
B. in the Reporting settings
C. in the Security Settings section
D. per network in the Deployments section
Answer: A
Explanation:
QUESTION 22
What is the primary difference between an Endpoint Protection Platform and an Endpoint
Detection and Response?
A. EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter
defenses.
B. EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter
defenses.
C. EPP focuses on network security, and EDR focuses on device security.
D. EDR focuses on network security, and EPP focuses on device security.
Answer: A
Explanation:
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-
detectionresponse-edr.html
QUESTION 23
On which part of the IT environment does DevSecOps focus?
A. application development
B. wireless network
C. data center
D. perimeter network
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 11
http://www.passleader.com
https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/devsecops-
infographic.pdf
QUESTION 24
Which functions of an SDN architecture require southbound APIs to enable communication?
Answer: A
Explanation:
Software-defined southbound application program interfaces (SDN southbound APIs) are used to
communicate between the SDN Controller and the switches and routers of the network.
QUESTION 25
What is a characteristic of traffic storm control behavior?
A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the
level within the interval.
B. Traffic storm control cannot determine if the packet is unicast or broadcast.
C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control
interval.
D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the
packet is unicast or broadcast.
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-1E/configuration/guide/storm.html
QUESTION 26
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
A. put
B. options
C. get
D. push
E. connect
Answer: AC
Explanation:
Available request methods are:
GET – Retrieves data from the specified object.
PUT – Adds the supplied information to the specified object; returns a 404 Resource Not Found
error if the object does not exist.
POST – Creates the object with the supplied information.
DELETE – Deletes the specified object.
PATCH – Applies partial modifications to the specified object.
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 12
http://www.passleader.com
QUESTION 27
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
A. hypervisor
B. virtual machine
C. network
D. application
Answer: D
Explanation:
https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
QUESTION 28
An engineer is configuring AMP for endpoints and wants to block certain files from executing.
Which outbreak control method is used to accomplish this task?
Answer: C
QUESTION 29
Which ASA deployment mode can provide separation of management on a shared appliance?
Answer: C
QUESTION 30
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose
two.)
A. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
B. Cisco FTDv with one management interface and two traffic interfaces configured
C. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
D. Cisco FTDv with two management interfaces and one traffic interface configured
E. Cisco FTDv configured in routed mode and IPv6 configured
Answer: AC
Explanation:
Cisco NGFWv in AWS (routed mode), Cisco NGFWv is deployed in routed mode and managed
by an on premises FMC or FMC running in AWS.
https://www.cisco.com/c/en/us/products/collateral/security/adaptive-security-virtual-appliance-
asav/white-paper-c11-740505.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 13
http://www.passleader.com
QUESTION 31
What can be integrated with Cisco Threat Intelligence Director to provide information about
security threats, which allows the SOC to proactively automate responses to those threats?
A. Cisco Umbrella
B. External Threat Feeds
C. Cisco Threat Grid
D. Cisco Stealthwatch
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-
troubleshoot-cisco-threat.html
QUESTION 32
What provides visibility and awareness into what is currently occurring on the network?
A. CMX
B. WMI
C. Prime Infrastructure
D. Telemetry
Answer: D
Explanation:
Telemetry - Information and/or data that provides awareness and visibility into what is occurring
on the network at any given time from networking devices, appliances, applications or servers in
which the core function of the device is not to generate security alerts designed to detect
unwanted or malicious activity from computer networks.
https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/active
-threat-analytics-premier.pdf
QUESTION 33
Which attack is commonly associated with C and C++ programming languages?
A. cross-site scripting
B. water holing
C. DDoS
D. buffer overflow
Answer: D
Explanation:
https://en.wikipediA.org/wiki/Buffer_overflow
QUESTION 34
An engineer must force an endpoint to re-authenticate an already authenticated session without
disrupting the endpoint to apply a new or updated policy from ISE.
Which CoA type achieves this goal?
A. Port Bounce
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 14
http://www.passleader.com
B. CoA Terminate
C. CoA Reauth
D. CoA Session Query
Answer: C
Explanation:
https://www.cisco.com/en/US/docs/ios-xml/ios/san/configuration/xe-3se/3850/san-coa-supp.pdf
QUESTION 35
Refer to the exhibit. Which command was used to display this output?
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 15
http://www.passleader.com
QUESTION 36
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
Answer: AB
Explanation:
Parameterized queries in ASP.NET, prepared statements in Java, or similar techniques in other
languages should be used comprehensively in addition to strict input validation. Each of these
techniques performs all required escaping of dangerous characters before the SQL statement is
passed to the underlying database system.
https://tools.cisco.com/security/center/resources/sql_injection.html
QUESTION 37
How does Cisco Stealthwatch Cloud provide security for cloud environments?
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 16
http://www.passleader.com
QUESTION 38
Which two application layer preprocessors are used by Firepower Next Generation Intrusion
Prevention System? (Choose two.)
A. SIP
B. inline normalization
C. SSL
D. packet decoder
E. modbus
Answer: AC
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guidev60/Application_Layer_Preprocessors.html
QUESTION 39
Which feature is configured for managed devices in the device platform settings of the Firepower
Management Center?
A. quality of service
B. time synchronization
C. network address translations
D. intrusion policy
Answer: B
Explanation:
Synchronizing Time on Classic Devices
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guide-
v60/Firepower_Software_Platform_Settings.html#task_EF18AE3D5CA9457AB65791B9654FD46
C
QUESTION 40
The main function of northbound APIs in the SDN architecture is to enable communication
between which two areas of a network?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 17
http://www.passleader.com
C. management console and the cloud
D. SDN controller and the management solution
Answer: D
Explanation:
How Do Northbound APIs Work?
Northbound APIs are the link between the applications and the SDN controller. The applications
can tell the network what they need (data, storage, bandwidth, and so on) and the network can
deliver those resources, or communicate what it has.
QUESTION 41
Refer to the exhibit. What is a result of the configuration?
Answer: D
Explanation:
Traffic from both inside and DMZ networks is redirected.
Inside networks are 192.168.100.0/24 and 172.16.0.0/16
DMZ network is 172.16.10.0/24
The redirect acl is permitting 192.168.100.0/24 and 172.16.0.0/16 (which also includes
172.16.10.0/24 --> traffic from DMZ networks)
QUESTION 42
Which information is required when adding a device to Firepower Management Center?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 18
http://www.passleader.com
A. username and password
B. encryption method
C. device serial number
D. registration key
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guidev60/Device_Management_Basics.html#ID-2242-0000069d
QUESTION 43
Which two services must remain as on-premises equipment when a hybrid email solution is
deployed? (Choose two.)
A. DDoS
B. antispam
C. antivirus
D. encryption
E. DLP
Answer: DE
Explanation:
The cloud-based infrastructure is typically used for inbound email cleansing, while the on-
premises appliances provide granular control - protecting sensitive information with data loss
prevention (DLP) and encryption technologies.
https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_E
mail_Security_Overview_Guide.pdf
QUESTION 44
What is a characteristic of Cisco ASA NetFlow v9 Secure Event Logging?
Answer: A
Explanation:
In stateful flow tracking, tracked flows go through a series of state changes. NSEL events are
used to export data about flow status and are triggered by the event that caused the state
change.
The significant events that are tracked include flow-create, flow-teardown, and flow-denied
(excluding those flows that are denied by EtherType ACLs). In addition, the ASA and ASASM
implementation of NSEL generates periodic NSEL events, flow-update events, to provide periodic
byte counters over the duration of the flow. These events are usually time-driven, which makes
them more in line with traditional NetFlow; however, they may also be triggered by state changes
in the flow.
QUESTION 45
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 19
http://www.passleader.com
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
A. File Analysis
B. SafeSearch
C. SSL Decryption
D. Destination Lists
Answer: C
Explanation:
As well, the intelligent proxy's SSL decryption feature is required in order to scan files on
secure—HTTPS—sites.
https://docs.umbrella.com/umbrella-user-guide/docs/enable-file-analysis
QUESTION 46
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
A. phishing
B. brute force
C. man-in-the-middle
D. DDOS
E. tear drop
Answer: AB
Explanation:
MFA protects against phishing, social engineering and password bruteforce attacks and secures
your logins from attackers exploiting weak or stolen credentials.
https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-mfa-password-
security-infographic.pdf
QUESTION 47
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in
your environment?
A. vulnerable software
B. file analysis
C. detections
D. prevalence
E. threat root cause
Answer: D
QUESTION 48
Which RADIUS attribute can you use to filter MAB requests in an 802.1x deployment?
A. 1
B. 6
C. 31
D. 2
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 20
http://www.passleader.com
QUESTION 49
Which two features of Cisco Email Security can protect your organization against email
threats?(choose two)
Answer: BD
Explanation:
QUESTION 50
Drag and Drop Question
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to
monitor an EC2 instance in Amazon Web Services.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 21
http://www.passleader.com
QUESTION 51
Which feature requires a network discovery policy on the Cisco Firepower Next Generation
Intrusion Prevention System?
A. security intelligence
B. impact flags
C. health monitoring
D. URL filtering
Answer: B
Explanation:
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2019/pdf/BRKSEC-3300.pdf
• Remember, we recommend you utilize the Network Discovery Policy..
This allows you to use Impact Flags for analysis.
QUESTION 52
Refer to the exhibit. Which statement about the authentication protocol used in the configuration
is true?
Answer: C
Explanation:
RADIUS combines authentication and authorization. The access-accept packets sent by the
RADIUS server to the client contain authorization information. This makes it difficult to decouple
authentication and authorization.
Source: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote-authentication-dial-
user-service-radius/13838-10.html
QUESTION 53
Which two preventive measures are used to control cross-site scripting? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 22
http://www.passleader.com
A. Enable client-side scripts on a per-domain basis.
B. Incorporate contextual output encoding/escaping.
C. Disable cookie inspection in the HTML inspection engine.
D. Run untrusted HTML input through an HTML sanitization engine.
E. SameSite cookie attribute should not be used.
Answer: BD
Explanation:
While disabling scripts in general and enabling them on a per-doman basis, it does have some
drawbacks for functionality. Users would be forced to enable scripting to have the site fully
functional, which would make the user vulnerable to XXS attack again. Selectively disabling
scripts is a good alternative, but is not in the question list of answers.
The most significant problem with blocking all scripts on all websites by default is substantial
reduction in functionality andresponsiveness . Another problem with script blocking is that many
users do not understand it, and do not know how to properly secure their browsers. Yet another
drawback is that many sites do not work without client-side scripting, forcing users to disable
protection for that site and opening their systems to vulnerabilities.
QUESTION 54
Which policy is used to capture host information on the Cisco Firepower Next Generation
Intrusion Prevention System?
A. correlation
B. intrusion
C. access control
D. network discovery
Answer: D
Explanation:
QUESTION 55
Refer to the exhibit. Which command was used to generate this output and to show which ports
are authenticating with dot1x or mab?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 23
http://www.passleader.com
A. show authentication registrations
B. show authentication method
C. show dot1x all
D. show authentication sessions
Answer: D
Explanation:
Use the show authentication sessions command to display information about all current Auth
Manager sessions. To display information about specific Auth Manager sessions, use one or
more of the keywords.
The following example shows how to display all authentication sessions on the switch:
QUESTION 56
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email
messages to a recipient address.
Which list contains the allowed recipient addresses?
A. SAT
B. BAT
C. HAT
D. RAT
Answer: D
Explanation:
Overview of the Recipient Access Table (RAT)
The Recipient Access Table defines which recipients are accepted by a public listener. At a
minimum, the table specifies the address and whether to accept or reject it.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 24
http://www.passleader.com
The Recipient Access Table (RAT) page shows a listing of the entries in the RAT including the
order, default action, and whether or not the entry has been configured to bypass LDAP accept
queries.
QUESTION 57
Which two capabilities does TAXII support? (Choose two.)
A. exchange
B. pull messaging
C. binding
D. correlation
E. mitigating
Answer: AB
Explanation:
STIX is the critical threat information. TAXII is the protocol to communicate it.
Trusted Automated Exchange of Intelligence Information (TAXII) is an application layer protocol
specially designed to enable the exchange of STIX objects for facilitating cyber threat intel
sharing and communication.
TAXII runs over HTTPS which also makes it secure and suitable for building online services that
can consume and process STIX objects. It provides the developers an ability to build TAXII
servers and TAXII clients which can communicate with each other in a request/response manner.
https://taxiiproject.github.io/releases/1.1/TAXII_Services_Specification.pdf
QUESTION 58
Which policy represents a shared set of features or parameters that define the aspects of a
managed device that are likely to be similar to other managed devices in a deployment?
A. group policy
B. access control policy
C. device management policy
D. platform service policy
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-
configguide-v622/platform_settings_policies_for_managed_devices.pdf
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 25
http://www.passleader.com
QUESTION 59
An administrator wants to ensure that all endpoints are compliant before users are allowed
access on the corporate network.
The endpoints must have the corporate antivirus application installed and be running the latest
build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are
allowed on the network?
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administrati
on/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
QUESTION 60
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
A. data exfiltration
B. command and control communication
C. intelligent proxy
D. snort
E. URL categorization
Answer: AB
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 26
http://www.passleader.com
QUESTION 61
In which form of attack is alternate encoding, such as hexadecimal representation, most often
observed?
A. smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
Answer: C
Explanation:
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data
from a user. The data is usually gathered in the form of a hyperlink which contains malicious
content within it. The user will most likely click on this link from another website, instant message,
or simply just reading a web board or email message.
Usually the attacker will encode the malicious portion of the link to the site in HEX (or other
encoding methods) so the request is less suspicious looking to the user when clicked on.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 27
http://www.passleader.com
QUESTION 62
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby
device; the IPsec configuration is copied automatically.
B. The active and standby devices can run different versions of the Cisco IOS software but must be
the same type of device.
C. The IPsec configuration that is set up on the active device must be duplicated on the standby
device.
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby
device; the IKE configuration is copied automatically.
E. The active and standby devices must run the same version of the Cisco IOS software and must
be the same type of device.
Answer: CE
Explanation:
Restrictions for Stateful Failover for IPsec
When configuring redundancy for a VPN, the following restrictions apply:
Both the active and standby devices must run the identical version of the Cisco IOS software, and
both the active and standby devices must be connected via a hub or switch.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-
availability-15-mt-book/sec-state-fail-ipsec.html
QUESTION 63
What Cisco command shows you the status of an 802.1X connection on interface gi0/1?
Answer: B
QUESTION 64
A malicious user gained network access by spoofing printer connections that were authorized
using MAB on four different switch ports at the same time.
What two catalyst switch security features will prevent further violations? (Choose two)
A. DHCP Snooping
B. 802.1AE MacSec
C. Port security
D. IP Device tracking
E. Dynamic ARP inspection
F. Private VLANs
Answer: AE
QUESTION 65
Which feature of Cisco ASA allows VPN users to be postured against Cisco ISE without requiring
an inline posture node?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 28
http://www.passleader.com
A. RADIUS Change of Authorization
B. device tracking
C. DHCP snooping
D. VLAN hopping
Answer: A
QUESTION 66
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0
command?
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Answer: B
Explanation:
When using IKE main mode, preshared keys are indexed by IP address only because the identity
payload has not yet been received. This means that the hostname keyword in the identity
statement is not used to look up a preshared key and will be used only when sending and
processing the identity payloads later in the main mode exchange. The identity keyword can be
used when preshared keys are used with IKE aggressive mode, and keys may be indexed by
identity types other than IP address as the identity payload is received in the first IKE aggressive
mode packet.
Note:
If you specify mask, you must use a subnet address. (The subnet address 0.0.0.0 is not
recommended because it encourages group preshared keys, which allow all peers to have the
same group key, thereby reducing the security of your user authentication.)
QUESTION 67
Which two probes are configured to gather attributes of connected endpoints using Cisco Identity
Services Engine? (Choose two.)
A. RADIUS
B. TACACS+
C. DHCP
D. sFlow
E. SMTP
Answer: AC
Explanation:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html
QUESTION 68
Which solution protects hybrid cloud deployment workloads with application visibility and
segmentation?
A. Nexus
B. Stealthwatch
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 29
http://www.passleader.com
C. Firepower
D. Tetration
Answer: D
Explanation:
https://www.cisco.com/c/en/us/solutions/security/secure-data-center-
solution/index.html#~products
QUESTION 69
What are the two most commonly used authentication factors in multifactor authentication?
(Choose two.)
A. biometric factor
B. time factor
C. confidentiality factor
D. knowledge factor
E. encryption factor
Answer: BD
Explanation:
QUESTION 70
Which two key and block sizes are valid for AES? (Choose two.)
Answer: CD
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 30
http://www.passleader.com
QUESTION 71
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their
destinations.
Which task can you perform to determine where each message was lost?
Answer: A
QUESTION 72
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace
which current encryption technology?
A. 3DES
B. RSA
C. DES
D. AES
Answer: B
QUESTION 73
How is ICMP used an exfiltration technique?
Answer: C
Explanation:
QUESTION 74
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level
role.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 31
http://www.passleader.com
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to
a false webpage.
Answer: B
Explanation:
Spear phishing relates to attacks targeted to individuals. Spear phishing always focuses on one
victim.
QUESTION 75
An engineer needs a solution for TACACS+ authentication and authorization for device
administration.
The engineer also wants to enhance wired and wireless network security by requiring users and
endpoints to use 802.1X, MAB, or WebAuth.
Which product meets all of these requirements?
Answer: B
QUESTION 76
When wired 802.1X authentication is implemented, which two components are required? (Choose
two.)
Answer: AC
Explanation:
https://www.lookingpoint.com/blog/ise-series-802.1x
QUESTION 77
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic.
Where must the ASA be added on the Cisco UC Manager platform?
Answer: A
Explanation:
The security appliance acts as a TLS proxy between the Cisco IP Phone and Cisco UCM. The
proxy is transparent for the voice calls between the phone and the Cisco UCM. Cisco IP Phones
download a Certificate Trust List from the Cisco UCM before registration which contains identities
(certificates) of the devices that the phone should trust, such as TFTP servers and Cisco UCM
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 32
http://www.passleader.com
servers. To support server proxy, the CTL file must contain the certificate that the security
appliance creates for the Cisco UCMs.
https://www.cisco.com/c/en/us/td/docs/security/asa/special/unified-
communications/guide/unifiedcomm/unified-comm-tlsproxy.html
QUESTION 78
Which API is used for Content Security?
A. NX-OS API
B. IOS XR API
C. OpenVuln API
D. AsyncOS API
Answer: D
Explanation:
QUESTION 79
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
Answer: BD
Explanation:
https://en.wikipediA.org/wiki/Ping_of_death
QUESTION 80
Which two mechanisms are used to control phishing attacks? (Choose two.)
Answer: AE
Explanation:
To protect the employee from accessing any fraudulent websites used in the phishing emails, and
try to filter emails to prevent such emails.
QUESTION 81
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that
domains are blocked when they host malware, command and control, phishing, and more
threats?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 33
http://www.passleader.com
A. Application Control
B. Security Category Blocking
C. Content Category Blocking
D. File Analysis
Answer: B
Explanation:
https://support.umbrellA.com/hc/en-us/articles/115004563666-Understanding-Security-Categories
QUESTION 82
What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest
services? (Choose two.)
A. TACACS+
B. central web auth
C. single sign-on
D. multiple factor auth
E. local web auth
Answer: BE
Explanation:
QUESTION 83
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 34
http://www.passleader.com
Answer: A
Explanation:
A SQL injection attack involves the alteration of SQL statements that are used within a web
application through the use of attacker-supplied data. Insufficient input validation and improper
construction of SQL statements in web applications can expose them to SQL injection attacks.
QUESTION 84
Which deployment model is the most secure when considering risks to cloud adoption?
A. public cloud
B. hybrid cloud
C. community cloud
D. private cloud
Answer: D
QUESTION 85
What does the Cloudlock Apps Firewall do to mitigate security concerns from an application
perspective?
A. It allows the administrator to quarantine malicious files so that the application can function, just
not maliciously.
B. It discovers and controls cloud apps that are connected to a company's corporate environment.
C. It deletes any application that does not belong in the network.
D. It sends the application information to an administrator to act on.
Answer: B
Explanation:
The Cloudlock Apps Firewall discovers and controls cloud apps connected to your corporate
environment.
https://www.cisco.com/c/en/us/products/security/cloudlock/index.html
QUESTION 86
What is the primary benefit of deploying an ESA in hybrid mode?
A. You can fine-tune its settings to provide the optimum balance between security and performance
for your environment
B. It provides the lowest total cost of ownership by reducing the need for physical appliances
C. It provides maximum protection and control of outbound messages
D. It provides email security while supporting the transition to the cloud
Answer: D
QUESTION 87
Which option is the main function of Cisco Firepower impact flags?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 35
http://www.passleader.com
D. They identify data that the ASA sends to the Firepower module.
Answer: C
QUESTION 88
Which two deployment modes does the Cisco ASA FirePOWER module support? (Choose two.)
A. transparent mode
B. routed mode
C. inline mode
D. active mode
E. passive monitor-only mode
Answer: CE
QUESTION 89
Drag and Drop Question
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left
onto the correct definitions on the right.
Answer:
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-
configguide-v64/detecting_specific_threats.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 36
http://www.passleader.com
QUESTION 90
Drag and Drop Question
Drag and drop the capabilities from the left onto the correct technologies on the right.
Answer:
QUESTION 91
Drag and Drop Question
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 37
http://www.passleader.com
Answer:
QUESTION 92
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
A. AMP
B. AnyConnect
C. DynDNS
D. Talos
Answer: D
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 38
http://www.passleader.com
You might wonder how Umbrella knew to block a site, or what content on the blocked website our
systems found to be malicious.
As well as having our own awesome team of security researchers, we work closely with the Cisco
Talos team.
https://support.umbrella.com/hc/en-us/articles/230903908-Finding-out-More-About-Websites-that-
Umbrella-has-Blocked-for-Security-
QUESTION 93
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption
options?
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html
QUESTION 94
What is the primary role of the Cisco Email Security Appliance?
Answer: B
Explanation:
https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2014/CVD-
EmailSecurityUsingCiscoESADesignGuide-AUG14.pdf
QUESTION 95
Which two features of Cisco DNA Center are used in a Software Defined Network solution?
(Choose two.)
A. accounting
B. assurance
C. automation
D. authentication
E. encryption
Answer: BC
Explanation:
https://www.cisco.com/c/en/us/products/cloud-systems-management/dna-center/index.html
QUESTION 96
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 39
http://www.passleader.com
queries?
A. DNS tunneling
B. DNSCrypt
C. DNS security
D. DNSSEC
Answer: A
Explanation:
DNS tunneling can establish command and control. Or, it can exfiltrate data.
https://bluecatnetworks.com/blog/four-major-dns-attack-types-and-how-to-mitigate-them/
QUESTION 97
Which algorithm provides encryption and authentication for data plane communication?
A. AES-GCM
B. SHA-96
C. AES-256
D. SHA-384
Answer: A
Explanation:
AES-GCM can do encryption like all other AES and has an authentication tag, rest of the options
can be used for encryption or authentication, but not both.
In cryptography, Galois/Counter Mode (GCM) is a mode of operation for symmetric-key
cryptographic block ciphers which is widely adopted for its performance. GCM throughput rates
for state-of-the-art, high-speed communication channels can be achieved with inexpensive
hardware resources. The operation is an authenticated encryption algorithm designed to provide
both data authenticity (integrity) and confidentiality.
QUESTION 98
How does Cisco Umbrella archive logs to an enterprise-owned storage?
Answer: D
Explanation:
https://docs.umbrellA.com/deployment-umbrella/docs/log-management
QUESTION 99
In which cloud services model is the tenant responsible for virtual machine OS patching?
A. IaaS
B. UCaaS
C. PaaS
D. SaaS
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 40
http://www.passleader.com
Answer: A
Explanation:
IaaS: In this model, it's your responsibility to patch/update/maintain the OS and any application
software you install.
QUESTION 100
Which two descriptions of AES encryption are true? (Choose two.)
Answer: BD
Explanation:
https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html
QUESTION 101
Which technology is used to improve web traffic performance by proxy caching?
A. WSA
B. Firepower
C. FireSIGHT
D. ASA
Answer: A
QUESTION 102
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose
two.)
Answer: DE
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 41
http://www.passleader.com
QUESTION 103
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_appendix_010.html
QUESTION 104
Which technology reduces data loss by identifying sensitive information stored in public
computing environments?
A. Cisco SDA
B. Cisco Firepower
C. Cisco HyperFlex
D. Cisco Cloudlock
Answer: D
Explanation:
Cloudlock's data loss prevention (DLP) technology continuously monitors cloud environments to
detect and secure sensitive information.
https://www.cisco.com/c/en/us/products/security/cloudlock/index.html#~features
QUESTION 105
Refer to the exhibit. What does the number 15 represent in this configuration?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 42
http://www.passleader.com
A. privilege level for an authorized user to this router
B. access list that identifies the SNMP devices that can access the router
C. interval in seconds between SNMPv3 authentication attempts
D. number of possible failed attempts until the SNMPv3 user is locked out
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/snmp/configuration/xe-16/snmp-xe-16-
book/nm-snmp-cfg-snmp-support.html#GUID-10FB2FAD-39A6-41D8-AB14-0C4B6E20911F
QUESTION 106
Which network monitoring solution uses streams and pushes operational data to provide a near
real-time view of activity?
A. SNMP
B. SMTP
C. syslog
D. model-driven telemetry
Answer: D
Explanation:
Model-driven telemetry is a new approach for network monitoring in which data is streamed from
network devices continuously using a push model and provides near real-time access to
operational statistics.
https://blogs.cisco.com/developer/model-driven-telemetry-sandbox
QUESTION 107
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
Answer: B
Explanation:
The ASAv on AWS supports the following features:
1. Support for Amazon EC2 C5 instances, the next generation of the Amazon EC2 Compute
Optimized instance family.
2.Deployment in the Virtual Private Cloud (VPC)
3.Enhanced networking (SR-IOV) where available
4.Deployment from Amazon Marketplace
5.Maximum of four vCPUs per instance
6.User deployment of L3 networks
7.Routed mode (default)
QUESTION 108
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
A. transparent
B. redirection
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 43
http://www.passleader.com
C. forward
D. proxy gateway
Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-
00.html
QUESTION 109
An MDM provides which two advantages to an organization with regards to device management?
(Choose two.)
Answer: AB
QUESTION 110
Which Talos reputation center allows you to track the reputation of IP addresses for email and
web traffic?
A. IP Blacklist Center
B. File Reputation Center
C. AMP Reputation Center
D. IP and Domain Reputation Center
Answer: D
QUESTION 111
Under which two circumstances is a CoA issued? (Choose two.)
A. A new authentication rule was added to the policy on the Policy Service node.
B. An endpoint is deleted on the Identity Service Engine server.
C. A new Identity Source Sequence is created and referenced in the authentication policy.
D. An endpoint is profiled for the first time.
E. A new Identity Service Engine server is added to the deployment with the Administration personA.
Answer: BD
Explanation:
The profiler service implements the CoA in the following cases:
- Static assignment of an endpoint
- An exception action is configured
- An endpoint is profiled for the first time
- Endpoint deletedise10_prof_pol.html
QUESTION 112
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 44
http://www.passleader.com
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
B. A sysopt command can be used to enable NSEL on a specific interface.
C. NSEL can be used without a collector configured.
D. A flow-export event type must be defined under a policy.
Answer: D
QUESTION 113
Which benefit does endpoint security provide the overall security posture of an organization?
A. It streamlines the incident response process to automatically perform digital forensics on the
endpoint.
B. It allows the organization to mitigate web-based attacks as long as the user is active in the
domain.
C. It allows the organization to detect and respond to threats at the edge of the network.
D. It allows the organization to detect and mitigate threats that the perimeter security devices do not
detect.
Answer: D
QUESTION 114
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is
being routed through the Cisco Umbrella network. Which action tests the routing?
A. Ensure that the client computers are pointing to the on-premises DNS servers.
B. Enable the Intelligent Proxy to validate that traffic is being routed correctly.
C. Add the public IP address that the client computers are behind to a Core Identity.
D. Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
Answer: D
Explanation:
https://docs.umbrella.com/deployment-umbrella/docs/protect-your-network
QUESTION 115
What is a language format designed to exchange threat intelligence that can be transported over
the TAXII protocol?
A. STIX
B. XMPP
C. pxGrid
D. SMTP
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_S
canCenter_Administrator_Guide/b_ScanCenter_Administrator_Guide_chapter_0100011.pdf
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 45
http://www.passleader.com
QUESTION 116
When using Cisco AMP for Networks, which feature copies a file to the Cisco AMP cloud for
analysis?
A. Spero analysis
B. dynamic analysis
C. sandbox analysis
D. malware analysis
Answer: B
QUESTION 117
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to
keep data within a network perimeter?
Answer: C
QUESTION 118
Which IPS engine detects ARP spoofing?
Answer: A
QUESTION 119
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention
System?
Answer: B
QUESTION 120
Which two are valid suppression types on a Cisco Next Generation Intrusion Prevention System?
A. Port
B. Rule
C. Source
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 46
http://www.passleader.com
D. Application
E. Protocol
Answer: BC
QUESTION 121
Which license is required for Cisco Security Intelligence to work on the Cisco Next Generation
Intrusion Prevention System?
A. control
B. matware
C. URL filtering
D. protect
Answer: D
Explanation:
QUESTION 122
Which policy is used to capture host information on the Cisco Next Generation Intrusion
Prevention System?
A. network discovery
B. correlation
C. intrusion
D. access control
Answer: A
QUESTION 123
On Cisco Firepower Management Center, which policy is used to collect health modules alerts
from managed devices?
A. health policy
B. system policy
C. correlation policy
D. access control policy
E. health awareness policy
Answer: A
QUESTION 124
Which CLI command is used to register a Cisco FirePOWER sensor to Firepower Management
Center?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 47
http://www.passleader.com
A. configure system add <host><key>
B. configure manager <key> add host
C. configure manager delete
D. configure manager add <host><key>
Answer: D
QUESTION 125
Which Cisco AMP file disposition valid?
A. pristine
B. malware
C. dirty
D. nonmalicios
Answer: B
QUESTION 126
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private
cloud instance?
A. RBAC
B. ETHOS detection engine
C. SPERO detection engine
D. TETRA detection engine
Answer: B
Explanation:
QUESTION 127
Which function is the primary function of Cisco AMP threat Grid?
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 48
http://www.passleader.com
QUESTION 128
Which two characteristics of messenger protocols make data exfiltration difficult to detect and
prevent? (Choose two.)
A. Malware infects the messenger application on the user endpoint to send company data.
B. Outgoing traffic is allowed so users can communicate with outside organizations.
C. An exposed API for the messaging platform is used to send large amounts of data.
D. Traffic is encrypted, which prevents visibility on firewalls and IPS systems.
E. Messenger applications cannot be segmented with standard network controls.
Answer: BD
Explanation:
QUESTION 129
How many interfaces per bridge group does an ASA bridge group deployment support?
A. up to 16
B. up to 8
C. up to 4
D. up to 2
Answer: C
Explanation:
The bridge group maximum was increased from 8 to 250 bridge groups. You can configure up to
250 bridge groups in single mode or per context in multiple mode, with 4 interfaces maximum per
bridge group.We modified the following commands: interface bvi, bridge-group.
QUESTION 130
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy
configured in Cisco ISE?
Answer: B
Explanation:
When endpoints are discovered on your network, they can be profiled dynamically based on the
configured endpoint profiling policies, and assigned to the matching endpoint identity groups
depending on their profiles.
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_identities.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 49
http://www.passleader.com
QUESTION 131
What is a feature of the open platform capabilities of Cisco DNA Center?
A. domain integration
B. intent-based APIs
C. automation adapters
D. application adapters
Answer: B
Explanation:
The Cisco DNA Center open platform for intent-based networking provides 360-degree
extensibility across multiple components, including:
- Intent-based APIs
- Process adapters,
- Domain adapters,
- SDKs
QUESTION 132
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP
flags, and payload length?
Answer: C
Explanation:
Inter-packet variation: Captures any inter-packet variations seen within the flow, including
variations in the packet’s Time to Live (TTL), IP/TCP flags, packet length, etc.
https://trustportal.cisco.com/c/dam/r/ctp/docs/privacydatasheet/security/cisco-tetration-privacy-
data-sheet.pdf
QUESTION 133
In which two ways does a system administrator send web traffic transparently to the Cisco WSA?
(Choose two.)
Answer: AC
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 50
http://www.passleader.com
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-
00.html
QUESTION 134
Which form of attack is launched using botnets?
A. virus
B. EIDDOS
C. TCP flood
D. DDOS
Answer: D
Explanation:
A botnet is a collection of internet-connected devices infected by malware that allow hackers to
control them. Cyber criminals use botnets to instigate botnet attacks, which include malicious
activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.
QUESTION 135
How is DNS tunneling used to exfiltrate data out of a corporate network?
A. It leverages the DNS server by permitting recursive lookups to spread the attack to
other DNS servers.
B. lt encodes the payload with random characters that are broken into short strings and
the DNS server rebuilds the exfiltrated data.
C. It redirects DNS requests to a malicious server used to steal user credentials, which
allows further damage and theft on the network.
D. It corrupts DNS servers by replacing the actual IP address with a rogue address to
collect information or start other attacks.
Answer: B
QUESTION 136
Which Cisco security solution protects remote users against phishing attacks when they are not
connected to the VPN?
A. Cisco Firepower
B. Cisco Umbrella
C. Cisco Stealthwatch
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 51
http://www.passleader.com
D. NGIPS
Answer: B
Explanation:
Cloud-delivered security service for Cisco’s next-generation firewall Umbrella Roaming protects
employees when they are off the VPN by blocking malicious domain requests and IP responses
as DNS queries are resolved. By enforcing security at the DNS-layer, connections are never
established and files are never downloaded. Malware will not infect laptops and command &
control (C2) callbacks or phishing will not exfiltrate data over any port. Plus, you gain real-time
visibility of infected laptops with C2 activity.
https://www.cisco.com/c/dam/en/us/products/collateral/security/firewalls/umbrella-roaming-
package.pdf
QUESTION 137
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two.)
Answer: CE
Explanation:
Flow-export actions are not supported in interface-based policies. You can configure flow-export
actions in a class-map only with the match access-list, match any, or class-default commands.
You can only apply flow-export actions in a global service policy.
https://www.cisco.com/c/en/us/td/docs/security/asa/special/netflow/guide/asa_netflow.html#pgfId-
1330480
QUESTION 138
What is a difference between FlexVPN and DMVPN?
Answer: D
QUESTION 139
A mall provides security services to customers with a shared appliance. The mall wants
separation of management on the shared appliance. Which ASA deployment mode meets these
needs?
Answer: A
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 52
http://www.passleader.com
QUESTION 140
What is the function of the Context Directory Agent?
A. accepts user authentication requests on behalf of Web Security Appliance for user
identification
B. relays user authentication requests from Web Security Appliance to Active Directory
C. maintains users' group memberships
D. reads the Active Directory logs to map IP addresses to usernames
Answer: D
Explanation:
Cisco Context Directory Agent (CDA) is a mechanism that maps IP Addresses to usernames in
order to allow security gateways to understand which user is using which IP Address in the
network, so those security gateways can now make decisions based on those users (or the
groups to which the users belong to).
QUESTION 141
What is a commonality between DMVPN and FlexVPN technologies?
Answer: B
Explanation:
FlexVPN uses NHRP for name resolution I believe. If you pay close attention to the option, it's
saying it's the IOS is running the same NHRP being used, which is accurate as it's the build on
the IOS.
FlexVPN NHRP is primarily used to establish spoke to spoke communication.
QUESTION 142
Which two risks is a company vulnerable to if it does not have a well-established patching
solution for endpoints? (Choose two.)
A. eavesdropping
B. denial-of-service attacks
C. ARP spoofing
D. malware
E. exploits
Answer: DE
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 53
http://www.passleader.com
QUESTION 143
Which threat involves software being used to gain unauthorized access to a computer system?
A. ping of death
B. NTP amplification
C. HTTP flood
D. virus
Answer: D
QUESTION 144
What is a characteristic of Firepower NGIPS inline deployment mode?
Answer: C
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-
firepower-threat-defense-int.html#anc2
QUESTION 145
What are two rootkit types? (Choose two)
A. registry
B. bootloader
C. buffer mode
D. user mode
E. virtual
Answer: BD
Explanation:
There are four main types of rootkits:
1. Kernel rootkits
2. User mode rootkits
3. Bootloader rootkits
4. Memory rootkits
https://blog.emsisoft.com/en/29468/rootkits/
QUESTION 146
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA.
Which Cisco ASA command must be used?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 54
http://www.passleader.com
Answer: D
Explanation:
Add an NSEL collector to which NetFlow packets may be sent.
flow-export destination interface-name ipv4-address | hostname udp-port
Example:
ciscoasa(config)# flow-export destination inside 209.165.200.225 2002
The destination keyword indicates that a NSEL collector is being configured. The interface-name
argument is the name of the ASA and ASA Services Module interface through which the collector
is reached. The ipv4-address argument is the IP address of the machine running the collector
application. The hostname argument is the destination IP address or name of the collector. The
udp-port argument is the UDP port number to which NetFlow packets are sent.
You can configure a maximum of five collectors. After a collector is configured, template records
are automatically sent to all configured NSEL collectors.
QUESTION 147
Which Cisco command enables authentication, authorization, and accounting globally so that
CoA is supported on the device?
A. ip device-tracking
B. aaa new-model
C. aaa server radius dynamic-author
D. auth-type all
Answer: B
Explanation:
aaa new-model
Enables authentication, authorization, and accounting (AAA) globally.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec-usr-aaa-
15-sy-book/sec-rad-coa.html
QUESTION 148
Refer to the exhibit. What is the result of this Python script of the Cisco DNA Center API?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 55
http://www.passleader.com
A. adds authentication to a switch
B. receives information about a switch
C. adds a switch to Cisco DNA Center
Answer: C
QUESTION 149
What are two reasons for implementing a multifactor authentication solution such as Duo Security
provide to an organization? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 56
http://www.passleader.com
E. single sign-on access to on-premises and cloud applications
Answer: CE
Explanation:
Trust Every User With Single Sign-On and 2FA
Verify the identity of your users with two-factor authentication and give them easy access to work
applications with single sign- on. Customized policies and controls on a per-application basis will
secure your organization from risky users and devices.
https://duo.com/single-sign-on
QUESTION 150
Which protocol provides the strongest throughput performance when using Cisco AnyConnect
VPN?
A. TLSv1.2
B. TLSv1
C. TLSv1.1
D. DTLSv1
Answer: D
Explanation:
By default, group policies on ASAs are configured to attempt establishing a DTLS tunnel. If UDP
443 traffic is blocked between the VPN headend and the AnyConnect client, it will automatically
fallback to TLS. It is recommended to use DTLS or IKEv2 to increase maximum VPN throughput
performance. DTLS offers better performance than TLS due to less protocol overhead. IKEv2
also offers better throughput than TLS. Additionally, using AES-GCM ciphers may slightly
improve performance. These ciphers are available in TLS 1.2, DTLS 1.2 and IKEv2.
QUESTION 151
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security
products from Cisco and other vendors to share data and interoperate with each other?
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 57
http://www.passleader.com
QUESTION 152
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256
cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.
Which command achieves this goal?
Answer: D
Explanation:
Configuration Example of SNMP v3
Currently the most secure SNMP version is v3. To configure this version you need first to create
an SNMP group, then an SNMP server and lastly a host (NMS) which will communicate with the
firewall for management purposes.
QUESTION 153
Which type of attack is social engineering?
A. trojan
B. MITM
C. phishing
D. malware
Answer: C
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 58
http://www.passleader.com
Phishing is a form of social engineering. Phishing attacks use email or malicious websites to
solicit personal information by posing as a trustworthy organization.
QUESTION 154
Which compliance status is shown when a configured posture policy requirement is not met?
A. unknown
B. authorized
C. compliant
D. noncompliant
Answer: D
Explanation:
If the device is not compliant, it is identified as non-compliant. However, if there is no compliance
rules configured and the device is not profiled, the status is changed to unknown.
QUESTION 155
What must be used to share data between multiple security products?
Answer: C
QUESTION 156
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint
group. Which probe must be enabled for this type of profiling to work?
A. NetFlow
B. DHCP
C. SNMP
D. NMAP
Answer: D
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 59
http://www.passleader.com
NMAP ("Network Mapper") is a popular network scanner which provides a lot of features. One of
them is the OUI (Organizationally Unique Identifier) information. OUI is the first 24 bit or 6
hexadecimal value of the MAC address.
Note: DHCP probe cannot collect OUIs of endpoints.
QUESTION 157
Which PKI enrollment method allows the user to separate authentication and enrollment actions
and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the
server?
A. url
B. profile
C. terminal
D. selfsigned
Answer: B
Explanation:
Certificate enrollment profiles allow users to specify certificate authentication, enrollment, and
reenrollment parameters when prompted. The values for these parameters are referenced by two
templates that make up the profile. One template contains parameters for the HTTP request that
is sent to the CA server to obtain the certificate of the CA (also known as certificate
authentication); the other template contains parameters for the HTTP request that is sent to the
CA for certificate enrollment.
QUESTION 158
A network engineer is configuring DMVPN and entered the crypto is akmp key cisc0380739941
address 0.0.0.0 command on host A The tunnel is not being established to host B. What action is
needed to authenticate the VPN?
Answer: A
Explanation:
Enter 0.0.0.0 on a this command line could be done on Hub and Spoke.
Hub configuration is done on ip nhrp.
https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfike.html#wp1017
897
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_dmvpn/configuration/15-mt/sec-
conn-dmvpn-15-mt-book/sec-conn-dmvpn-dmvpn.html#GUID-BDBD63D7-C9FD-490F-B1AF-
EFC38B6B497B
QUESTION 159
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP
Inspection is applied, all users on that switch are unable to communicate with any destination.
The network administrator checks the interface status of all interfaces, and there is no err-
disabled interface. What is causing this problem?
A. The ip arp inspection limit command is applied on all interfaces and is blocking the
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 60
http://www.passleader.com
traffic of all users.
B. DHCP snooping has not been enabled on all VLANs.
C. The no ip arp inspection trust command is applied on all user host interfaces
D. Dynamic ARP Inspection has not been enabled on all VLANs
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipaddr/command/ipaddr-cr-book/ipaddr-
i1.html#wp2458863701
the command "no ip arp inspection trust" means the port is not trusted in DAI. This means that it
will inspect packets from the port for appropriate entries in the DHCP Snooping table. This is the
default state.
https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3.2_0_se/multiboo
k/configuration_guide/b_consolidated_config_guide_3850_chapter_0110111.html
err-disable on a port due to DAI comes from exceeding a rate limit.
QUESTION 160
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 61
http://www.passleader.com
Answer: D
QUESTION 161
Refer to the exhibit. A network administrator configured a site-to-site VPN tunnel between two
Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network
administrator runs the debug crypto isakmp sa command to track VPN status.
What is the problem according to this command output?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 62
http://www.passleader.com
Answer: C
Explanation:
On the show crypto isakmp sa output, the state should always be QM_IDLE. If the state is
MM_KEY_EXCH, it means either the configured pre-shared key is not correct or the peer IP
addresses are different.
https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/5409-
ipsec-debug-00.html
QUESTION 162
Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a
laptop to authenticate.
Which port configuration is missing?
A. cisp enable
B. dotlx reauthentication
C. authentication open
D. dot1x pae authenticator
Answer: D
Explanation:
QUESTION 163
Refer to the exhibit. A network administrator configures command authorization for the admm5
user. What is the admin5 user able to do on HQ_Router after this configuration?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 63
http://www.passleader.com
A. complete no configurations
B. add subinterfaces
C. complete all configurations
D. set the IP address of an interface
Answer: A
Explanation:
QUESTION 164
An organization is receiving SPAM emails from a known malicious domain.
What must be configured in order to prevent the session during the initial TCP communication?
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118219-configure-
esa-00.html
QUESTION 165
What is a key difference between Cisco Firepower and Cisco ASA?
A. Cisco ASA provides access control while Cisco Firepower does not.
B. Cisco Firepower provides identity-based access control while Cisco ASA does not.
C. Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.
D. Cisco ASA provides SSL inspection while Cisco Firepower does not.
Answer: C
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-firepowerservices/200451-
Configure-Intrusion-Policy-and-Signature.html
QUESTION 166
While using Cisco Firepower's Security Intelligence policies, which two criteria is blocking based
upon? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 64
http://www.passleader.com
A. protocol IDs
B. URLs
C. IP addresses
D. port numbers
E. MAC addresses
Answer: BC
Explanation:
Block specific IP addresses, URLs, or domain names using a manually-created list or feed (for IP
addresses, you can also use network objects or groups.)
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-
guide-v623/security_intelligence_blacklisting.html#ID-2192-0000002b
QUESTION 167
An attacker needs to perform reconnaissance on a target system to help gain access to it.
The system has weak passwords, no encryption on the VPN links, and software bugs on the
system's applications.
Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Answer: D
Explanation:
https://www.cisco.com/ELearning/bulk/public/celc/CRS/media/targets/resources_mod07/7_
3_5_improving_security.pdf
QUESTION 168
A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis.
The network is congested and is affecting communication.
How will the Cisco ESA handle any files which need analysis?
A. AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.
B. The file is queued for upload when connectivity is restored.
C. The file upload is abandoned.
D. The ESA immediately makes another attempt to upload the file.
Answer: C
Explanation:
The appliance will try once to upload the file; if upload is not successful, for example because of
connectivity problems, the file may not be uploaded. If the failure was because the file analysis
server was overloaded, the upload will be attempted once more.
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118796-technote-
esa-00.html
QUESTION 169
Refer to the exhibit. Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat
Defense appliance.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 65
http://www.passleader.com
What is causing this issue?
Answer: D
Explanation:
We see traffic is comming in but no traffic is going into the tunnel so its likely a access policy
wrong or missing.
QUESTION 170
What are two DDoS attack categories? (Choose two.)
A. sequential
B. protocol
C. database
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 66
http://www.passleader.com
D. volume-based
E. scree-based
Answer: BD
Explanation:
There are three different general categories of DDoS attacks:
Volume-based DDoS attacks
Application DDoS attacks
Low-rate DoS (LDoS) attacks
https://tools.cisco.com/security/center/resources/guide_ddos_defense.html
QUESTION 171
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Answer: A
Explanation:
While events can be delayed they are not delayed by default. The flow-create event is exported
as soon as the flow is created if the flow-export delay flow-create command is not configured.
QUESTION 172
Which product allows Cisco FMC to push security intelligence observable to its sensors from
other products?
Answer: B
Explanation:
As shown in the image, on the FMC you have to configure sources from where you would like to
download threat intelligence information. The FMC then pushes that information (observables) to
sensors. When the traffic matches the observables, the incidents appear in the FMC user
interface (GUI).
https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-
troubleshoot-cisco-threat.html
QUESTION 173
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL
injection while machine 2 is vulnerable to buffer overflows.
What action would allow the attacker to gain access to machine 1 but not machine 2?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 67
http://www.passleader.com
D. inserting malicious commands into the database
Answer: D
Explanation:
QUESTION 174
An organization is trying to improve their Defense in Depth by blocking malicious destinations
prior to a connection being established.
The solution must be able to block certain applications from being used within the network.
Which product should be used to accomplish this goal?
A. Cisco Firepower
B. Cisco Umbrella
C. ISE
D. AMP
Answer: B
Explanation:
Cisco Umbrella uses the internet’s infrastructure to block malicious destinations before a
connection is ever established. Umbrella uses DNS to stop threats over all ports and protocols -
even direct-to-IP connections. Stop malware before it reaches your endpoints or network.
https://www.cisco.com/c/m/en_il/training-events/experience-it-umbrella/index.html
QUESTION 175
An engineer notices traffic interruption on the network. Upon further investigation, it is learned
that broadcast packets have been flooding the network.
What must be configured, based on a predefined threshold, to address this issue?
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr- book/eem-cr-e1.html
QUESTION 176
In which situation should an Endpoint Detection and Response solution be chosen versus an
Endpoint Protection Platform?
Answer: D
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 68
http://www.passleader.com
What is the difference between an endpoint protection platform (EPP) and endpoint detection and
response (EDR)?
EDR focuses primarily on advanced threats that are designed to evade front-line defenses and
have successfully entered into the environment. An EPP focuses solely on prevention at the
perimeter. It is difficult, if not impossible, for an EPP to block 100 percent of threats. So in the
ideal case, an endpoint security solution deploys both EPP and EDR capabilities.
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-
response-
edr.html#:~:text=What%20is%20the%20difference%20between,on%20prevention%20at%20the
%20perimeter.
QUESTION 177
What is provided by the Secure Hash Algorithm in a VPN?
A. integrity
B. key exchange
C. encryption
D. authentication
Answer: A
Explanation:
Both SHA-1 and SHA-2 are hash algorithms used to authenticate packet data and verify the
integrity verification mechanisms for the IKE protocol.
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/xe-16-7/sec-
sec-for-vpns-w-ipsec-xe-16-7-book/sec-cfg-vpn-ipsec.html
QUESTION 178
Which type of API is being used when a controller within a software-defined network architecture
dynamically makes configuration changes on switches within the network?
A. westbound AP
B. southbound API
C. northbound API
D. eastbound API
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 69
http://www.passleader.com
QUESTION 179
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring
the organization's public cloud to send telemetry using the cloud provider's mechanisms to a
security device.
Which mechanism should the engineer configure to accomplish this goal?
A. mirror port
B. NetFlow
C. Flow
D. VPC flow logs
Answer: D
Explanation:
Stealthwatch Cloud can be deployed without software agents, relying on the native AWS Virtual
Private Cloud (VPC) flow logs.
https://aws.amazon.com/marketplace/pp/prodview-woiawecmdlezq
QUESTION 180
What is managed by Cisco Security Manager?
A. Cisco WSA
B. Cisco ASA
C. Cisco WLC
D. Cisco ESA
Answer: B
Explanation:
Cisco Security Manager provides a comprehensive management solution for:
Cisco ASA 5500 Series Adaptive Security Appliances
Cisco intrusion prevention systems 4200 and 4500 Series Sensors
Cisco AnyConnect Secure Mobility Client
https://www.cisco.com/c/en/us/products/security/security-manager/index.html
QUESTION 181
Why is it important to have logical security controls on endpoints even though the users are
trained to spot security threats and the network devices already help prevent them?
Answer: D
QUESTION 182
What is the benefit of installing Cisco AMP for Endpoints on a network?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 70
http://www.passleader.com
C. It protects endpoint systems through application control and real-time scanning.
D. It enables behavioral analysis to be used for the endpoints.
Answer: C
Explanation:
In the rapidly evolving world of malware, threats are becoming harder and harder to detect. The
most advanced 1% of these threats, those that will eventually enter and wreak havoc in your
network, could potentially go undetected. However, Secure Endpoint provides comprehensive
protection against that 1%. This security software prevents breaches, blocks malware at the point
of entry, and continuously monitors and analyzes file and process activity to rapidly detect,
contain, and remediate threats that can evade front-line defenses.
https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/datasheet-c78-
733181.html
QUESTION 183
Which Talos reputation center allows for tracking the reputation of IP addresses for email and
web traffic?
Answer: A
QUESTION 184
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using
CoA as a mechanism.
Which port on the firewall must be opened to allow the CoA traffic to traverse the network?
A. TCP 6514
B. UDP 1700
C. TCP 49
D. UDP 1812
Answer: B
Explanation:
QUESTION 185
What is the purpose of the certificate signing request when adding a new certificate for a server?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 71
http://www.passleader.com
Answer: B
Explanation:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_cert.html
QUESTION 186
What is the purpose of the My Devices Portal in a Cisco ISE environment?
A. to manage and deploy antivirus definitions and patches on systems owned by the end user
B. to register new laptops and mobile devices
C. to provision userless and agentless systems
D. to request a newly provisioned mobile device
Answer: B
Explanation:
Q. Why do I need to use the My Devices Portal?
A. Depending on your company policy, you might be able to use your mobile phones, tablets,
printers, Internet radios, and other network devices on your company’s network. You can use the
My Devices portal to register and manage these devices on your company’s network.
When you use a laptop computer, mobile phone, or tablet to access the Internet, you typically use
a web browser on the device itself.
QUESTION 187
An organization received a large amount of SPAM messages over a short time period. In order to
take action on the messages, it must be determined how harmful the messages are and this
needs to happen dynamically.
What must be configured to accomplish this?
A. Configure the Cisco WSA to modify policies based on the traffic seen.
B. Configure the Cisco ESA to receive real-time updates from Talos
C. Configure the Cisco WSA to receive real-time updates from Talos.
D. Configure the Cisco ESA to modify policies based on the traffic seen.
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa120/user_guide/b_ESA_Admin_Guide_12
_0/b_ESA_Admin_Guide_chapter_01100.html
QUESTION 188
What is an attribute of the DevSecOps process?
A. development security
B. isolated security team
C. mandated security controls and check lists
D. security scanning and theoretical vulnerabilities
Answer: A
Explanation:
DevSecOps (development, security, and operations) is a concept used in recent years to
describe how to move security activities to the start of the development life cycle and have built-in
security practices in the continuous integration/continuous deployment (CI/CD) pipeline. Thus
minimizing vulnerabilities and bringing security closer to IT and business objectives.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 72
http://www.passleader.com
Three key things make a real DevSecOps environment:
+ Security testing is done by the development team.
+ Issues found during that testing is managed by the development team.
+ Fixing those issues stays within the development team.
https://blogs.cisco.com/security/devsecops-win-win-for-all
QUESTION 189
A user has a device in the network that is receiving too many connection requests from multiple
machines. Which type of attack is the device undergoing?
A. SYN flood
B. slowloris
C. pharming
D. phishing
Answer: A
Explanation:
QUESTION 190
Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on
VLAN 41 on a new switch is complaining that an IP address is not being obtained.
Which command should be configured on the switch interface in order to provide the user with
network connectivity?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 73
http://www.passleader.com
D. ip dhcp snooping trust
Answer: D
Explanation:
QUESTION 191
A company is experiencing exfiltration of credit card numbers that are not being stored on-
premise.
The company needs to be able to protect sensitive data throughout the full environment.
Which tool should be used to accomplish this goal?
A. Security Manager
B. Cloudlock
C. Web Security Appliance
D. Cisco ISE
Answer: B
Explanation:
QUESTION 192
Which algorithm provides asymmetric encryption?
A. RC4
B. RSA
C. AES
D. 3DES
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 74
http://www.passleader.com
QUESTION 193
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs?
A. LDAP
B. SDP
C. subordinate CA
D. HTTP
E. SCP
Answer: AD
Explanation:
QUESTION 194
When Cisco and other industry organizations publish and inform users of known security findings
and vulnerabilities, which name is used?
Answer: A
Explanation:
QUESTION 195
What is the Cisco API-based broker that helps reduce compromises, application risks, and data
breaches in an environment that is not on-premise?
A. Cisco Cloudlock
B. Cisco Umbrella
C. Cisco AMP
D. Cisco App Dynamics
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 75
http://www.passleader.com
QUESTION 196
Which Cisco platform ensures that machines that connect to organizational networks have the
recommended antivirus definitions and patches to help prevent an organizational malware
outbreak?
A. Cisco WiSM
B. Cisco ESA
C. Cisco ISE
D. Cisco Prime Infrastructure
Answer: C
Explanation:
QUESTION 197
A Cisco Firepower administrator needs to configure a rule to allow a new application that has
never been seen on the network.
Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two.)
A. permit
B. trust
C. reset
D. allow
E. monitor
Answer: BD
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 76
http://www.passleader.com
QUESTION 198
Which two fields are defined in the NetFlow flow? (Choose two.)
Answer: AE
Explanation:
QUESTION 199
An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to
some sites but other sites are not accessible due to an error. Why is the error occurring?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 77
http://www.passleader.com
A. Client computers do not have the Cisco Umbrella Root CA certificate installed.
B. IP-Layer Enforcement is not configured.
C. Intelligent proxy and SSL decryption is disabled in the policy.
D. Client computers do not have an SSL certificate deployed from an internal CA server.
Answer: A
Explanation:
Requirements and Implementation
Although only SSL sites on our 'grey' list will be proxied, it's required that the root certificate be
installed on the computers that are using SSL Decryption for the Intelligent Proxy in their policy.
Without the root certificate, when your users go to that service, they will receive errors in the
browser and the site will not be accessible. The browser, correctly, will believe the traffic is being
intercepted (and proxied!) by a 'man in the middle', which is our service in this case. The traffic
won't be decrypted and inspected; instead, the entire website won't be available.
https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-Intelligent-
Proxy
QUESTION 200
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms
from being used. However, the connection is failing.
Which action should be taken to accomplish this goal?
Answer: D
Explanation:
QUESTION 201
How does DNS Tunneling exfiltrate data?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 78
http://www.passleader.com
A. An attacker registers a domain that a client connects to based on DNS records and sends
malware through that connection.
B. An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
C. An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in
order to poison the resolutions.
D. An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a
malicious domain.
Answer: A
Explanation:
QUESTION 202
What is the function of SDN southbound API protocols?
Answer: A
Explanation:
In an SDN architecture, southbound APIs are used to communicate between the SDN controller
and the switches and routers within the infrastructure. These APIs can be open or
proprietary.Southbound APIs enable SDN controllers to dynamically make changes based on
real-time demands and scalability needs. OpenFlow and Cisco OpFlex provide southbound API
capabilities.
QUESTION 203
What is a characteristic of a bridge group in ASA Firewall transparent mode?
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 79
http://www.passleader.com
Explanation:
QUESTION 204
A network administrator is configuring a rule in an access control policy to block certain URLs and
selects the "Chat and Instant Messaging" category.
Which reputation score should be selected to accomplish this goal?
A. 1
B. 10
C. 5
D. 3
Answer: D
Explanation:
QUESTION 205
Which public cloud provider supports the Cisco Next Generation Firewall Virtual?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 80
http://www.passleader.com
D. Amazon Web Services
Answer: D
Explanation:
QUESTION 206
What provides the ability to program and monitor networks from somewhere other than the DNAC
GUI?
A. ASDM
B. desktop client
C. API
D. NetFlow
Answer: C
QUESTION 207
What is a benefit of using Cisco FMC over Cisco ASDM?
Answer: B
Explanation:
The Firepower Management Center (FMC) is a centralized management console with graphical
user interface that you can use to perform administrative, management, analysis, and reporting
tasks. It is a management console that is comparable, but not identical, to ASDM and FDM.
https://docs.defenseorchestrator.com/Welcome_to_Cisco_Defense_Orchestrator/Managing_FMC
_with_Cisco_Defense_Orchestrator
QUESTION 208
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)
A. Public managed
B. Service Provider managed
C. Enterprise managed
D. User managed
E. Hybrid managed
Answer: BC
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 81
http://www.passleader.com
QUESTION 209
Which type of algorithm provides the highest level of protection against brute-force attacks?
A. PFS
B. HMAC
C. MD5
D. SHA
Answer: A
QUESTION 210
Which two aspects of the cloud PaaS model are managed by the customer but not the provider?
(Choose two.)
A. virtualization
B. middleware
C. operating systems
D. applications
E. data
Answer: DE
Explanation:
https://apprenda.com/library/paas/iaas-paas-saas-explained-compared/
QUESTION 211
Which two cryptographic algorithms are used with IPsec? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 82
http://www.passleader.com
A. AES-BAC
B. AES-ABC
C. HMAC-SHA1/SHA2
D. Triple AMC-CBC
E. AES-CBC
Answer: CE
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnips/configuration/15-mt/sec-sec-
for-vpns-w-ipsec-15-mt-book/sec-cfg-vpn-ipsec.html
QUESTION 212
What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when
an endpoint is deleted from an identity group?
A. CoA
B. external identity source
C. posture assessment
D. SNMP probe
Answer: A
Explanation:
When an endpoint is deleted from the Endpoints page and the endpoint is disconnected or
removed from the network.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-
1/admin_guide/b_ise_admin_guide_21/b_ise_admin_guide_20_chapter_010100.html
QUESTION 213
How does Cisco Advanced Phishing Protection protect users?
Answer: C
Explanation:
Cisco® Advanced Phishing Protection provides sender authentication and BEC detection
capabilities. It uses advance machine learning techniques, real time behavior analytics,
relationship modeling and telemetry to protect against identity deception–based threats.
QUESTION 214
What are two differences between a Cisco WSA that is running in transparent mode and one
running in explicit mode? (Choose two.)
A. When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the
HTTP request destination.
B. The Cisco WSA responds with its own IP address only if it is running in explicit mode.
C. The Cisco WSA is configured in a web browser only if it is running in transparent mode.
D. The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 83
http://www.passleader.com
E. The Cisco WSA responds with its own IP address only if it is running in transparent mode.
Answer: BD
Explanation:
In explicit proxy mode, users are configured to use a web proxy and the web traffic is sent directly
to the Cisco WSA. In contrast, in transparent proxy mode the Cisco WSA intercepts user's web
traffic redirected from other network devices, such as switches, routers, or firewalls.
QUESTION 215
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity
professionals remain aware of the ongoing and most prevalent threats?
A. PSIRT
B. DEVNET
C. CSIRT
D. Talos
Answer: D
Explanation:
https://talosintelligence.com/
QUESTION 216
In which type of attack does the attacker insert their machine between two hosts that are
communicating with each other?
A. LDAP injection
B. cross-site scripting
C. man-in-the-middle
D. insecure API
Answer: C
Explanation:
QUESTION 217
Refer to the exhibit. Which type of authentication is in use?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 84
http://www.passleader.com
A. LDAP authentication for Microsoft Outlook
B. POP3 authentication
C. SMTP relay server authentication
D. external user and relay mail authentication
Answer: A
QUESTION 218
What are two benefits of Flexible NetFlow records? (Choose two)
Answer: BE
Explanation:
Cisco IOS Flexible NetFlow benefits:
- Flexibility and scalability of flow data beyond traditional NetFlow
- Customized traffic identification
- Ability to focus and monitor specific network behavior
- Ability to monitor a wider range of packet information, producing new information about network
behavior
- Enhanced network anomaly and security detection
- Convergence of multiple accounting technologies into one accounting mechanism
QUESTION 219
After a recent breach, an organization determined that phishing was used to gain initial access to
the network before regaining persistence.
The information gained from the phishing attack was a result of users visiting known malicious
websites.
What must be done in order to prevent this from happening in the future?
Answer: D
Explanation:
The Web Security appliance intercepts requests that are forwarded to it by clients or other
devices over the network.
The appliance works in conjunction with other network devices to intercept traffic. These may be
ordinary switches, transparent redirection devices network taps,and other proxy servers or Web
Security appliances.
QUESTION 220
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented
from quickly identifying all valid recipients.
What must be done on the Cisco ESA to accomplish this goal?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 85
http://www.passleader.com
A. Use Bounce Verification
B. Configure incoming content filters.
C. Bypass LDAP access queries in the recipient access table.
D. Configure Directory Harvest Attack Prevention
Answer: D
Explanation:
QUESTION 221
Drag and Drop Question
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 86
http://www.passleader.com
QUESTION 222
Drag and Drop Question
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the
correct definitions on the right.
Answer:
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 87
http://www.passleader.com
https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-analytics/white-
paper-c11-740380.html
QUESTION 223
Drag and Drop Question
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the
appropriate category on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 88
http://www.passleader.com
Explanation:
https://www.cisco.com/c/en/us/products/collateral/security/ngips/datasheet-c78- 742472.html
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guide-v60/Reference_a_wrapper_Chapter_topic_here.html
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-
protection/solution-overview-c22-734228.html
QUESTION 224
Drag and Drop Question
Drag and drop the threats from the left onto examples of that threat on the right
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 89
http://www.passleader.com
QUESTION 225
Drag and Drop Question
Drag and drop the VPN functions from the left onto the description on the right.
Answer:
QUESTION 226
What is a difference between DMVPN and sVTI?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 90
http://www.passleader.com
C. DMVPN supports static tunnel establishment, whereas sVTI does not.
D. DMVPN provides interoperability with other vendors, whereas sVTI does not.
Answer: B
QUESTION 227
What are two functions of secret key cryptography? (Choose two.)
Answer: AD
Explanation:
https://www.cisco.com/c/en/us/products/security/encryption-explained.html#~faqs
https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/17584-
16.html
QUESTION 228
Which type of API is being used when a security application notifies a controller within a software-
defined network architecture about a specific security threat?
A. westbound AP
B. southbound API
C. northbound API
D. eastbound API
Answer: C
Explanation:
Northbound APIs (SDN northbound APIs) are typically RESTful APIs that are used to
communicate between the SDN controller and the services and applications running over the
network. Such northbound APIs can be used for the orchestration and automation of the network
components to align with the needs of different applications via SDN network programmability. In
short, northbound APIs are basically the link between the APPLICATIONS and the SDN
controller.
QUESTION 229
Which type of protection encrypts RSA keys when they are exported and imported?
A. file
B. passphrase
C. NGE
D. nonexportable
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 91
http://www.passleader.com
QUESTION 230
Which attack type attempts to shut down a machine or network so that users are not able to
access it?
A. IP spoofing
B. bluesnarfing
C. MAC spoofing
D. smurf
Answer: D
Explanation:
QUESTION 231
A network engineer is deciding whether to use stateful or stateless failover when configuring two
ASAs for high availability. What is the connection status in both cases?
A. need to be reestablished with stateful failover and preserved with stateless failover
B. need to be reestablished with both stateful and stateless failover
C. preserved with both stateful and stateless failover
D. preserved with stateful failover and need to be reestablished with stateless failover
Answer: D
Explanation:
QUESTION 232
When planning a VPN deployment, for which reason does an engineer opt for an active/active
FlexVPN configuration as opposed to DMVPN?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 92
http://www.passleader.com
C. Floating static routes are required.
D. HSRP is used for fallover.
Answer: B
QUESTION 233
What features does Cisco FTDv provide over Cisco ASAv?
Answer: C
Explanation:
QUESTION 234
An organization has two systems in their DMZ that have an unencrypted link between them for
communication. The organization does not have a defined password policy and uses several
default accounts on the systems. The application used on those systems also have not gone
through stringent code reviews. Which vulnerability would help an attacker brute force their way
into the systems?
A. missing encryption
B. lack of file permission
C. weak passwords
D. lack of input validation
Answer: C
Explanation:
QUESTION 235
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
A. teardrop
B. MITM
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 93
http://www.passleader.com
C. smurf
D. LAND
Answer: A
Explanation:
QUESTION 236
What is a function of 3DES in reference to cryptography?
A. It encrypts traffic.
B. It creates one-time use passwords.
C. It hashes files.
D. It generates private keys.
Answer: A
QUESTION 237
Drag and Drop Question
Drag and drop the deployment models from the left onto the explanations on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 94
http://www.passleader.com
QUESTION 238
Which risk is created when using an Internet browser to access cloud-based service?
Answer: C
Explanation:
Vulnerabilities within protocols that can expose confidential data.
QUESTION 239
A Cisco ESA network administrator has been tasked to use a newly installed service to help
create policy based on the reputation verdict.
During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined
verdict. What is causing this issue?
Answer: C
Explanation:
The important part of the question is, not dropping files that have undetermined verdict. So
answer just can be below or above score.
Deliver file to end user is below score so C is correct
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 95
http://www.passleader.com
QUESTION 240
An administrator is trying to determine which applications are being used in the network but does
not want the network devices to send metadata to Cisco Firepower. Which feature should be
used to accomplish this?
A. NetFlow
B. Packet Tracer
C. Network Discovery
D. Access Control
Answer: C
Explanation:
The network discovery policy has a single default rule in place, configured to discover
applications from all observed traffic. The rule does not exclude any networks, zones, or ports,
host and user discovery is not configured, and the rule is not configured to monitor a NetFlow
exporter. This policy is deployed by default to any managed devices when they are registered to
the Firepower Management Center. To begin collecting host or user data, you must add or modify
discovery rules and re-deploy the policy to a device.
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guide-v60/Network_Discovery_Policies.html
QUESTION 241
Which attack is preventable by Cisco ESA but not by the Cisco WSA?
A. buffer overflow
B. DoS
C. SQL injection
D. phishing
Answer: D
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 96
http://www.passleader.com
The following are the benefits of deploying Cisco Advanced Phishing Protection on the Cisco
Email Security
Gateway:
Prevents the following:
+ Attacks that use compromised accounts and social engineering.
+ Phishing, ransomware, zero-day attacks and spoofing.
+ BEC with no malicious payload or URL.
Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-
5/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html
QUESTION 242
A Cisco ESA administrator has been tasked with configuring the Cisco ESA to ensure there are
no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad
mail servers must be prevented. Which two actions must be taken in order to meet these
requirements? (Choose two)
Answer: AE
Explanation:
We should scan emails using AntiVirus signatures to make sure there are no viruses attached in
emails.
Note: A virus signature is the fingerprint of a virus. It is a set of unique data, or bits of code, that
allow it to be identified. Antivirus software uses a virus signature to find a virus in a computer file
system, allowing to detect, quarantine, and remove the virus.
SenderBase is an email reputation service designed to help email administrators research
senders, identify legitimate sources of email, and block spammers. When the Cisco ESA receives
messages from known or highly reputable senders, it delivers them directly to the end user
without any content scanning.
However, when the Cisco ESA receives email messages from unknown or less reputable
senders, it performs antispam and antivirus scanning.
Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-
0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_0100100.html
QUESTION 243
Which type of dashboard does Cisco DNA Center provide for complete control of the network?
A. service management
B. centralized management
C. application management
D. distributed management
Answer: B
Explanation:
Cisco's DNA Center is the only centralized network management system to bring all of this
functionality into a single pane of glass.
Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/dna-
center/nb-06-dna-center-faq-cte-en.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 97
http://www.passleader.com
QUESTION 244
In an IaaS cloud services model, which security function is the provider responsible for
managing?
A. Internet proxy
B. firewalling virtual machines
C. CASB
D. hypervisor OS hardening
Answer: D
Explanation:
Infrastructure as a Service (IaaS) in cloud computing is one of the most significant and fastest
growing field. In this service model, cloud providers offer resources to users/machines that
include computers as virtual machines, raw (block) storage, firewalls, load balancers, and
network devices.
QUESTION 245
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE
is being used as the NAC server, and the new device does not have a supplicant available. What
must be done in order
to securely connect this device to the network?
Answer: A
Explanation:
As the new device does not have a supplicant, we cannot use 802.1X. MAC Authentication
Bypass (MAB) is a fallback option for devices that don't support 802.1x. It is virtually
always used in deployments in some way shape or form. MAB works by having the authenticator
take the connecting device's MAC address and send it to the authentication server as its
username and password. The authentication server will check its policies and send back an
Access-Accept or Access-Reject just like it would with 802.1x.
Cisco ISE Profiling Services provides dynamic detection and classification of endpoints
connected to the network. Using MAC addresses as the unique identifier, ISE collects various
attributes for each network endpoint to build an internal endpoint database. The classification
process matches the collected attributes to prebuilt or user-defined conditions, which are then
correlated to an extensive library of profiles.
These profiles include a wide range of device types, including mobile clients (iPads, Android
tablets, Chromebooks, and so on), desktop operating systems (for example, Windows, Mac OS
X, Linux, and others), and numerous non-user systems such as printers, phones, cameras, and
game consoles. Once classified, endpoints can be authorized to the network and granted access
based on their profile. For example, endpoints that match the IP phone profile can be placed into
a voice VLAN using MAC Authentication Bypass (MAB) as the authentication method. Another
example is to provide differentiated network access to users based on the device used. For
example, employees can get full access when accessing the network from their corporate
workstation but be granted limited network access when accessing the network from their
personal iPhone.
Reference: https://community.cisco.com/t5/security-documents/ise-profiling-design-guide/ta-
p/3739456
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 98
http://www.passleader.com
QUESTION 246
An engineer is implementing NTP authentication within their network and has configured both the
client and server devices with the command ntp authentication-key 1 md5 Cisc392368270. The
server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however it is unable to do
so. Which command is required to enable the client to accept the server's authentication key?
Answer: B
Explanation:
To configure an NTP enabled router to require authentication when other devices connect to it,
use the following commands:
NTP_Server(config)#ntp authentication-key 2 md5 securitytut
NTP_Server(config)#ntp authenticate
NTP_Server(config)#ntp trusted-key 2
Then you must configure the same authentication-key on the client router:
NTP_Client(config)#ntp authentication-key 2 md5 securitytut
NTP_Client(config)#ntp authenticate
NTP_Client(config)#ntp trusted-key 2
NTP_Client(config)#ntp server 10.10.10.1 key 2
Note: To configure a Cisco device as a NTP client, use the command ntp server <IP address>.
For example:
Router(config)#ntp server 10.10.10.1.
This command will instruct the router to query 10.10.10.1 for the time.
QUESTION 247
What is the role of an endpoint in protecting a user from a phishing attack?
Answer: D
Explanation:
https://www.cisco.com/c/en/us/products/security/user-endpoint-protection.html
QUESTION 248
An organization has noticed an increase in malicious content downloads and wants to use Cisco
Umbrella to prevent this activity for suspicious domains while allowing normal web traffic. Which
action will accomplish this task?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 99
http://www.passleader.com
Answer: B
Explanation:
Obviously, if you allow all traffic to these risky domains, users might access malicious content,
resulting in an infection or data leak. But if you block traffic, you can expect false positives, an
increase in support inquiries, and thus, more headaches. By only proxying risky domains, the
intelligent proxy delivers more granular visibility and control. The intelligent proxy bridges the gap
by allowing access to most known good sites without being proxied and only proxying those that
pose a potential risk. The proxy then filters and blocks against specific URLs hosting malware
while allowing access to everything else.
Reference: https://docs.umbrella.com/deployment-umbrella/docs/what-is-the-intelligent-proxy
QUESTION 249
With which components does a southbound API within a software-defined network architecture
communicate?
Answer: D
Explanation:
QUESTION 250
A network administrator needs to find out what assets currently exist on the network. Third-party
systems need to be able to feed host data into Cisco Firepower. What must be configured to
accomplish this?
Answer: A
Explanation:
You can configure discovery rules to tailor the discovery of host and application data to your
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 100
http://www.passleader.com
needs. The Firepower System can use data from NetFlow exporters to generate connection and
discovery events, and to add host and application data to the network map. A network analysis
policy governs how traffic is decoded and preprocessed so it can be further evaluated, especially
for anomalous traffic that might signal an intrusion attempt
QUESTION 251
When configuring ISAKMP for IKEv1 Phase1 on a Cisco IOS router, an administrator needs to
input the command crypto isakmp key cisco address 0.0.0.0. The administrator is not sure what
the IP addressing in this command issued for. What would be the effect of changing the IP
address from 0.0.0.0 to 1.2.3.4?
A. The key server that is managing the keys for the connection will be at 1.2.3.4
B. The remote connection will only be allowed from 1.2.3.4
C. The address that will be used as the crypto validation authority
D. All IP addresses other than 1.2.3.4 will be allowed
Answer: B
Explanation:
The command crypto isakmp key cisco address 1.2.3.4 authenticates the IP address of the
1.2.3.4 peer by using the key cisco. The address of "0.0.0.0" will authenticate any address with
this key.
QUESTION 252
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of
users?
Answer: A
Explanation:
The various suspicious patterns for which the Cisco Tetration platform looks in the current release
are:
+ Shell code execution: Looks for the patterns used by shell code.
+ Privilege escalation: Watches for privilege changes from a lower privilege to a higher privilege
in the process lineage tree.
+ Side channel attacks: Cisco Tetration platform watches for cache-timing attacks and page table
fault bursts.
Using these, it can detect Meltdown, Spectre, and other cache-timing attacks.
+ Raw socket creation: Creation of a raw socket by a nonstandard process (for example, ping).
+ User login suspicious behavior: Cisco Tetration platform watches user login failures and user
login methods.
+ Interesting file access: Cisco Tetration platform can be armed to look at sensitive files.
+ File access from a different user: Cisco Tetration platform learns the normal behavior of which
file is accessed by which user.
+ Unseen command: Cisco Tetration platform learns the behavior and set of commands as well
as the lineage of each command over time. Any new command or command with a different
lineage triggers the interest of the Tetration Analytics platform.
Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-
analytics/whitepaper-c11-740380.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 101
http://www.passleader.com
QUESTION 253
Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent
SNMP traps. Which two actions must be taken to ensure that interfaces are put back into
service? (Choose two)
A. Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the
preconfigured interval.
B. Use EEM to have the ports return to service automatically in less than 300 seconds.
C. Enter the shutdown and no shutdown commands on the interfaces.
D. Enable the snmp-server enable traps command and wait 300 seconds
E. Ensure that interfaces are configured with the error-disable detection and recovery feature
Answer: CE
Explanation:
You can also bring up the port by using these commands:
+ The "shutdown" interface configuration command followed by the "no shutdown" interface
configuration command restarts the disabled port.
+ The "errdisable recovery cause ..." global configuration command enables the timer to
automatically recover error-disabled state, and the "errdisable recovery interval interval" global
configuration command specifies the time to recover error-disabled state.
QUESTION 254
What is the difference between Cross-site Scripting and SQL Injection attacks?
A. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is
an attack where code is injected into a browser.
B. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a
social engineering attack.
C. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is
when a database is manipulated.
D. Cross-site Scripting is an attack where code is executed from the server side, whereas SQL
Injection is an attack where code is executed from the client side.
Answer: D
Explanation:
XSS is a client-side vulnerability that targets other application users, while SQL injection is a
server-side vulnerability that targets the application's database.
QUESTION 255
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing
authentication and is unable to access the network.
Where should the administrator begin troubleshooting to verify the authentication details?
Answer: D
Explanation:
How To Troubleshoot ISE Failed Authentications & Authorizations Check the ISE Live Logs
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 102
http://www.passleader.com
Login to the primary ISE Policy Administration Node (PAN).
Go to Operations > RADIUS > Live Logs
(Optional) If the event is not present in the RADIUS Live Logs, go to Operations > Reports >
Reports > Endpoints and Users > RADIUS Authentications
Check for Any Failed Authentication Attempts in the Log
Reference: https://community.cisco.com/t5/security-documents/how-to-troubleshoot-ise-
failedauthentications-amp/ta-p/3630960
QUESTION 256
What is a prerequisite when integrating a Cisco ISE server and an AD domain?
A. Place the Cisco ISE server and the AD server in the same subnet
B. Configure a common administrator account
C. Configure a common DNS server
D. Synchronize the clocks of the Cisco ISE server and the AD server
Answer: D
Explanation:
The following are the prerequisites to integrate Active Directory with Cisco ISE. + Use the
Network Time Protocol (NTP) server settings to synchronize the time between the Cisco ISE
server and Active Directory. You can configure NTP settings from Cisco ISE CLI. + If your Active
Directory structure has multidomain forest or is divided into multiple forests, ensure that
trust relationships exist between the domain to which Cisco ISE is connected and the other
domains that have user and machine information to which you need access. For more information
on establishing trust relationships, refer to Microsoft Active Directory documentation. + You must
have at least one global catalog server operational and accessible by Cisco ISE, in the domain to
which you are joining Cisco ISE.
Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-
0/ise_active_directory_integration/b_ISE_AD_integration_2x.html#reference_8DC463597A644A5
C9CF5D582B77BB24F
QUESTION 257
An organization recently installed a Cisco WSA and would like to take advantage of the AVC
engine to allow the organization to create a policy to control application specific activity. After
enabling the AVC engine,
what must be done to implement this?
Answer: C
Explanation:
The Application Visibility and Control (AVC) engine lets you create policies to control application
activity on the network without having to fully understand the underlying technology of each
application. You can configure application control settings in Access Policy groups. You can block
or allow applications individually or according to application type. You can also apply controls to
particular application types.
QUESTION 258
Which method is used to deploy certificates and configure the supplicant on mobile devices to
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 103
http://www.passleader.com
gain access to network resources?
A. BYOD on boarding
B. Simple Certificate Enrollment Protocol
C. Client provisioning
D. MAC authentication bypass
Answer: A
Explanation:
The BYOD deployment flows that support personal devices vary slightly based on these factors:
Single or dual SSID: With single SSID, the same Wireless Local Area Network (WLAN) is used
for certificate enrollment, provisioning, and network access. In a dual SSID deployment, there are
two SSIDs.One provides enrollment and provisioning, and the other provides secure network
access
QUESTION 259
Refer to the exhibit. What will happen when this Python script is run?
A. The compromised computers and malware trajectories will be received from Cisco AMP
B. The list of computers and their current vulnerabilities will be received from Cisco AMP
C. The compromised computers and what compromised them will be received from Cisco AMP
D. The list of computers, policies, and connector statuses will be received from Cisco AMP
Answer: D
Explanation:
The call to API of "https://api.amp.cisco.com/v1/computers" allows us to fetch list of computers
across your organization that Advanced Malware Protection (AMP) sees.
Reference:
https://api-
docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fcomputers&api_host=api.a
pjc.amp.cisco.com&api_resource=Computer&api_version=v1
QUESTION 260
An organization is trying to implement micro-segmentation on the network and wants to be able to
gain visibility on the applications within the network. The solution must be able to maintain and
force compliance.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 104
http://www.passleader.com
Which product should be used to meet these requirements?
A. Cisco Umbrella
B. Cisco AMP
C. Cisco Stealthwatch
D. Cisco Tetration
Answer: D
Explanation:
Micro-segmentation secures applications by expressly allowing particular application traffic and,
by default, denying all other traffic. Micro-segmentation is the foundation for implementing a zero-
trust security model for application workloads in the data center and cloud.
Cisco Tetration is an application workload security platform designed to secure your compute
instances across any infrastructure and any cloud. To achieve this, it uses behavior and attribute-
driven microsegmentation policy generation and enforcement. It enables trusted access through
automated, exhaustive context from various systems to automatically adapt security policies. To
generate accurate microsegmentation policy, Cisco Tetration performs application dependency
mapping to discover the relationships between different application tiers and infrastructure
services. In addition, the platform supports "what-if" policy analysis using real-time data or
historical data to assist in the validation and risk assessment of policy application pre-
enforcement to ensure ongoing application availability.
The normalized microsegmentation policy can be enforced through the application workload itself
for a consistent approach to workload microsegmentation across any environment, including
virtualized, bare-metal, and container workloads running in any public cloud or any data center.
Once the microsegmentation policy is enforced, Cisco Tetration continues to monitor for
compliance deviations, ensuring the segmentation policy is up to date as the application behavior
change.
Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration-
analytics/solution-overview-c22-739268.pdf
QUESTION 261
Which factor must be considered when choosing the on-premise solution over the cloud-based
one?
A. With an on-premise solution, the provider is responsible for the installation and maintenance of
the product, whereas with a cloud-based solution, the customer is responsible for it
B. With a cloud-based solution, the provider is responsible for the installation, but the customer is
responsible for the maintenance of the product.
C. With an on-premise solution, the provider is responsible for the installation, but the customer is
responsible for the maintenance of the product.
D. With an on-premise solution, the customer is responsible for the installation and maintenance of
the product, whereas with a cloud-based solution, the provider is responsible for it.
Answer: D
QUESTION 262
Which term describes when the Cisco Firepower downloads threat intelligence updates from
Cisco Talos?
A. consumption
B. sharing
C. analysis
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 105
http://www.passleader.com
D. authoring
Answer: A
Explanation:
https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-
intelligencedirector
QUESTION 263
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging
is working as expected, but logs are not being received from the on-premise network, what action
will resolve this issue?
Answer: D
Explanation:
You can also monitor on-premises networks in your organizations using Cisco Stealthwatch
Cloud. In order to do so, you need to deploy at least one Cisco Stealthwatch Cloud Sensor
appliance (virtual or physical appliance).
QUESTION 264
What does Cisco AMP for Endpoints use to help an organization detect different families of
malware?
Answer: A
Explanation:
ETHOS is the Cisco file grouping engine. It allows us to group families of files together so if we
see variants of a malware, we mark the ETHOS hash as malicious and whole families of malware
are instantly detected.
QUESTION 265
What are two characteristics of Cisco DNA Center APIs? (Choose two)
Answer: DE
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 106
http://www.passleader.com
QUESTION 266
What is a benefit of conducting device compliance checks?
Answer: B
Explanation:
It helps AnyConnect agent to support newer additions. Once the AnyConnect agents retrieve this
support information, they check the latest definition information from the periodically updated se-
checks.xml file (which is published along with the se-rules.xml file in the se-templates.tar.gz
archive), and determine whether clients are compliant with the posture policies. Depending upon
what is supported by the library for a particular antivirus, antispyware, antimalware, disk
encryption, or patch management product, the appropriate requirements will be sent to the
AnyConnect agents for validating their existence, and the status of the particular products on the
clients during posture validation.
https://www.cisco.com/c/en/us/td/docs/security/ise/3-
0/admin_guide/b_ISE_admin_3_0/b_ISE_admin_30_compliance.html?bookSearch=true#id_1706
5
QUESTION 267
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 107
http://www.passleader.com
In which two ways does Easy Connect help control network access when used with Cisco
TrustSec? (Choose two)
A. It allows multiple security products to share information and work together to enhance security
posture in the network.
B. It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
C. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured
on the switch or the endpoint.
D. It integrates with third-party products to provide better visibility throughout the network.
E. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups
(PassiveID).
Answer: CE
Explanation:
QUESTION 268
A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on a
trusted interface. How does the switch behave in this situation?
Answer: A
QUESTION 269
An administrator is configuring a DHCP server to better secure their environment. They need to
be able to rate-limit the traffic and ensure that legitimate requests are not dropped.
How would this be accomplished?
Answer: A
Explanation:
You can't add entries to DHCP snooping database. It's wrong answer. The only case when you
create mapping of IP to MAC and VLAN and port is configuring "ip source guard" but it is not the
same as DHCP snooping.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 108
http://www.passleader.com
Unless you explicitly configure a rate limit on an interface, changing the trust state of the interface
also changes its rate limit to the default value for that trust state. After you configure the rate limit,
the interface retains the rate limit even when its trust state is changed
https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/www.cisco.com/content/dam/en/us/
td/docs/switches/lan/catalyst4500/XE35-
0XO/configuration/guide/dhcp.fm/jcr:content/renditions/config_dhcp.html.xml
QUESTION 270
Refer to the exhibit. What will happen when the Python script is executed?
Answer: C
QUESTION 271
Refer to the exhibit. When configuring a remote access VPN solution terminating on the Cisco
ASA, an administrator would like to utilize an external token authentication mechanism in
conjunction with AAA authentication using machine certificates. Which configuration item must be
modified to allow this?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 109
http://www.passleader.com
A. Group Policy
B. Method
C. SAML Server
D. DHCP Servers
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 110
http://www.passleader.com
QUESTION 272
An engineer has been tasked with implementing a solution that can be leveraged for securing the
cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB
and cloud cybersecurity platform. What should be used to meet these requirements?
A. Cisco Umbrella
B. Cisco Cloud Email Security
C. Cisco NGFW
D. Cisco Cloudlock
Answer: D
Explanation:
Cisco Cloudlock: Secure your cloud users, data, and applications with the cloud-native Cloud
Access Security Broker (CASB) and cloud cybersecurity platform.
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-web-security/at-
a-glancec45-738565.pdf
QUESTION 273
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and
integrate with other cloud solutions via an API. Which solution should be used to accomplish this
goal?
A. SIEM
B. CASB
C. Adaptive MFA
D. Cisco Cloudlock
Answer: D
Explanation:
+ Cisco Cloudlock continuously monitors cloud environments with a cloud Data Loss Prevention
(DLP) engine to identify sensitive information stored in cloud environments in violation of policy.
+ Cloudlock is API-based.
+ Incidents are a key resource in the Cisco Cloudlock application. They are triggered by the
Cloudlock policy engine when a policy detection criteria result in a match in an object (document,
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 111
http://www.passleader.com
field, folder, post, or file).
Reference: https://docs.umbrella.com/cloudlock-documentation/docs/endpoints
Note:
+ Security information and event management (SIEM) platforms collect log and event data from
security systems, networks and computers, and turn it into actionable security insights.
+ An incident is a record of the triggering of an alerting policy. Cloud Monitoring opens an incident
when a condition of an alerting policy has been met.
QUESTION 274
Why is it important to implement MFA inside of an organization?
Answer: C
Explanation:
Brute force attacks target getting user credentials by sending authentication requests
overwhelmingly. If no password failure policies are implemented this can result in credential theft.
MFA is used to protect user credentials following the principle of what you have (MFA token)
complemented by what you know (password). Brute force attack cannot be successful if MFA is
enabled.
QUESTION 275
A network administrator is configuring SNMPv3 on a new router. The users have already been
created; however, an additional configuration is needed to facilitate access to the SNMP views.
What must the administrator do to accomplish this?
Answer: A
Explanation:
To configure a Simple Network Management Protocol Version 3 (SNMPv3) server user, specify
an SNMP group or a table that maps SNMPv3 users to SNMP views.
QUESTION 276
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to
centrally manage cloud policies across these platforms.
Which software should be used to accomplish this goal?
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 112
http://www.passleader.com
Cisco Defense Orchestrator (CDO) is a cloud-based multi-device manager you can use to
manage security policy changes across various security products. This platform enables the
efficient management of policies in branch offices and other highly distributed environments to
achieve a consistent security implementation.
https://docs.defenseorchestrator.com/
QUESTION 277
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router.
The organization needs to ensure that the ISAKMP key on the hub is used only for terminating
traffic from the IP address of 172.19.20.24.
Which command on the hub will allow the administrator to accomplish this?
Answer: B
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-cr-
c4.html#wp6039879000
QUESTION 278
Drag and Drop Question
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 113
http://www.passleader.com
Explanation:
QUESTION 279
Drag and Drop Question
Drag and drop the solutions from the left onto the solution's benefits on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 114
http://www.passleader.com
QUESTION 280
Refer to the exhibit. An administrator is adding a new Cisco FTD device to their network and
wants to manage it with Cisco FMG. The Cisco FTD is not behind a NAT device.
Which command is needed to enable this on the Cisco FTD?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 115
http://www.passleader.com
A. configure manager add DONTRESOLVE kregistration key>
B. configure manager add <FMC IP address> <registration key> 16
C. configure manager add DONTRESOLVE <registration key> FTD123
D. configure manager add <FMC IP address> <registration key>
Answer: D
Explanation:
When you add a managed device to the Cisco FMC, you must provide an IP addresses of the
managed device along with a registration key for authentication. The Cisco FMC and the
managed device use the registration key and a NAT ID (instead of IP addresses in the case that
the device is behind NAT) to authenticate and authorize for initial registration.
QUESTION 281
An organization has a Cisco ESA set up with policies and would like to customize the action
assigned for violations.
The organization wants a copy of the message to be delivered with a message added to flag it as
a DLP violation.
Which actions must be performed in order to provide this capability?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 116
http://www.passleader.com
A. quarantine and alter the subject header with a DLP violation
B. deliver and add disclaimer text
C. deliver and send copies to other recipients
D. quarantine and send a DLP violation notification
Answer: D
Explanation:
QUESTION 282
Where are individual sites specified to be black listed in Cisco Umbrella?
A. application settings
B. content categories
C. destination lists
D. security settings
Answer: C
Explanation:
To block a URL, simply enter it into a blocked destination list, or create a new blocked destination
list just for URLs. To do this, navigate to Policies > Destination
Lists, expand a Destination list, add a URL and then click Save.
Reference:
https://support.umbrella.com/hc/en-us/articles/115004518146-Umbrella-Dashboard-New-
Features-Custom-blocked-URLs
QUESTION 283
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 117
http://www.passleader.com
Drag and Drop Question
Drag and drop the common security threats from the left onto the definitions on the right.
Answer:
QUESTION 284
What is the purpose of a Netflow version 9 template record?
Answer: C
Explanation:
QUESTION 285
What is the purpose of CA in a PKI?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 118
http://www.passleader.com
Answer: C
Explanation:
QUESTION 286
When choosing an algorithm to us what should be considered about Diffie Hellman and RSA for
key establishment?
Answer: C
Explanation:
QUESTION 287
Which category includes Dos Attacks?
A. virus attacks
B. trojan attacks
C. flood attacks
D. phishing attacks
Answer: C
QUESTION 288
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 119
http://www.passleader.com
Which service allows a user export application usage and performance statistics with Cisco
Application Visibility and control?
A. SNORT
B. 802.1X
C. SNMP
D. NetFlow
Answer: D
QUESTION 289
Which kind of API that is used with Cisco DNA Center provisions SSIDs, Qos policies, and
update software versions on switches?
A. integration
B. event
C. intent
D. multivendor
Answer: C
Explanation:
Cisco is moving towards intent based networking and DNA center is a new addition to the
solution offerings from Cisco.
QUESTION 290
Which parameter is required when configuring a Netflow exporter on a Cisco Router?
A. DSCP value
B. exporter name
C. source interface
D. exporter description
Answer: B
Explanation:
An example of configuring a NetFlow exporter is shown below:
flow exporter Exporter
destination 192.168.100.22
transport udp 2055
QUESTION 291
What are two advantages of using Cisco AnyConnect over DMVPN? (Choose two.)
Answer: CE
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 120
http://www.passleader.com
Cisco Anyconnect is a Remote access VPN client based solution where users can install the
client on their machines and can connect to the respective VPN devices (ASA/FTD/Router). In
order to secure connectivity for Anyconnect Users, one can also create custom access policies to
ensure proper conditions are met before access is granted to the VPN user.
QUESTION 292
A network engineer needs to select a VPN type that provides the most stringent security, multiple
security associations for the connections, and efficient VPN establishment with the least
bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this
environment?
Answer: C
Explanation:
IKEv2 Multi-SA
The IKEv2 Multi-SA feature allows an IKEv2 Dynamic Virtual Tunnel Interface (DVTI) session on
the IKEv2 responder to support multiple IPsec Security Associations (SA). The maximum number
of IPsec SAs per DVTI session is either obtained from AAA authorization or configured on the
IPsec profile. The value from AAA has a higher priority. Any change to the max-flow-limit
argument in the IPsec profile is not applied to the current session but is applied to subsequent
sessions. The IKEv2 Multi-SA feature makes the configuration of the IKEv2 profile in the IPsec
profile optional. This optional configuration allows IPsec DVTI sessions using the same virtual
template to have different IKEv2 profiles, thus saving the number of virtual template
configurations.
The IKEv2 Multi-SA feature allows multiple IPsec SAs that have non-any-any proxies. However,
when the IPsec SA proxies are any-any, a single IPsec SA is allowed.
QUESTION 293
Which algorithm is an NGE hash function?
A. HMAC
B. SHA-1
C. MD5
D. SHA-2
Answer: D
QUESTION 294
What is a capability of Cisco ASA Netflow?
A. It sends NetFlow data records from active and standby ASAs in an active standby failover pair.
B. It filters NSEL events based on traffic.
C. It logs ll event types only to the same collector.
D. It generates NSEL events even if the MPF is not configured.
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 121
http://www.passleader.com
QUESTION 295
Which type of encryption uses a public key and private Key?
A. asymmetric
B. symmetric
C. linear
D. nonlinear
Answer: A
QUESTION 296
What are two Trojan malware attacks? (Choose two)
A. rootkit
B. frontdoor
C. smurf
D. backdoor
E. sync
Answer: AD
Explanation:
https://us.norton.com/blog/malware/what-is-a-trojan#
QUESTION 297
Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)
Answer: AD
Explanation:
Integration API (Westbound)
Integration capabilities are part of Westbound interfaces. To meet the need to scale and
accelerate operations in modern data centers, IT operators require intelligent, end-to-end work
flows built with open APIs.
The Cisco DNA Center platform provides mechanisms for integrating Cisco DNA Assurance
workflows and data with thirdparty IT Service Management (ITSM) solutions.
Reference: https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-
platformoverview/events-andnotifications-eastbound
Westbound - Integration APIs
Cisco DNA Center platform can power end-to-end IT processes across the value chain by
integrating various domains such as ITSM, IPAM, and reporting. By leveraging the REST-based
Integration Adapter APIs, bidirectional interfaces can be built to allow the exchange of contextual
information between Cisco DNA Center and the external, third-party IT systems. The westbound
APIs provide the capability to publish the network data, events and notifications to the external
systems and consume information in Cisco DNA Center from the connected systems.
Reference: https://blogs.cisco.com/networking/with-apis-cisco-dna-center-can-improve-your-
competitive-advantage
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 122
http://www.passleader.com
QUESTION 298
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and
supports ACK and sequence. Which protocol accomplishes this goal?
A. AES-192
B. IKEv1
C. AES-256
D. ESP
Answer: D
Explanation:
QUESTION 299
What are two features of NetFlow flow monitoring? (Choose two.)
Answer: CD
QUESTION 300
Which cryptographic process provides origin confidentiality, integrity, and origin authentication for
packets?
A. ESP
B. AH
C. IKEv1
D. IKEv2
Answer: A
QUESTION 301
What is a benefit of performing device compliance?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 123
http://www.passleader.com
A. providing multi-factor authentication
B. device classification and authorization
C. providing attribute-driven policies
D. verification of the latest OS patches
Answer: D
Explanation:
https://www.cisco.com/c/en/us/products/collateral/security/identity-services-
engine/data_sheet_c78-656174.html
QUESTION 302
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
A. to ensure that assets are secure from malicious links on and off the corporate network
B. to protect the endpoint against malicious file transfers
C. to establish secure VPN connectivity to the corporate network
D. to enforce posture compliance and mandatory software
Answer: A
Explanation:
QUESTION 303
A company discovered an attack propagating through their network via a file. A custom file policy
was created in order to track this in the future and ensure no other endpoints execute the infected
file. In addition, it was discovered during testing that the scans are not detecting the file as an
indicator of compromise. What must be done in order to ensure that the created is functioning as
it should?
A. Create an IP block list for the website from which the file was downloaded
B. Block the application that the file was using to open
C. Upload the hash for the file into the policy
D. Send the file to Cisco Threat Grid for dynamic analysis
Answer: C
Explanation:
Override File Disposition Using Custom Lists
If a file has a disposition in the AMP cloud that you know to be incorrect, you can add the file’s
SHA-256 value to a file list that overrides the disposition from the cloud:
To treat a file as if the AMP cloud assigned a clean disposition, add the file to the clean list.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 124
http://www.passleader.com
To treat a file as if the AMP cloud assigned a malware disposition, add the file to the custom
detection list.
On subsequent detection, the device either allows or blocks the file without reevaluating the file's
disposition. You can use the clean list or custom detection list per file policy.
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-
guide-v623/file_policies_and_advanced_malware_protection.html
QUESTION 304
A network engineer must monitor user and device behavior within the on-premises network. This
data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis.
What must be done to meet this requirement using the Ubuntu-based VM appliance deployed in a
VMware-based hypervisor?
Answer: D
Explanation:
The Stealthwatch Cloud Private Network Monitoring (PNM) Sensor is an extremely flexible piece
of technology, capable of being utilized in a number of different deployment scenarios. It can be
deployed as a complete
Ubuntu based virtual appliance on different hypervisors (e.g. -VMware, VirtualBox). It can be
deployed on hardware running a number of different Linux-based operating systems.
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/LTRSEC-
2240-LG2.pdf
QUESTION 305
What is a difference between a DoS attack and DDos attack?
A. A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS
attack is where a computer is used to flood a server with TCP packets
B. A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas
a DDoS attack is where a computer is used to flood multiple servers that are distributed over a
LAN
C. A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas
a DDoS attack is where multiple systems target a single system with a DoS attack.
D. A DoS attack is where a computer is used to flood a server with TCP packets whereas a DDoS
attack is where a computer is used to flood a server with UDP packets
Answer: C
QUESTION 306
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect
anomalies in the traffic from industrial systems. What must be done to meet these requirements?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 125
http://www.passleader.com
Answer: C
Explanation:
DNP3 is a SCADA Protocol which in turn is widly used in the industrial network world.
The DNP3 preprocessor detects anomalies in DNP3 traffic and decodes the DNP3 protocol for
processing by the rules engine, which uses DNP3 keywords to access certain protocol fields.
https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-
guide-v63/scada_preprocessors.html
QUESTION 307
What is the benefit of integrating cisco ISE with a MDM solution?
Answer: B
Explanation:
Cisco ISE queries the MDM servers for the necessary device attributes to create ACLs that
provide network access control for those devices.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-
4/admin_guide/b_ISE_admin_guide_24/m_ise_interoperability_mdm.html
QUESTION 308
Refer to the exhibit. A network engineer is testing NTP authentication and realizes that any
device synchronizes time with this router and that NTP authentication is not enforced.
What is the cause of this issue?
A. The hashing algorithm that was used was MD5 which is unsupported.
B. The key was configured in plain text.
C. NTP authentication is not enabled.
D. The router was not rebooted after the NTP configuration updated
Answer: C
QUESTION 309
Which posture assessment requirement provides options to the client for remediation and
requires the remediation within a certain timeframe?
A. Audio
B. Mandatory
C. Optional
D. Visibility
Answer: B
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 126
http://www.passleader.com
https://www.cisco.com/c/en/us/td/docs/security/ise/2-
2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010111.html#ID873
QUESTION 310
An administrator configures new authorization policies within Cisco ISE and has difficulty profiling
the devices. Attributes for the new Cisco IP phones that are profiled based on the RADIUS
authentication are seen, however the attributes for CDP or DHCP are not.
What should the administrator do to address this issue?
A. Configure the ip dhcp snooping trust command on the DHCP interfaces to get the information to
Cisco ISE
B. Configure the device sensor feature within the switch to send the appropriate protocol information
C. Configure a service template within the switch to standardize the port configurations so that the
correct information is sent to Cisco ISE
D. Configure the authentication port-control auto feature within Cisco ISE to identify the devices that
are trying to connect
Answer: B
Explanation:
Device sensor is a feature of access devices. It allows to collect information about connected
endpoints.
Mostly, information collected by Device Sensor can come from the following protocols:
+ Cisco Discovery Protocol (CDP)
+ Link Layer Discovery Protocol (LLDP)
+ Dynamic Host Configuration Protocol (DHCP)
Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/200292-
ConfigureDevice-Sensor-for-ISE-Profilin.html
QUESTION 311
What is a functional difference between a Cisco ASA and Cisco IOS router with Zone-Based
Policy Firewall?
A. The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default, whereas the
Cisco ASA starts out by allowing all traffic until rules are added
B. The Cisco IOS router with Zone-Based Policy Firewall can be configured for high availability,
whereas the Cisco ASA cannot
C. The Cisco ASA can be configured for high availability whereas the Cisco IOS router with Zone-
Based Policy Firewall cannot
D. The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-Based Policy
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 127
http://www.passleader.com
Firewall starts out by allowing all traffic, even on untrusted interfaces.
Answer: A
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/ios-firewall/98628-zone-design-
guide.html#anc15
QUESTION 312
A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their
organization to allow for additional protocols to terminate network devices with. They currently
only have one policy established and need the new policy to be a backup in case some devices
cannot support the stronger algorithms listed in the primary policy.
What should be done in order to support this?
A. Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy
B. Make the priority for the new policy 5 and the primary policy 1.
C. Change the encryption to AES* to support all AES algorithms in the primary policy
D. Make the priority for the primary policy 10 and the new policy 1
Answer: B
Explanation:
All IKE policies on the device are sent to the remote peer regardless of what is in the selected
policy section.
The first IKE Policy matched by the remote peer will be selected for the VPN connection. Choose
which policy is sent first using the priority field. Priority 1 will be sent first.
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-
protocols/215470- site-to-site-vpn-configuration-on-ftd-ma.html
QUESTION 313
Which cloud model is a collaborative effort where infrastructure is shared and jointly accessed by
several organizations from a specific group?
A. private
B. hybrid
C. community
D. public
Answer: C
Explanation:
A community cloud model is a collaborative effort where infrastructure is shared and jointly
accessed by several organizations from a specific group that share specific computing concerns
such as, security, compliance or jurisdiction considerations.
QUESTION 314
A customer has various external HTTP resources available including Intranet Extranet and
Internet, with a proxy configuration running in explicit mode.
Which method allows the client desktop browsers to be configured to select when to connect
direct or when to use the proxy?
A. Transport mode
B. Forward file
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 128
http://www.passleader.com
C. PAC file
D. Bridge mode
Answer: C
Explanation:
QUESTION 315
An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. The default
management port conflicts with other communications on the network and must be changed.
What must be done to ensure that all devices can communicate together?
Answer: D
Explanation:
Securely communicate between appliances in a deployment.
If you change this port, you must change it for all appliances in the deployment. We recommend
you keep the default.
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config-
guide-v60/Security__Internet_Access__and_Communication_Ports.html
8305/tcp
QUESTION 316
Refer to the exhibit. What does the Python script accomplish?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 129
http://www.passleader.com
A. It lists the LDAP users from the external identity store configured on Cisco ISE
B. It authenticates to a Cisco ISE server using the username of ersad
C. It allows authentication with TLSv1 SSL protocol
D. It authenticates to a Cisco ISE with an SSH connection
Answer: B
Explanation:
This is part of the get-all-internal-users.py script, to extract all internal users from ISE.
https://developer.cisco.com/docs/identity-services-engine/v1/#!internal-users-get-all-users/get-all-
internal-userspy-source-code
QUESTION 317
Which component of cisco umbrella architecture increases reliability of the service?
A. Anycast IP
B. AMP Threat grid
C. Cisco Talos
D. BGP route reflector
Answer: A
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 130
http://www.passleader.com
Explanation:
Anycast would increase the resiliency of the product. Reliability and resiliency are different. With
Cisco Talos, the reliability of Cisco Umbrella threat detection is increased.
QUESTION 318
An organization wants to use Cisco FTD or Cisco ASA devices Specific URLs must be blocked
from being accessed via the firewall, which requires that the administrator input the bad URL
categories that the organization wants blocked into the access policy.
Which solution should be used to meet this requirement?
A. Cisco ASA because it enables URL filtering and blocks malicious URLs by default, whereas Cisco
FTD does not
B. Cisco ASA because it includes URL filtering in the access control policy capabilities whereas
Cisco FTD does not.
C. Cisco FTD because it includes URL filtering in the access control policy capabilities whereas
Cisco ASA does not.
D. Cisco FTD because it enables URL filtering and blocks malicious URLs by default, whereas Cisco
ASA does not
Answer: C
Explanation:
URL Filtering is not enabled by default on FTD. Adding the license enables the Enable URL
Filtering option, which then is required to be enabled by the admin.
https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config-
guide-v63/url_filtering.html#id_74537
QUESTION 319
Which type of DNS abuse exchanges data between two computers even when there is no direct
connection?
A. malware installation
B. command-and-control communication
C. network footprinting
D. data exfiltration
Answer: D
Explanation:
Malware installation: This may be done by hijacking DNS queries and responding with malicious
IP addresses.
Command & Control communication: As part of lateral movement, after an initial compromise,
DNS communications is abused to communicate with a C2 server. This typically involves making
periodic DNS
queries from a computer in the target network for a domain controlled by the adversary. The
responses contain encoded messages that may be used to perform unauthorized actions in the
target network.
Network footprinting: Adversaries use DNS queries to build a map of the network. Attackers live
off the terrain so developing a map is important to them.
Data theft (exfiltration): Abuse of DNS to transfer data; this may be performed by tunneling other
protocols like FTP, SSH through DNS queries and responses. Attackers make multiple DNS
queries from a compromised computer to a domain owned by the adversary. DNS tunneling can
also be used for executing commands and transferring malware into the target network.
Reference: https://www.netsurion.com/articles/5-types-of-dns-attacks-and-how-to-detect-them
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 131
http://www.passleader.com
QUESTION 320
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or
quarterly in the applications?
A. orchestration
B. CI/CD pipeline
C. container
D. security
Answer: B
Explanation:
Unlike the traditional software life cycle, the CI/CD implementation process gives a weekly or
daily update instead of monthly or quarterly. The fun part is customers won’t even realize the
update is in their applications, as they happen on the fly.
https://devops.com/how-to-implement-an-effective-ci-cd-pipeline/amp/
QUESTION 321
An organization deploys multiple Cisco FTD appliances and wants to manage them using one
centralized solution. The organization does not have a local VM but does have existing Cisco
ASAs that must migrate over to Cisco FTDs.
Which solution meets the needs of the organization?
A. Cisco FMC
B. CSM
C. Cisco FDM
D. CDO
Answer: A
Explanation:
According to Cisco, if you want to migrate your ASA to FTD and want to manage them both
through "CDO and FDM" then use (CDO), but if you want to migrate ASA to FTD and manage
both in the same time (Centralized) then use FMC.
https://www.cisco.com/c/en/us/td/docs/security/firepower/migration-tool/migration-guide-
CDO/ASA2FTD_Using_CDO/ASA2FTD_with_FP_Migration_Tool_cdo_chapter_011.html
QUESTION 322
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443. The
organization requires that a network device with specific WSA integration capabilities be
configured to send the traffic to the WSA to proxy the requests and increase visibility, while
making this invisible to the users. What must be done on the Cisco WSA to support these
requirements?
A. Configure transparent traffic redirection using WCCP in the Cisco WSA and on the network
device
B. Configure active traffic redirection using WPAD m the Cisco WSA and on the network device
C. Use the Layer 4 setting in the Cisco WSA to receive explicit forward requests from the network
device
D. Use PAC keys to allow only the required network devices to send the traffic to the Cisco WSA
Answer: A
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 132
http://www.passleader.com
QUESTION 323
An organization configures Cisco Umbrella to be used for its DNS services. The organization
must be able to block traffic based on the subnet that the endpoint is on, but sees only the
requests from its public IP addresses instead of each internal IP address. What must be done to
resolve this issue?
A. Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of
each IP address
B. Use the tenant control features to identify each subnet being used and track the connections
within the Cisco Umbrella dashboard
C. Install the Microsoft Active Directory Connector to give IP address information stitched to the
requests m the Cisco Umbrella dashboard
D. Configure an internal domain within Cisco Umbrella to help identify each address and create
policy from the domains
Answer: A
Explanation:
https://docs.umbrella.com/deployment-umbrella/docs/internal-networks-setup-guide
QUESTION 324
An organization wants to secure data in a cloud environment. Its security model requires that all
users be authenticated and authorized. Security configuration and posture must be continuously
validated before access is granted or maintained to applications and data. There is also a need to
allow certain application traffic and deny all other traffic by default. Which technology must be
used to implement these requirements?
Answer: B
Explanation:
Software defined access provides Microsegmentation capabilities and centralised administration
of which the Cisco ISE is part, hence the user part of the question.
https://www.ciscopress.com/articles/article.asp?p=3100056&seqNum=3
QUESTION 325
Which capability is provided by application visibility and control?
A. reputation filtering
B. data obfuscation
C. data encryption
D. deep packet inspection
Answer: D
QUESTION 326
How does Cisco Workload Optimization Manager help mitigate application performance issues?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 133
http://www.passleader.com
A. It deploys an AWS Lambda system
B. It automates resource resizing.
C. It optimizes a flow path
D. it sets up a workload forensic score
Answer: B
Explanation:
Workload Optimization Manager continuously analyzes workload consumption, costs, and
compliance constraints and automatically allocates resources in real time.
https://www.cisco.com/c/dam/en/us/products/collateral/servers-unified-computing/ucs-s-series-
storage-servers/whitepaper-c11-741392.pdf
QUESTION 327
An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues
with the configuration. The simple detection mechanism is configured, but the dashboard
indicates that the hash is not 64 characters and is non-zero. What is the issue?
Answer: C
Explanation:
QUESTION 328
What is a benefit of using telemetry over SNMP to configure new routers for monitoring
purposes?
A. Telemetry uses a pull, method which makes it more reliable than SNMP
B. Telemetry uses push and pull, which makes it more scalable than SNMP
C. Telemetry uses a push method which makes it faster than SNMP
D. Telemetry uses push and pull which makes it more secure than SNMP
Answer: C
Explanation:
SNMP polling can often be in the order of 5-10 minutes, CLIs are unstructured and prone to
change which can often break scripts.
The traditional use of the pull model, where the client requests data from the network does not
scale when what you want is near real-time data.
Moreover, in some use cases, there is the need to be notified only when some data changes, like
interfaces status, protocol neighbors change etc.
Model-Driven Telemetry is a new approach for network monitoring in which data is streamed from
network devices continuously using a push model and provides near real-time access to
operational statistics
https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide/streaming-
telemetry
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 134
http://www.passleader.com
QUESTION 329
An organization wants to provide visibility and to identify active threats in its network using a VM.
The organization wants to extract metadata from network packet flow while ensuring that
payloads are not retained or transferred outside the network.
Which solution meets these requirements?
Answer: B
Explanation:
Private Network Monitoring (PNM) provides visibility and threat detection for the on-premises
network, delivered from the cloud as a SaaS solution. It is the perfect solution for organizations
who prefer SaaS products and desire better awareness and security in their on-premises
environments while reducing capital expenditure and
operational overhead. It works by deploying lightweight software in a virtual machine or server
that can
consume a variety of native sources of telemetry or extract metadata from network packet flow. It
encrypts this metadata and sends it to the Stealthwatch Cloud analytics platform for analysis.
Stealthwatch Cloud consumes metadata only. The packet payloads are never retained or
transferred outside the network.
This lab focuses on how to configure a Stealthwatch Cloud Private Network Monitoring (PNM)
Sensor, in order to provide visibility and effectively identify active threats, and monitors user and
device behavior within onpremises networks.
The Stealthwatch Cloud PNM Sensor is an extremely flexible piece of technology, capable of
being utilized in a number of different deployment scenarios. It can be deployed as a complete
Ubuntu based virtual appliance on different hypervisors (e.g. –VMware, VirtualBox). It can be
deployed on hardware running a number of different Linux-based operating systems.
Reference: https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/LTRSEC-
2240-LG2.pdf
QUESTION 330
What is a difference between GETVPN and iPsec?
Answer: B
Explanation:
GETVPN Simplifies branch-to-branch instantaneous communications - Ensures low latency and
jitter by enabling full-time, direct communications between sites, without requiring transport
through a central hub
Maximizes security - Provides encryption for MPLS networks while maintaining network
intelligence such as full-mesh connectivity, natural routing path, and quality of service (QoS)
Complies with governmental regulation and privacy laws - Helps you meet security compliance
and internal regulation by encrypting all WAN traffic
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 135
http://www.passleader.com
Offers management flexibility - Eliminates complex peer-to-peer key management with group
encryption keys
QUESTION 331
An administrator configures a new destination list in Cisco Umbrella so that the organization can
block specific domains for its devices.
What should be done to ensure that all subdomains of domain.com are blocked?
Answer: D
Explanation:
QUESTION 332
An organization wants to secure users, data, and applications in the cloud. The solution must be
API-based on operate as a cloud-native CASB. Which solution must be used for this
implementation?
Answer: D
QUESTION 333
Which attribute has the ability to change during the RADIUS CoA?
A. NTP
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 136
http://www.passleader.com
B. authorization
C. accessibility
D. membership
Answer: B
Explanation:
The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the
attributes of an authentication, authorization, and accounting (AAA) session after it is
authenticated.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-
sy/sec-usr-aaa-15-sy-book/sec-rad-coa.html
QUESTION 334
What is a difference between an XSS attack and an SQL injection attack?
A. SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist
in many different types of applications
B. XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist
in many different types of applications
C. SQL injection attacks are used to steal information from databases whereas XSS attacks are
used to redirect users to websites where attackers can steal data from them
D. XSS attacks are used to steal information from databases whereas SQL injection attacks are
used to redirect users to websites where attackers can steal data from them
Answer: C
QUESTION 335
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide
policy integration and deployment, and implement security policies with access lists?
A. VMware APIC
B. VMwarevRealize
C. VMware fusion
D. VMware horizons
Answer: B
QUESTION 336
Refer to the exhibit. How does Cisco Umbrella manage traffic that is directed toward risky
domains?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 137
http://www.passleader.com
A. Traffic is managed by the application settings, unhandled and allowed
B. Traffic is allowed but logged
C. Traffic is managed by the security settings and blocked.
D. Traffic is proxied through the intelligent proxy
Answer: C
QUESTION 337
Drag and Drop Question
Drag and Drop the cloud security assessment components from the left onto the definitions on
the right.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 138
http://www.passleader.com
Answer:
Explanation:
QUESTION 338
Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802. 1X deployment and
has difficulty with some endpoints gaining access. Most PCs and IP phones can connect and
authenticate using their machine certificate credentials; however, printers and video cameras
cannot. Based on the interface configuration provided, what must be done to get these devices
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 139
http://www.passleader.com
onto the network using Cisco ISE for authentication and authorization while maintaining security
controls?
A. Change the default policy in Cisco ISE to allow all devices not using machine authentication .
B. Enable insecure protocols within Cisco ISE in the allowed protocols configuration.
C. Configure authentication event fail retry 2 action authorize vlan 41 on the interface
D. Add mab to the interface configuration.
Answer: D
Explanation:
Printers, cameras, video conference devices, etc.. either don't have 802.1X supplicant or if they
have it, it could be difficult to manage.
So these devices are usually authenticated and authorized by Mac Authentication Bypass (MAB)
+ Profiling on ISE (profiling is classification of the devices by type, function, etc... ISE recognizes
devices like cameras / Cisco Phones / printers / ... and these attributes can be used in the ISE
policy to apply desired authorization to the endpoints)
QUESTION 339
An administrator is adding a new switch onto the network and has configured AAA for network
access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is
being rejected. Why is the ip radius source-interface command needed for this configuration?
A. Only requests that originate from a configured NAS IP are accepted by a RADIUS server
B. The RADIUS authentication key is transmitted only from the defined RADIUS source interface
C. RADIUS requests are generated only by a router if a RADIUS source interface is defined.
D. Encrypted RADIUS authentication requires the RADIUS source interface be defined
Answer: A
Explanation:
When the Radius policy is configured on the radius server, to prevent unauthorized devices from
matching the policy, NAS IP can be specified within the policy.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfrad.html#wp1027
454
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 140
http://www.passleader.com
QUESTION 340
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured
on all devices in the environment with the command ntp authentication-key 1 md5
Clsc427128380. There are two routers on the network that are configured as NTP servers for
redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative
time source.
What command must be configured on the new router to use 192.168.1.110 as its primary time
source without the new router attempting to offer time to existing devices?
Answer: C
Explanation:
system
ntp
server (dns-server-address | ip-address)
key key-id
prefer
source-interface interface-name
version number
vpn vpn-id
QUESTION 341
Refer to the exhibit. What does this Python script accomplish?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 141
http://www.passleader.com
A. It allows authentication with TLSv1 SSL protocol
B. It authenticates to a Cisco ISE with an SSH connection.
C. lt authenticates to a Cisco ISE server using the username of ersad
Answer: C
QUESTION 342
Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-
based container?
A. SDLC
B. Docker
C. Lambda
D. Contiv
Answer: D
Explanation:
With Contiv, cloud architects and IT admin teams can create, manage and consistently enforce
operational policies such as multi-tenant traffic isolation, microsegmentation, bandwidth
prioritization, latency requirements, and policies.
QUESTION 343
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 142
http://www.passleader.com
Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt
protection platform?
A. big data
B. storm centers
C. sandboxing
D. blocklisting
Answer: C
QUESTION 344
An organization wants to implement a cloud-delivered and SaaS-based solution to provide
visibility and threat detection across the AWS network. The solution must be deployed without
software agents and rely on AWS VPC flow logs instead.
Which solution meets these requirements?
Answer: A
Explanation:
https://www.cisco.com/c/en/us/products/security/stealthwatch-cloud/index.html
QUESTION 345
What is the difference between a vulnerability and an exploit?
Answer: B
QUESTION 346
Cisco SensorBase gathers threat information from a variety of Cisco products and services and
performs analytics to find pattern on threats. Which term describes this process?
A. deployment
B. consumption
C. authoring
D. sharing
Answer: D
Explanation:
Sharing telemetry data with the SensorBase Network to improve visibility of alerts and sensor
actions on a global scale"
https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/se
curity_manager/419/user/guide/CSMUserGuide/ipsglobe.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 143
http://www.passleader.com
Participating in the Cisco SensorBase Network means that Cisco collects data and shares that
information with the SensorBase threat management database. This data includes information
about request attributes and how the appliance handles requests.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa_14-1/User-
Guide/b_WSA_UserGuide_14_01/b_WSA_UserGuide_11_7_chapter_00.html
QUESTION 347
An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP
address of 1.1.1.1 using the flow record Stealthwatch406143794 command. Which additional
command is required to complete the flow record?
Answer: B
Explanation:
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-
stealth.pdf
QUESTION 348
Which Cisco platform processes behavior baselines, monitors for deviations, and reviews for
malicious processes in data center traffic and servers while performing software vulnerability
detection?
A. Cisco Tetration
B. Cisco ISE
C. Cisco AMP for Network
D. Cisco AnyConnect
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/white_papers/Cisco-IT-
Tetration-Deployment-Part-2-of-2.html
QUESTION 349
How is data sent out to the attacker during a DNS tunneling attack?
Answer: D
Explanation:
DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols
in DNS queries and responses. DNS tunneling often includes data payloads that can be added to
an attacked DNS server and used to control a remote server and applications.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 144
http://www.passleader.com
QUESTION 350
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco
ISE. The engineer wants to authenticate users using their account when they log into network
devices. Which action accomplishes this task?
A. Configure Cisco DUO with the external Active Directory connector and tie it to the policy set
within Cisco ISE.
B. Install and configure the Cisco DUO Authentication Proxy and configure the identity source
sequence within Cisco ISE
C. Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.
D. Modify the current policy with the condition MFASourceSequence DUO=true in the
authorization conditions within Cisco ISE
Answer: B
Explanation:
You would have to authenticate first successfully before DUO is triggered for MFA, DUO would
not handle authentication directly.
https://community.cisco.com/t5/security-documents/duo-mfa-integration-with-ise-for-tacacs-
device-administration/ta-p/3881767
QUESTION 351
A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific
MD5 signatures. The configuration is created in the simple detection policy section, but it does
not work. What is the reason for this failure?
A. The administrator must upload the file instead of the hash for Cisco AMP to use.
B. The MD5 hash uploaded to the simple detection policy is in the incorrect format
C. The APK must be uploaded for the application that the detection is intended
D. Detections for MD5 signatures must be configured in the advanced custom detection policies
Answer: D
Explanation:
Advanced Custom Detections are like traditional antivirus signatures, but they are written by the
user. These signatures can inspect various aspects of a file and have different signature formats.
Some of the available signature formats are:
• MD5 signatures
• MD5, PE section-based signatures
• File body-based signatures
• Extended signature format (offsets, wildcards, regular expressions)
• Logical signatures
• Icon signatures
QUESTION 352
An organization is selecting a cloud architecture and does not want to be responsible for patch
management of the operating systems.
Why should the organization select either Platform as a Service or Infrastructure as a Service for
this environment?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 145
http://www.passleader.com
Answer: C
Explanation:
https://www.cisco.com/c/en/us/solutions/cloud/what-is-cloud-computing.html#~cloud-computing-
services
QUESTION 353
An administrator is adding a new Cisco ISE node to an existing deployment.
What must be done to ensure that the addition of the node will be successful when inputting the
FQDN?
A. Change the IP address of the new Cisco ISE node to the same network as the others.
B. Make the new Cisco ISE node a secondary PAN before registering it with the primary.
C. Open port 8905 on the firewall between the Cisco ISE nodes
D. Add the DNS entry for the new Cisco ISE node into the DNS server
Answer: D
Explanation:
Enter the DNS-resolvable fully qualified domain name (FQDN) of the standalone node that you
are going to register (in the format hostname.domain-name, for example, abc.xyz.com). The
FQDN of the primary PAN and the node being registered must be resolvable from each other.
https://www.cisco.com/c/en/us/td/docs/security/ise/2-
7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_deployment.html
QUESTION 354
Refer to the exhibit. What will occur when this device tries to connect to the port?
A. 802.1X will not work, but MAB will start and allow the device on the network.
B. 802.1X will not work and the device will not be allowed network access
C. 802.1X will work and the device will be allowed on the network
D. 802.1X and MAB will both be used and ISE can use policy to determine the access level
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 146
http://www.passleader.com
Answer: C
Explanation:
Even with the new style policy maps & service polices (IBNS v2) you still need mab enabling on
the switch port.
QUESTION 355
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information
before gaining access. The Cisco ESA must also join a cluster machine using preshared keys.
What must be configured to meet these requirements?
A. Enable two-factor authentication through a RADIUS server and then join the cluster by using
the Cisco ESA CLI.
B. Enable two-factor authentication through a RADIUS server and then join the cluster by using
the Cisco ESA GUI
C. Enable two-factor authentication through a TACACS+ server and then join the cluster by using
the Cisco ESA GUI.
D. Enable two-factor authentication through a TACACS+ server and then join the cluster by using
the Cisco ESA CLI
Answer: A
Explanation:
You cannot create or join a cluster from the Graphical User Interface (GUI). You must use the
Command Line Interface (CLI) to create, join, or configure clusters of machines. Once you have
created a cluster, you can change configuration settings from either the GUI or the CLI.
Although you cannot create or join clusters or administer cluster specific settings from the GUI
(the equivalent of the clusterconfig command), you can browse machines in the cluster, create,
delete, copy, and move settings among the cluster, groups, and machines (that is, perform the
equivalent of the clustermode and clusterset commands) from within the GUI.
https://www.cisco.com/c/ja_jp/td/docs/security/esa/esa11-
0/user_guide_fs/b_ESA_Admin_Guide_fs/b_ESA_Admin_Guide_fs_chapter_0101000.html
QUESTION 356
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
A. server farm
B. perimeter
C. core
D. East-West gateways
Answer: B
Explanation:
EDR focuses primarily on detecting advanced threats, those designed to evade front-line
defenses and have successfully entered the environment. An EPP focuses solely on prevention
at the perimeter. It is difficult, if not impossible, for an EPP to block 100 percent of threats. A
holistic endpoint security solution deploys both EPP and EDR capabilities.
QUESTION 357
Refer to the exhibit. An engineer is implementing a certificate based VPN.
What is the result of the existing configuration?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 147
http://www.passleader.com
A. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2
authorization policy.
B. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2
SA successfully
C. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER
D. The OU of the IKEv2 peer certificate is set to MANGLER
Answer: A
Explanation:
Configuring the IKEv2 Name Mangler
Perform this task to specify the IKEv2 name mangler, which is used to derive a name for
authorization requests and obtain AAA preshared keys. The name is derived from specified
portions of different forms of remote IKE identities or the EAP identity.
enable
configure terminal
crypto ikev2 name-mangler mangler-name
dn {common-name | country | domain | locality | organization | organization-unit | state}
eap {all | dn {common-name | country | domain | locality | organization | organization-unit | state} |
prefix | suffix {delimiter {. | @ | \}}}
email {all | domain | username}
fqdn {all | domain | hostname}
end
dn = Derives the name from any of the noted fields in the remote identity of type DN
common-name
country
domain
locality
organization
organization-unit
state
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/xe-16-10/sec-
flex-vpn-xe-16-10-book/sec-cfg-flex-serv.html=
QUESTION 358
What is a benefit of using Cisco CWS compared to an on-premises Cisco WSA?
A. Cisco CWS eliminates the need to backhaul traffic through headquarters for remote workers
whereas Cisco WSA does not
B. Cisco CWS minimizes the load on the internal network and security infrastructure as
compared to Cisco WSA.
C. URL categories are updated more frequently on Cisco CWS than they are on Cisco WSA
D. Content scanning for SAAS cloud applications is available through Cisco CWS and not
available through Cisco WSA
Answer: A
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 148
http://www.passleader.com
WSA
• Mobile User Security improves integration with VPN Headend ASA
• Client web traffic must be tunneled back to HQ
CWS
• Remote sites can utilise CWS directly. No VPN Backhaul!
• On-the-Go users are filtered and secured direct to CWS infrastructure
• Consistent policy applied whether in the office or not
https://www.ciscolive.com/c/dam/r/ciscolive/apjc/docs/2018/pdf/BRKSEC-2042.pdf
QUESTION 359
What is the term for having information about threats and threat actors that helps mitigate harmful
events that would otherwise compromise networks or systems?
Answer: D
Explanation:
https://en.wikipedia.org/wiki/Cyber_threat_intelligence
QUESTION 360
An organization has a requirement to collect full metadata information about the traffic going
through their AWS cloud services. They want to use this information for behavior analytics and
statistics. Which two actions must be taken to implement this requirement? (Choose two.)
Answer: DE
Explanation:
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/cloud/configuration/Public_Clou
d_Monitoring_for_AWS_Quick_Start_Guide_DV_2_0.pdf
QUESTION 361
What is the function of the crypto isakmp key cisc123456789 address 192.168.50.1
255.255.255.255 command when establishing an IPsec VPN tunnel?
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 149
http://www.passleader.com
QUESTION 362
An organization wants to improve its cybersecurity processes and to add intelligence to its data.
The organization wants to utilize the most current intelligence data for URL filtering, reputations,
and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA.
What must be done to accomplish these objectives?
A. Create a Cisco pxGrid connection to NIST to import this information into the security products
for policy use
B. Create an automated download of the Internet Storm Center intelligence feed into the Cisco
FTD and Cisco WSA databases to tie to the dynamic access control policies.
C. Download the threat intelligence feed from the IETF and import it into the Cisco FTD and
Cisco WSA databases
D. Configure the integrations with Talos Intelligence to take advantage of the threat intelligence
that it provides.
Answer: D
QUESTION 363
A network security engineer must export packet captures from the Cisco FMC web browser while
troubleshooting an issue. When navigating to the address Error! Hyperlink reference not valid.
IP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file.
Which action must the engineer take to resolve this issue?
Answer: D
QUESTION 364
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose
two.)
Answer: BC
QUESTION 365
An engineer needs to add protection for data in transit and have headers in the email message.
Which configuration is needed to accomplish this goal?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 150
http://www.passleader.com
D. Enable flagged message handling
Answer: B
Explanation:
AsyncOS supports using encryption to secure inbound and outbound email. To use this feature,
you create an encryption profile that specifies characteristics of the encrypted message and
connectivity information for the key server. The key server may either be:
The Cisco Registered Envelope Service (managed service), or An Cisco Encryption appliance
(locally managed server).
QUESTION 366
How does a cloud access security broker function?
Answer: B
Explanation:
https://www.cisco.com/c/en_in/products/security/cloudlock/index.html#~stickynav=2
QUESTION 367
An engineer integrates Cisco FMC and Cisco ISE using pxGrid.
Which role is assigned for Cisco FMC?
A. client
B. server
C. controller
D. publisher
Answer: D
QUESTION 368
Which configuration method provides the options to prevent physical and virtual endpoint devices
that are in the same base EPG or uSeg from being able to communicate with each other with
Vmware VDS or Microsoft vSwitch?
A. inter-EPG isolation
B. inter-VLAN security
C. intra-EPG isolation
D. placement in separate EPGs
Answer: C
Explanation:
Intra-EPG Isolation for VMware VDS or Microsoft Hyper-V Virtual Switch
Intra-EPG Isolation is an option to prevent physical or virtual endpoint devices that are in the
same base EPG or microsegmented (uSeg) EPG from communicating with each other. By
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 151
http://www.passleader.com
default, endpoint devices included in the same EPG are allowed to communicate with one
another. However, conditions exist in which total isolation of the endpoint devices from on another
within an EPG is desirable. For example, you may want to enforce intra-EPG isolation if the
endpoint VMs in the same EPG belong to multiple tenants, or to prevent.
QUESTION 369
Drag and Drop Question
Drag and drop the security solutions from the left onto the benefits they provide on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 152
http://www.passleader.com
QUESTION 370
Which statement describes a serverless application?
A. The application delivery controller in front of the server farm designates on which server the
application runs each time.
B. The application runs from an ephemeral, event-triggered, and stateless container that is fully
managed by a cloud provider.
C. The application is installed on network equipment and not on physical servers.
D. The application runs from a containerized environment that is managed by Kubernetes or Docker
Swarm.
Answer: B
QUESTION 371
Which baseline form of telemetry is recommended for network infrastructure devices?
A. SDNS
B. NetFlow
C. passive taps
D. SNMP
Answer: D
QUESTION 372
In which scenario is endpoint-based security the solution?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 153
http://www.passleader.com
C. performing signature-based application control
D. inspecting a password-protected archive
Answer: C
QUESTION 373
Refer to the exhibit. What is the result of the Python script?
A. It uses the POST HTTP method to obtain a username and password to be used for
authentication.
B. It uses the POST HTTP method to obtain a token to be used for authentication.
C. It uses the GET HTTP method to obtain a token to be used for authentication.
D. It uses the GET HTTP method to obtain a username and password to be used for authentication
Answer: B
QUESTION 374
Why is it important to patch endpoints consistently?
Answer: B
QUESTION 375
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure
that traffic is inspected without alerting end-users. Which action accomplishes this goal?
Answer: D
Explanation:
Intelligent Proxy with SSL Decryption - If a domain is proxied, the Cisco Umbrella root certificate
must be installed to decrypt HTTPS traffic instead of the browser presenting an error page.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 154
http://www.passleader.com
QUESTION 376
What is the purpose of joining Cisco WSAs to an appliance group?
Answer: A
Explanation:
You can view the File Analysis details on the Service Status page of the new web interface of
your appliance. You must join all managed appliances to the same appliance group in order to
allow all content security appliances in your organization to display detailed results in the cloud
about files sent for analysis from any Cisco Email Security appliance or Cisco Web Security
appliance in your organization.
https://www.cisco.com/c/en/us/td/docs/security/security_management/sma/sma14-
0/b_sma_admin_guide_14_0/b_NGSMA_Admin_Guide_chapter_0111.html
QUESTION 377
Why should organizations migrate to an MFA strategy for authentication?
Answer: A
QUESTION 378
Which technology should be used to help prevent an attacker from stealing usernames and
passwords of users within an organization?
A. RADIUS-based REAP
B. fingerprinting
C. Dynamic ARP Inspection
D. multifactor authentication
Answer: C
QUESTION 379
For which type of attack is multifactor authentication an effective deterrent?
A. ping of death
B. phishing
C. teardrop
D. syn flood
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 155
http://www.passleader.com
QUESTION 380
Which Cisco cloud security software centrally manages policies on multiple platforms such as
Cisco ASA, Cisco Firepower, Cisco Meraki, and AWS?
Answer: A
QUESTION 381
Which Cisco security solution determines if an endpoint has the latest OS updates and patches
installed on the system?
Answer: D
QUESTION 382
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test
unknown sites for hidden advanced threats before allowing users to click them?
Answer: C
QUESTION 383
What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)
A. If the WSA host port is changed, the default port redirects web traffic to the correct port
automatically.
B. PAC files use if-else statements to determine whether to use a proxy or a direct connection for
traffic between the PC and the host.
C. The WSA hosts PAC files on port 9001 by default.
D. The WSA hosts PAC files on port 6001 by default.
E. By default, they direct traffic through a proxy when the PC and the host are on the same subnet.
Answer: BC
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/118082-qanda-wsa-
00.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 156
http://www.passleader.com
QUESTION 384
What is a description of microsegmentation?
Answer: B
QUESTION 385
Which Cisco WSA feature supports access control using URL categories?
Answer: C
Explanation:
Overview of Categorizing URL Transactions
Using policy groups, you can create secure policies that control access to web sites containing
questionable content. The sites that are blocked, allowed, or decrypted depend on the categories
you select when setting up category blocking for each policy group. To control user access based
on a URL category, you must enable Cisco Web Usage Controls.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01001.html
QUESTION 386
Which technology limits communication between nodes on the same network segment to
individual applications?
A. serverless infrastructure
B. microsegmentation
C. SaaS deployment
D. machine-to-machine firewalling
Answer: B
QUESTION 387
Which IETF attribute is supported for the RADIUS CoA feature?
A. 24 State
B. 30 Calling-Station-ID
C. 42 Acct-Session-ID
D. 81 Message-Authenticator
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 157
http://www.passleader.com
Answer: A
QUESTION 388
When a transparent authentication fails on the Web Security Appliance, which type of access
does the end user get?
A. guest
B. limited Internet
C. blocked
D. full Internet
Answer: A
Explanation:
If transparent authentication fails, you can configure how to handle the transaction: you can grant
the user guest access, or you can force an authentication prompt to appear to the user.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa_12-5/User-
Guide/b_WSA_UserGuide_12_5/b_WSA_UserGuide_11_7_chapter_0101.html
QUESTION 389
What are two ways that Cisco Container Platform provides value to customers who utilize cloud
service providers? (Choose two.)
Answer: AD
Explanation:
Cisco Container Platform is a turnkey, production-grade, extensible platform that enables you to
deploy and manage multiple Kubernetes clusters.
Cisco Container Platform is a single, turnkey, open-source solution that simplifies the deployment
and management of container clusters.
https://www.cisco.com/c/en/us/products/cloud-systems-management/container-
platform/index.html#~benefits
QUESTION 390
Which solution for remote workers enables protection, detection, and response on the endpoint
against known and unknown threats?
Answer: A
QUESTION 391
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 158
http://www.passleader.com
Which two actions does the Cisco Identity Services Engine posture module provide that ensures
endpoint security? (Choose two.)
Answer: DE
Explanation:
ISE posture assessment includes a set of rules in a security policy that define a series of checks
before an endpoint is granted access to the network. Posture assessment checks include the
installation of OS patches, host based firewall, antivirus and anti-malware software, disk
encryption and more.
QUESTION 392
What is an advantage of the Cisco Umbrella roaming client?
Answer: C
QUESTION 393
Which Cisco platform provides an agentless solution to provide visibility across the network
including encrypted traffic analytics to detect malware in encrypted traffic without the need for
decryption?
Answer: B
QUESTION 394
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
A. local WebAuth
B. central WebAuth
C. null WebAuth
D. guest
E. dual
Answer: AD
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 159
http://www.passleader.com
https://www.cisco.com/c/en/us/td/docs/security/ise/2-
7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_byod.html
QUESTION 395
What are two ways a network administrator transparently identifies users using Active Directory
on the Cisco WSA? (Choose two.)
Answer: BC
Explanation:
Transparently identify users with authentication realms – This option is available when one or
more authentication realms are configured to support transparent identification using one of the
following authentication servers:
Active Directory – Create an NTLM or Kerberos authentication realm and enable transparent user
identification. In addition, you must deploy a separate Active Directory agent such as Cisco’s
Context Directory Agent. For more information, see Transparent User Identification with Active
Directory.
LDAP – Create an LDAP authentication realm configured as an eDirectory, and enable
transparent user identification. For more information, see Transparent User Identification with
LDAP.
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html#con_1442362
QUESTION 396
Which two parameters are used for device compliance checks? (Choose two.)
Answer: CE
QUESTION 397
Drag and Drop Question
Drag and drop the posture assessment flow actions from the left into a sequence on the right.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 160
http://www.passleader.com
Answer:
QUESTION 398
Which system performs compliance checks and remote wiping?
A. MDM
B. ISE
C. AMP
D. OTP
Answer: A
QUESTION 399
An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from
the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?
A. single interface
B. multi-context
C. transparent
D. two-interface
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 161
http://www.passleader.com
Answer: D
QUESTION 400
A network engineer is tasked with configuring a Cisco ISE server to implement external
authentication against Active Directory.
What must be considered about the authentication requirements? (Choose two.)
A. RADIUS communication must be permitted between the ISE server and the domain controller.
B. The ISE account must be a domain administrator in Active Directory to perform JOIN operations.
C. Active Directory only supports user authentication by using MSCHAPv2.
D. LDAP communication must be permitted between the ISE server and the domain controller.
E. Active Directory supports user and machine authentication by using MSCHAPv2.
Answer: BE
Explanation:
LDAP communication should be allowed between the ISE and AD.
MS-CHAPv2—Cisco ISE supports user and machine authentication against Active Directory
using EAP-MSCHAPv2.
https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/217351-ad-
integration-for-cisco-ise-gui-and-cli.html
QUESTION 401
Which method of attack is used by a hacker to send malicious code through a web application to
an unsuspecting user to request that the victim's web browser executes the code?
A. buffer overflow
B. browser WGET
C. SQL injection
D. cross-site scripting
Answer: D
Explanation:
https://owasp.org/www-community/attacks/xss/
QUESTION 402
An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses
STIX and allows uploads and downloads of block lists?
A. consumption
B. sharing
C. editing
D. authoring
Answer: C
QUESTION 403
Which open standard creates a framework for sharing threat intelligence in a machine-digestible
format?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 162
http://www.passleader.com
A. OpenC2
B. OpenlOC
C. CybOX
D. STIX
Answer: B
Explanation:
OpenIOC is an open framework, meant for sharing threat intelligence information in a machine-
readable format.
https://cyware.com/educational-guides/cyber-threat-intelligence/what-is-open-indicators-of-
compromise-openioc-framework-ed9d
QUESTION 404
What are two functionalities of SDN Northbound APIs? (Choose two.)
Answer: AB
QUESTION 405
What is an advantage of network telemetry over SNMP polls?
A. accuracy
B. encapsulation
C. security
D. scalability
Answer: A
Explanation:
Telemetry provides detection capabilities up to microseconds accuracy which can report micro
changes in the network. SNMP is poll based with set amount of time. Anything in between polls
may be missed.
https://info.support.huawei.com/info-finder/encyclopedia/en/Telemetry.html
QUESTION 406
What are two functions of TAXII in threat intelligence sharing? (Choose two.)
Answer: BE
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 163
http://www.passleader.com
Explanation:
TAXII, short for Trusted Automated eXchange of Intelligence Information, defines how cyber
threat information can be shared via services and message exchanges. It is designed specifically
to support STIX information, which it does by defining an API that aligns with common sharing
models. The three principal models for TAXII include:
TAXII defines four services. Users can select and implement as many as they require, and
combine them for different sharing models.
QUESTION 407
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to
another physical host by using VMware vMotion. What is a requirement for both physical hosts?
Answer: C
Explanation:
https://www.cisco.com/c/dam/en/us/td/docs/security/content_security/virtual_appliances/Cisco_C
ontent_Security_Virtual_Appliance_Install_Guide.pdf
QUESTION 408
What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?
A. Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.
B. Cisco AMP for Endpoints prevents connections to malicious destinations, and Cisco Umbrella
works at the file level to prevent the initial execution of malware
C. Cisco AMP for Endpoints automatically researches indicators of compromise and confirms
threats and Cisco Umbrella does not
D. Cisco AMP for Endpoints prevents, detects, and responds to attacks before damage can be
done, and Cisco Umbrella provides the first line of defense against Internet threats
Answer: D
Explanation:
AMP for Endpoints provides a suite of response capabilities to quickly contain and eliminate
threats across all endpoints, before damage can be done.
Umbrella provides the first line of defence against the threats on the internet, protecting against
malware, phishing, and command and control callbacks wherever your users go.
https://blogs.cisco.com/security/prevent-detect-and-respond-with-cisco-amp-for-endpoints
https://learn-umbrella.cisco.com/webcasts/cisco-umbrella-first-line-of-defense-against-threats
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 164
http://www.passleader.com
QUESTION 409
What is the result of the ACME-Router(config)#login block-for 100 attempts 4 within 60 command
on a Cisco IOS router?
A. lf four log in attempts fail in 100 seconds, wait for 60 seconds to next log in prompt.
B. After four unsuccessful log in attempts, the line is blocked for 100 seconds and only permit IP
addresses are permitted in ACL 60.
C. After four unsuccessful log in attempts, the line is blocked for 60 seconds and only permit IP
addresses are permitted in ACL 100.
D. If four failures occur in 60 seconds, the router goes to quiet mode for 100 seconds.
Answer: D
Explanation:
The command above will BLOCK all connections to ACME-Router for 100 seconds if the
credentials are entered INCORRECTLY 4 times WITHIN a span of 60 seconds.
QUESTION 410
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment and must
route inbound email to Cisco CES addresses. Which DNS record must be modified to accomplish
this task?
A. CNAME
B. MX
C. SPF
D. DKIM
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/cloud-email-security/214812-configuring-
office-365-microsoft-with.html
QUESTION 411
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture?
(Choose two.)
A. Southbound APIs are used to define how SDN controllers integrate with applications.
B. Southbound interfaces utilize device configurations such as VLANs and IP addresses.
C. Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE.
D. Southbound APIs utilize CLI, SNMP, and RESTCONF.
E. Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices.
Answer: CD
Explanation:
https://www.cisco.com/c/dam/global/sr_rs/training-events/2016/cisco-day-2016/pdf/APIC-
EM_Vedran_Hafner.pdf
QUESTION 412
Refer to the exhibit. Which configuration item makes it possible to have the AAA session on the
network?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 165
http://www.passleader.com
A. aaa authentication login console ise
B. aaa authentication enable default enable
C. aaa authorization network default group ise
D. aaa authorization exec default ise
Answer: C
Explanation:
aaa authorization network default group ise ----> This authorizes policy based on successful
authentication
QUESTION 413
Refer to the exhibit. What is the function of the Python script code snippet for the Cisco ASA
REST API?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 166
http://www.passleader.com
A. adds a global rule into policies
B. changes the hostname of the Cisco ASA
C. deletes a global rule from policies
D. obtains the saved configuration of the Cisco ASA firewall
Answer: A
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 167
http://www.passleader.com
QUESTION 414
An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is
created already and is actively used by devices, using many of the default policy elements.
What else must be done to accomplish this task?
A. Add the specified addresses to the identities list and create a block action.
B. Create a destination list for addresses to be allowed or blocked.
C. Use content categories to block or allow specific addresses.
D. Modify the application settings to allow only applications to connect to required addresses.
Answer: B
Explanation:
https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists
QUESTION 415
An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site VPN
implementation. What must be understood before choosing a solution?
A. L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.
B. L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.
C. GRE over IPsec adds its own header, and L2TP does not.
D. GRE over IPsec cannot be used as a standalone protocol, and L2TP can.
Answer: A
Explanation:
L2TP is a Layer 2 protocol and GRE is a layer 3. IPSEC works at layer 3.
As per the options, L2TP is an ip packet encapsulation (since its a layer 2 protocol), and therefore
seems to be the best feasible correct option amongst the given choices; GRE over IPSEc is a
tunnelling protocol (basically used for VPN).
As per the question, which is asking in regards to "site to site VPN", L2TP cannot be used alone,
you will need IPSEC at layer 3 whereas GRE over IPSEC can be used to achieve that.
QUESTION 416
What is a benefit of using a multifactor authentication strategy?
Answer: D
QUESTION 417
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access
and must have the guest endpoints redirect to the guest portal for authentication and
authorization. While testing the policy, the engineer notices that the device is not redirected and
instead gets full guest access. What must be done for the redirect to work?
A. Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile
for the authorization policy line that the unauthenticated devices hit.
B. Use the track movement option within the authorization profile for the authorization policy line
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 168
http://www.passleader.com
that the unauthenticated devices hit.
C. Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization
profile for the authorization policy line that the unauthenticated devices hit.
D. Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks
section of the authorization profile for the authorization policy line that the unauthenticated
devices hit.
Answer: C
QUESTION 418
Which two solutions help combat social engineering and phishing at the endpoint level? (Choose
two.)
A. Cisco Umbrella
B. Cisco ISE
C. Cisco DNA Center
D. Cisco TrustSec
E. Cisco Duo Security
Answer: AE
QUESTION 419
Which role is a default guest type in Cisco ISE?
A. Monthly
B. Yearly
C. Contractor
D. Full-Time
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/ise/1-4-
1/admin_guide/b_ise_admin_guide_141/b_ise_admin_guide_141_chapter_01110.html
QUESTION 420
Which two methods must be used to add switches into the fabric so that administrators can
control how switches are added into DCNM for private cloud management? (Choose two.)
Answer: CD
Explanation:
https://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/prime-data-center-
network-manager/guide-c07-740626.html
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 169
http://www.passleader.com
QUESTION 421
Refer to the exhibit. All servers are in the same VLAN/Subnet. DNS Server-1 and DNS Server-2
must communicate with each other, and communicate with default gateway multilayer switch.
Which type of private VLAN ports should be configured to prevent communication and the file
server?
Answer: D
QUESTION 422
Refer to the exhibit. When creating an access rule for URL filtering, a network engineer adds
certain categories and individual URLs to block. What is the result of the configuration?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 170
http://www.passleader.com
A. Only URLs for botnets with reputation scores of 1-3 will be blocked.
B. Only URLs for botnets with a reputation score of 3 will be blocked.
C. Only URLs for botnets with reputation scores of 3-5 will be blocked.
D. Only URLs for botnets with a reputation score of 3 will be allowed while the rest will be
blocked.
Answer: A
QUESTION 423
Why is it important to have a patching strategy for endpoints?
Answer: C
QUESTION 424
An engineer is configuring Cisco Umbrella and has an identity that references two different
policies. Which action ensures that the policy that the identity must use takes precedence over
the second one?
A. Configure only the policy with the most recently changed timestamp.
B. Make the correct policy first in the policy order.
C. Place the policy with the most-specific configuration last in the policy order.
D. Configure the default policy to redirect the requests to the correct policy.
Answer: B
Explanation:
https://docs.umbrella.com/deployment-umbrella/docs/policy-precedence
QUESTION 425
Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 171
http://www.passleader.com
without needing Internet access?
Answer: C
QUESTION 426
What is the intent of a basic SYN flood attack?
Answer: B
Explanation:
https://www.fortinet.com/resources/cyberglossary/buffer-overflow
QUESTION 427
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify
and proxy traffic that is categorized as risky domains and may contain safe and malicious
content. Which action accomplishes these objectives?
A. Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for
those categories and below.
B. Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only
those categories.
C. Upload the threat intelligence database to Cisco Umbrella for the most current information on
reputations and to have the destination lists block them.
D. Create a new site within Cisco Umbrella to block requests from those categories so they can
be sent to the proxy device.
Answer: B
QUESTION 428
Which endpoint solution protects a user from a phishing attack?
Answer: D
QUESTION 429
What must be enabled to secure SaaS-based applications?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 172
http://www.passleader.com
A. modular policy framework
B. two-factor authentication
C. application security gateway
D. end-to-end encryption
Answer: D
Explanation:
https://www.fortunesoftit.com/9-best-practices-to-secure-saas-applications/
QUESTION 430
Refer to the exhibit. The DHCP snooping database resides on router R1, and dynamic ARP
inspection is configured only on switch SW2.
Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
A. P2 and P3 only
B. P5, P6, and P7 only
C. P1, P2, P3, and P4 only
D. P2, P3, and P6 only
Answer: D
QUESTION 431
An engineer is configuring device-hardening on a router in order to prevent credentials from being
seen if the router configuration was compromised. Which command should be used?
A. service password-encryption
B. username <username> privilege 15 password <password>
C. service password-recovery
D. username < username> password <password>
Answer: A
QUESTION 432
Which security solution protects users leveraging DNS-layer security?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 173
http://www.passleader.com
A. Cisco ISE
B. Cisco FTD
C. Cisco Umbrella
D. Cisco ASA
Answer: C
QUESTION 433
Which CoA response code is sent if an authorization state is changed successfully on a Cisco
IOS device?
A. CoA-NCL
B. CoA-NAK
C. CoA-ACK
D. CoA-MAB
Answer: C
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec-usr-aaa-
15-sy-book/sec-rad-coa.html
QUESTION 434
Which security solution uses NetFlow to provide visibility across the network, data center, branch
offices, and cloud?
A. Cisco CTA
B. Cisco Stealthwatch
C. Cisco Encrypted Traffic Analytics
D. Cisco Umbrella
Answer: B
QUESTION 435
How does a WCCP-configured router identify if the Cisco WSA is functional?
A. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer
transmitted to the router.
B. If an ICMP ping fails three consecutive times between a router and the WSA, traffic is no longer
transmitted to the WSA.
C. The WSA sends a Here-l-Am message every 10 seconds, and the router acknowledges with an I-
See-You message.
D. The router sends a Here-l-Am message every 10 seconds, and the WSA acknowledges with an I-
See-You message.
Answer: C
Explanation:
When the WCCP service is active on a web cache server (WSA in this case), it periodically sends
a WCCP HERE I AM broadcast or unicast message to the unit operating as a WCCP router.
If the information received in this message matches what is expected, the WCCP router replies
with a WCCP I SEE YOU message.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 174
http://www.passleader.com
QUESTION 436
Which solution supports high availability in routed or transparent mode as well as in northbound
and southbound deployments?
Answer: B
QUESTION 437
Which Cisco ASA Platform mode disables the threat detection features except for Advanced
Threat Statistics?
A. cluster
B. transparent
C. routed
D. multiple context
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/firewall/asa-96-firewall-
config/conns-threat.html#ID-2132-00000035
QUESTION 438
Which benefit does DMVPN provide over GETVPN?
A. DMVPN supports QoS, multicast, and routing, and GETVPN supports only QoS.
B. DMVPN is a tunnel-less VPN, and GETVPN is tunnel-based.
C. DMVPN supports non-IP protocols, and GETVPN supports only IP protocols.
D. DMVPN can be used over the public Internet, and GETVPN requires a private network.
Answer: D
QUESTION 439
An organization has DHCP servers set up to allocate IP addresses to clients on the LAN.
What must be done to ensure the LAN switches prevent malicious DHCP traffic while also
distributing IP addresses to the correct endpoints?
A. Configure Dynamic ARP Inspection and add entries in the DHCP snooping database
B. Configure DHCP snooping and set an untrusted interface for all clients
C. Configure Dynamic ARP Inspection and antispoofing ACLs in the DHCP snooping database
D. Configure DHCP snooping and set a trusted interface for the DHCP server
Answer: D
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 175
http://www.passleader.com
DHCP snooping acts like a firewall between untrusted hosts and DHCP servers. You use DHCP
snooping to differentiate between untrusted interfaces connected to the end user and trusted
interfaces connected to the DHCP server or another switch.
QUESTION 440
Which two parameters are used to prevent a data breach in the cloud? (Choose two.)
A. DLP solutions
B. strong user authentication
C. encryption
D. complex cloud-based web proxies
E. antispoofing programs
Answer: AB
QUESTION 441
Which technology enables integration between Cisco ISE and other platforms to gather and share
network and vulnerability data and SIEM and location information?
A. pxGrid
B. NetFlow
C. SNMP
D. Cisco Talos
Answer: A
Explanation:
Cisco ISE uses Cisco Platform Exchange Grid (pxGrid) technology to share contextual data with
leading SIEM and TD partner solutions.
QUESTION 442
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a
DNA Center?
A. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count
B. GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device
C. GET
https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value¶m
eter2=value&....
D. GET
https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice/startIndex/recordsToReturn
Answer: A
Explanation:
https://developer.cisco.com/docs/dna-center/#!get-device-count
QUESTION 443
An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco
FTD. The chosen firewalls must provide methods of blocking traffic that include offering the user
the option to bypass the block for certain sites after displaying a warning page and to reset the
connection.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 176
http://www.passleader.com
Which solution should the organization choose?
A. Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not
B. Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via
the GUI, whereas Cisco FTD does not.
C. Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas
Cisco ASA does not
D. Cisco ASA because it has an additional module that can be installed to provide multiple blocking
capabilities, whereas Cisco FTD does not.
Answer: C
QUESTION 444
An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet
Gateway. The requirement is that all traffic needs to be filtered. Using the SSL decryption feature,
which type of certificate should be presented to the end-user to accomplish this goal?
A. third-party
B. self-signed
C. organization owned root
D. SubCA
Answer: C
QUESTION 445
An engineer needs to configure an access control policy rule to always send traffic for inspection
without using the default action. Which action should be configured for this rule?
A. monitor
B. allow
C. block
D. trust
Answer: B
Explanation:
Rule 4: Allow is the final rule. For this rule, matching traffic is allowed; however, prohibited files,
malware, intrusions, and exploits within that traffic are detected and blocked. Remaining non-
prohibited, non-malicious traffic is allowed to its destination, though it is still subject to identity
requirements and rate limiting. You can configure Allow rules that perform only file inspection, or
only intrusion inspection, or neither.
https://www.cisco.com/c/en/us/td/docs/security/firepower/610/configuration/guide/fpmc-config-
guide-v61/access_control_rules.html
QUESTION 446
When NetFlow is applied to an interface, which component creates the flow monitor cache that is
used to collect traffic based on the key and nonkey fields in the configured record?
A. records
B. flow exporter
C. flow sampler
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 177
http://www.passleader.com
D. flow monitor
Answer: D
Explanation:
Flow monitors are the Flexible NetFlow component that is applied to interfaces to perform
network traffic monitoring. Flow monitors consist of a record and a cache. You add the record to
the flow monitor after you create the flow monitor. The flow monitor cache is automatically
created at the time the flow monitor is applied to the first interface. Flow data is collected from the
network traffic during the monitoring process based on the key and nonkey fields in the record,
which is configured for the flow monitor and stored in the flow monitor cache.
QUESTION 447
Which encryption algorithm provides highly secure VPN communications?
A. 3DES
B. AES 256
C. AES 128
D. DES
Answer: B
QUESTION 448
An administrator needs to configure the Cisco ASA via ASDM such that the network management
system can actively monitor the host using SNMPv3.
Which two tasks must be performed for this configuration? (Choose two.)
Answer: DE
QUESTION 449
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet
using higher-level protocols without readdressing the network?
A. routed mode
B. transparent mode
C. single context mode
D. multiple context mode
Answer: B
Explanation:
https://grumpy-networkers-
journal.readthedocs.io/en/latest/VENDOR/CISCO/FIREWALL/ASA/TRANSPARENTFW.html
QUESTION 450
Which function is performed by certificate authorities but is a limitation of registration authorities?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 178
http://www.passleader.com
A. accepts enrollment requests
B. certificate re-enrollment
C. verifying user identity
D. CRL publishing
Answer: D
QUESTION 451
Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to
protect from phishing attacks? (Choose two.)
Answer: BE
Explanation:
Cisco® Advanced Phishing Protection provides sender authentication and BEC detection
capabilities. It uses advance machine learning techniques, real time behavior analytics,
relationship modeling and telemetry to protect against identity deception - based threats.
The Advanced Phishing Protection engine on the email gateway checks the unique behavior of all
legitimate senders, based on the historic email traffic to your organization. The cloud service
interface of the Cisco Advanced Phishing Protection provides risk analysis to distinguish good
messages from potentially malicious messages.
https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-
5/user_guide/b_ESA_Admin_Guide_13-5/m_advanced_phishing_protection.html
QUESTION 452
What is a feature of NetFlow Secure Event Logging?
Answer: A
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/asdm71/general/asdm_71_general_co
nfig/monitor_nsel.pdf
QUESTION 453
A hacker initiated a social engineering attack and stole username and passwords of some users
within a company. Which product should be used as a solution to this problem?
A. Cisco NGFW
B. Cisco AnyConnect
C. Cisco AMP for Endpoints
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 179
http://www.passleader.com
D. Cisco Duo
Answer: D
QUESTION 454
Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet
inspection, enabling the platform to identify and output various applications within the network
traffic flows?
A. Cisco NBAR2
B. Cisco ASAV
C. Account on Resolution
D. Cisco Prime Infrastructure
Answer: A
QUESTION 455
Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is
authenticated?
A. Authorization
B. Accounting
C. Authentication
D. CoA
Answer: D
QUESTION 456
Which type of data exfiltration technique encodes data in outbound DNS requests to specific
servers and can be stopped by Cisco Umbrella?
A. DNS tunneling
B. DNS flood attack
C. cache poisoning
D. DNS hijacking
Answer: A
Explanation:
https://umbrella.cisco.com/blog/improvements-dns-tunneling-dns-exfiltration-detection
QUESTION 457
A large organization wants to deploy a security appliance in the public cloud to form a site-to-site
VPN and link the public cloud environment to the private cloud in the headquarters data center.
Which Cisco security appliance meets these requirements?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 180
http://www.passleader.com
Answer: B
QUESTION 458
Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco
ESA?
A. webadvancedconfig
B. websecurity advancedconfig
C. outbreakconfig
D. websecurity config
Answer: B
Explanation:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118775-technote-
esa-00.html
QUESTION 459
Which standard is used to automate exchanging cyber threat information?
A. TAXIL
B. MITRE
C. IoC
D. STIX
Answer: A
Explanation:
TAXII, short for Trusted Automated eXchange of Intelligence Information, defines how cyber
threat information can be shared via services and message exchanges.
QUESTION 460
What is a function of the Layer 4 Traffic Monitor on a Cisco WSA?
A. blocks traffic from URL categories that are known to contain malicious content
B. decrypts SSL traffic to monitor for malicious content
C. monitors suspicious traffic across all the TCP/UDP ports
D. prevents data exfiltration by searching all the network traffic for specified sensitive information
Answer: C
QUESTION 461
A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256
cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1.
Which command achieves this goal?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 181
http://www.passleader.com
Answer: C
Explanation:
ASA(config)#snmp-server host inside 10.1.1.1 version 3 administrator <- specify the NMS host
QUESTION 462
Refer to the exhibit. What are two indications of the Cisco Firepower Services Module
configuration? (Choose two.)
Answer: AD
Explanation:
sfr {fail-open | fail-close [monitor-only]} <- There's a couple different options here. The first one is
fail-open which means that if the Firepower software module is unavailable, the ASA will continue
to forward traffic. fail-close means that if the Firepower module fails, the traffic will stop flowing.
While this doesn't seem ideal, there might be a use case for it when securing highly regulated
environments. The monitor-only switch can be used with both and basically puts the Firepower
services into IDS-mode only. This might be useful for initial testing or setup.
QUESTION 463
Why is it important for the organization to have an endpoint patching strategy?
Answer: D
QUESTION 464
An email administrator is setting up a new Cisco ESA. The administrator wants to enable the
blocking of greymail for the end user. Which feature must the administrator enable first?
A. File Analysis
B. IP Reputation Filtering
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 182
http://www.passleader.com
C. Intelligent Multi-Scan
D. Anti-Virus Filtering
Answer: C
QUESTION 465
What limits communication between applications or containers on the same node?
A. microsegmentation
B. container orchestration
C. microservicing
D. Software-Defined Access
Answer: A
QUESTION 466
Which open source tool does Cisco use to create graphical visualizations of network telemetry on
Cisco IOS XE devices?
A. InfluxDB
B. Splunk
C. SNMP
D. Grafana
Answer: D
Explanation:
https://blogs.cisco.com/developer/getting-started-with-model-driven-telemetry
QUESTION 467
How does the Cisco WSA enforce bandwidth restrictions for web applications?
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-
7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01111.pdf
QUESTION 468
Which two components do southbound APIs use to communicate with downstream devices?
(Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 183
http://www.passleader.com
D. applications running over the network
E. OpFlex
Answer: BE
QUESTION 469
What is the term for when an endpoint is associated to a provisioning WLAN that is shared with
guest access, and the same guest portal is used as the BYOD portal?
A. single-SSID BYOD
B. multichannel GUI
C. dual-SSID BYOD
D. streamlined access
Answer: C
Explanation:
If guest access is utilizing one of the named guest account, then same guest portal can be used
for employee BYOD portal. This flow is called Dual-SSID BYOD, where the endpoint is
associated to a provisioning WLAN which is typically shared with guest access.
https://community.cisco.com/t5/security-knowledge-base/ise-byod-dual-vs-single-ssid-
onboarding/ta-p/3641422
QUESTION 470
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to
the network?
A. Posture
B. Profiling
C. pxGrid
D. MAB
Answer: A
QUESTION 471
Which MDM configuration provides scalability?
Answer: C
QUESTION 472
Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to
connect to the network?
A. posture
B. profiler
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 184
http://www.passleader.com
C. Cisco TrustSec
D. Threat Centric NAC
Answer: A
QUESTION 473
Which endpoint protection and detection feature performs correlation of telemetry, files, and
intrusion events that are flagged as possible active breaches?
A. retrospective detection
B. indication of compromise
C. file trajectory
D. elastic search
Answer: B
Explanation:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-
protection/solution-overview-c22-734228.html
QUESTION 474
Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?
A. filters
B. group key
C. company key
D. connector
Answer: D
QUESTION 475
A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP
reachability to the NTP server and is not filtering any traffic. The show ntp association detail
command indicates that the configured NTP server is unsynchronized and has a stratum of 16.
What is the cause of this issue?
Answer: B
QUESTION 476
When a next-generation endpoint security solution is selected for a company, what are two key
deliverables that help justify the implementation? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 185
http://www.passleader.com
D. email integration to protect endpoints from malicious content that is located in email
E. real-time feeds from global threat intelligence centers
Answer: CE
QUESTION 477
What is the process of performing automated static and dynamic analysis of files in an isolated
environment against preloaded behavioral indicators for threat analysis?
Answer: C
Explanation:
https://www.cisco.com/c/en_in/products/security/advanced-malware-protection/index.html
QUESTION 478
Which solution is made from a collection of secure development practices and guidelines that
developers must follow to build secure applications?
A. AFL
B. Fuzzing Framework
C. Radamsa
D. OWASP
Answer: D
QUESTION 479
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application
and infrastructure automation?
Answer: A
QUESTION 480
Which direction do attackers encode data in DNS requests during exfiltration using DNS
tunneling?
A. inbound
B. north-south
C. east-west
D. outbound
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 186
http://www.passleader.com
Answer: D
QUESTION 481
Which technology provides a combination of endpoint protection endpoint detection, and
response?
A. Cisco AMP
B. Cisco Talos
C. Cisco Threat Grid
D. Cisco Umbrella
Answer: A
QUESTION 482
What is a feature of container orchestration?
A. ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane
B. ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane
C. ability to deploy Kubernetes clusters in air-gapped sites
D. automated daily updates
Answer: C
QUESTION 483
What are two security benefits of an MDM deployment? (Choose two.)
Answer: AC
QUESTION 484
Refer to the exhibit. Consider that any feature of DNS requests, such as the length off the domain
name and the number of subdomains, can be used to construct models of expected behavior to
which observed values can be compared.
Which type of malicious attack are these values associated with?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 187
http://www.passleader.com
A. Spectre Worm
B. Eternal Blue Windows
C. Heartbleed SSL Bug
D. W32/AutoRun worm
Answer: D
QUESTION 485
What is the recommendation in a zero-trust model before granting access to corporate
applications and resources?
Answer: A
QUESTION 486
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and
process activity on an endpoint?
A. endpoint isolation
B. advanced search
C. advanced investigation
D. retrospective security
Answer: D
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 188
http://www.passleader.com
QUESTION 487
Which solution stops unauthorized access to the system if a user's password is compromised?
A. VPN
B. MFA
C. AMP
D. SSL
Answer: B
QUESTION 488
What is a benefit of using Cisco Tetration?
A. It collects telemetry data from servers and then uses software sensors to analyze flow
information.
B. It collects policy compliance data and process details.
C. It collects enforcement data from servers and collects interpacket variation.
D. It collects near-real time data from servers and inventories the software packages that exist on
servers.
Answer: A
QUESTION 489
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
Answer: A
Explanation:
Roaming client will modify DNS value to 127.0.0.1 and bind itself to all NIC adapters to listen to
port 53 traffic. It can only do this by modifying name server value in registry.
https://community.cisco.com/t5/security-blogs/verifying-how-umbrella-roaming-client-works/ba-
p/3790771
QUESTION 490
Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other
interoperable security platforms?
A. IEEE
B. IETF
C. NIST
D. ANSI
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 189
http://www.passleader.com
QUESTION 491
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
Answer: CD
QUESTION 492
Which solution should be leveraged for secure access of a CI/CD pipeline?
Answer: A
QUESTION 493
Which function is included when Cisco AMP is added to web security?
Answer: B
QUESTION 494
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in
order to ensure that bandwidth is available for VPN users needing access to corporate resources
on the 10.0.0.0/24 local HQ network.
How is this accomplished without adding additional devices to the network?
A. Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.
B. Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,
C. Configure VPN load balancing to send non-corporate traffic straight to the internet.
D. Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.
Answer: A
QUESTION 495
Which solution detects threats across a private network, public clouds, and encrypted traffic?
A. Cisco Stealthwatch
B. Cisco CTA
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 190
http://www.passleader.com
C. Cisco Encrypted Traffic Analytics
D. Cisco Umbrella
Answer: A
QUESTION 496
Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while
protecting data from being exfiltrated?
A. Cisco Tajos
B. Cisco Steaithwatch Cloud C.Cisco Cloudlock
C. Cisco Umbrella Investigate
Answer: C
QUESTION 497
Drag and Drop Question
Drag and drop the exploits from the left onto the type of security vulnerability on the right.
Answer:
QUESTION 498
Drag and Drop Question
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 191
http://www.passleader.com
Drag and drop the concepts from the left onto the correct descriptions on the right.
Answer:
QUESTION 499
When network telemetry is implemented, what is important to be enabled across all network
infrastructure devices to correlate different sources?
A. CDP
B. syslog
C. NTP
D. DNS
Answer: C
Explanation:
Without time synchronization, it is very difficult to correlate different sources of telemetry.
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Security/Baseline_Security/securebas
ebook/sec_chap5.html
QUESTION 500
An organization is implementing AAA for their users. They need to ensure that authorization is
verified for every command that is being entered by the network administrator.
Which protocol must be configured in order to provide this capability?
A. EAPOL
B. SSH
C. RADIUS
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 192
http://www.passleader.com
D. TACACS+
Answer: C
QUESTION 501
What is the concept of continuous integration/continuous delivery pipelining?
A. The project code is centrally maintained, and each code change should trigger an automated
build and test sequence.
B. The project is split into time-limited cycles, and focuses on pair programming for continuous
code review.
C. The project is split into several phases where one phase cannot start before the previous
phase finishes successfully.
D. Each project phase is independent from other phases to maintain adaptiveness and continual
improvement.
Answer: A
QUESTION 502
Drag and Drop Question
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the
right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 193
http://www.passleader.com
QUESTION 503
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
A. WCCP
B. NTLM
C. TLS
D. SSL
E. LDAP
Answer: BE
QUESTION 504
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined
policy?
Answer: B
QUESTION 505
Which Cisco solution extends network visibility, threat detection, and analytics to public cloud
environments?
A. Cisco Umbrella
B. Cisco Stealthwatch Cloud
C. Cisco Appdynamics
D. Cisco CloudLock
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 194
http://www.passleader.com
QUESTION 506
Which metric is used by the monitoring agent to collect and output packet loss and jitter
information?
A. WSAv performance
B. AVC performance
C. OTCP performance
D. RTP performance
Answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/avc/guide/avc-user-
guide/avc_tech_overview.html
QUESTION 507
Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic?
(Choose two.)
Answer: AB
QUESTION 508
What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)
Answer: BC
QUESTION 509
How does Cisco Workload Optimization portion of the network do EPP solutions solely
performance issues?
Answer: B
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 195
http://www.passleader.com
QUESTION 510
What are two benefits of using an MDM solution? (Choose two.)
Answer: AE
QUESTION 511
A company has 5000 Windows users on its campus. Which two precautions should IT take to
prevent WannaCry ransomware from spreading to all clients? (Choose two.)
A. Segment different departments to different IP blocks and enable Dynamic ARp inspection on all
VLANs
B. Ensure that noncompliant endpoints are segmented off to contain any potential damage.
C. Ensure that a user cannot enter the network of another department.
D. Perform a posture check to allow only network access to (hose Windows devices that are already
patched.
E. Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment
of the Cisco NGFW.
Answer: BD
QUESTION 512
What provides total management for mobile and PC including managing inventory and device
tracking, remote view, and live troubleshooting using the included native remote desktop support?
Answer: A
QUESTION 513
What is the process In DevSecOps where all changes In the central code repository are merged
and synchronized?
A. CD
B. EP
C. CI
D. QA
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 196
http://www.passleader.com
QUESTION 514
Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and
operated by one or more of the organizations in the community, a third party, or some
combination of them, and it may exist on or off premises?
A. hybrid cloud
B. private cloud
C. public cloud
D. community cloud
Answer: D
QUESTION 515
Which type of data does the Cisco Stealthwatch system collect and analyze from routers,
switches, and firewalls?
A. NTP
B. syslog
C. SNMP
D. NetFlow
Answer: D
QUESTION 516
What is the most common type of data exfiltration that organizations currently experience?
Answer: B
Explanation:
https://blogs.cisco.com/security/sensitive-data-exfiltration-and-the-insider
QUESTION 517
Which security solution is used for posture assessment of the endpoints in a BYOD solution?
A. Cisco FTD
B. Cisco ASA
C. Cisco Umbrella
D. Cisco ISE
Answer: D
QUESTION 518
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken
before granting API access in the Dropbox admin console?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 197
http://www.passleader.com
A. Authorize Dropbox within the Platform settings in the Cloudlock portal.
B. Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal.
C. Send an API request to Cisco Cloudlock from Dropbox admin portal.
D. Add Cisco Cloudlock to the Dropbox admin portal.
Answer: A
QUESTION 519
How does Cisco AMP for Endpoints provide next-generation protection?
Answer: B
QUESTION 520
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose
two.)
A. NTLMSSP
B. Kerberos
C. CHAP
D. TACACS+
E. RADIUS
Answer: AB
Explanation:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 198
http://www.passleader.com
QUESTION 521
Which API method and required attribute are used to add a device into DNAC with the native
API?
Answer: B
QUESTION 522
What is a benefit of using Cisco Umbrella?
Answer: B
QUESTION 523
Which solution allows an administrator to provision, monitor, and secure mobile devices on
Windows and Mac computers from a centralized dashboard?
A. Cisco Umbrella
B. Cisco AMP for Endpoints
C. Cisco ISE
D. Cisco Stealthwatch
Answer: C
QUESTION 524
What is the term for the concept of limiting communication between applications or containers on
the same node?
A. container orchestration
B. software-defined access
C. microservicing
D. microsegmentation
Answer: D
QUESTION 525
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also
automatically configuring endpoint network settings to use the signed endpoint certificate,
allowing the endpoint to gain network access?
A. Cisco ISE
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 199
http://www.passleader.com
B. Cisco NAC
C. Cisco TACACS+
D. Cisco WSA
Answer: A
QUESTION 526
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose
two.)
Answer: AE
QUESTION 527
Which cloud service offering allows customers to access a web application that is being hosted,
managed, and maintained by a cloud service provider?
A. IaC
B. SaaS
C. IaaS
D. PaaS
Answer: B
Explanation:
https://www.ibm.com/cloud/learn/iaas-paas-saas
QUESTION 528
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
Answer: A
QUESTION 529
An administrator is configuring NTP on Cisco ASA via ASDM and needs to ensure that rogue
NTP servers cannot insert themselves as the authoritative time source. Which two steps must be
taken to accomplish this task? (Choose two.)
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 200
http://www.passleader.com
D. Choose the interface for syncing to the NTP server
E. Set the NTP DNS hostname
Answer: CE
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa98/asdm78/general/asdm-78-general-
config/basic-hostname-pw.html
QUESTION 530
What is a characteristic of an EDR solution and not of an EPP solution?
Answer: B
Explanation:
EDR focuses primarily on detecting advanced threats, those designed to evade front-line
defenses and have successfully entered the environment. An EPP focuses solely on prevention
at the perimeter. It is difficult, if not impossible, for an EPP to block 100 percent of threats. A
holistic endpoint security solution deploys both EPP and EDR capabilities.
If the EDR has retrospective capabilities, this actionable data should be used to automatically
remediate systems to their state prior to infection.
QUESTION 531
Email security has become a high priority task for a security engineer at a large multi-national
organization due to ongoing phishing campaigns. To help control this, the engineer has deployed
an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which
action will the system perform to disable any links in messages that match the filter?
A. Defang
B. Quarantine
C. FilterAction
D. ScreenAction
Answer: D
Explanation:
Name: URL_Malicious
Add One Condition:
URL Reputation:
URL Reputation is: Malicious (-10.0 to -6.0)
Add One Action:
Quarantine:
Send message to quarantine: “URL Malicious Inbound (centralized)”
Duplicate message: Disabled (**** Quarantine the original ****)
QUESTION 532
What are two workload security models? (Choose two.)
A. SaaS
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 201
http://www.passleader.com
B. IaaS
C. on-premises
D. off-premises
E. PaaS
Answer: AD
Explanation:
https://www.cisco.com/c/en/us/products/security/tetration/index.html#~benefits
Cisco Secure Workload models: Software as a service (SaaS) - On-premises
QUESTION 533
Refer to the exhibit. What function does the API key perform while working with
https://api.amp.cisco.com/v1/computers?
A. imports requests
B. HTTP authorization
C. HTTP authentication
D. displays client ID
Answer: C
Explanation:
It is part of the API credentials
https://www.cisco.com/c/en/us/support/docs/security/amp-endpoints/201121-Overview-of-the-
Cisco-AMP-for-Endpoints.html
QUESTION 534
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
Answer: B
QUESTION 535
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure
that traffic is inspected without alerting end-users. Which action accomplishes this goal?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 202
http://www.passleader.com
A. Upload the organization root CA to the Umbrella admin portal
B. Modify the user's browser settings to suppress errors from Umbrella.
C. Restrict access to only websites with trusted third-party signed certificates.
D. Import the Umbrella root CA into the trusted root store on the user's device.
Answer: D
Explanation:
Intelligent Proxy with SSL Decryption - If a domain is proxied, the Cisco Umbrella root certificate
must be installed to decrypt HTTPS traffic instead of the browser presenting an error page.
QUESTION 536
Drag and Drop Question
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic
processes on the right.
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 203
http://www.passleader.com
QUESTION 537
DoS attacks are categorized as what?
A. phishing attacks
B. flood attacks
C. virus attacks
D. trojan attacks
Answer: B
QUESTION 538
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
A. api/v1/fie/config
B. api/v1/onboarding/pnp-device/import
C. api/v1/onboarding/pnp-device
D. api/v1/onboarding/workflow
Answer: A
QUESTION 539
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming
Client?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 204
http://www.passleader.com
A. The Umbrella Roaming client stops and tracks malicious activity on hosts, and AMP for Endpoints
tracks only URL-based threats.
B. The Umbrella Roaming Client authenticates users and provides segmentation, and AMP for
Endpoints allows only for VPN connectivity
C. AMP for Endpoints authenticates users and provides segmentation, and the Umbrella Roaming
Client allows only for VPN connectivity.
D. AMP for Endpoints stops and tracks malicious activity on hosts, and the Umbrella Roaming Client
tracks only URL-based threats.
Answer: B
QUESTION 540
Which Cisco solution integrates Encrypted Traffic Analytics to perform enhanced visibility,
promote compliance,shorten response times, and provide administrators with the information
needed to provide educated and automated decisions to secure the environment?
Answer: D
QUESTION 541
Which feature does the laaS model provide?
Answer: C
QUESTION 542
What is a benefit of flexible NetFlow records?
Answer: D
QUESTION 543
What is the purpose of the Cisco Endpoint loC feature?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 205
http://www.passleader.com
D. It provides precompromise detection.
Answer: C
QUESTION 544
An engineer recently completed the system setup on a Cisco WSA Which URL information does
the system send to SensorBase Network servers?
Answer: A
QUESTION 545
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
Answer: C
QUESTION 546
An engineer is deploying Cisco Advanced Malware Protection (AMP) for Endpoints and wants to
create a policy that prevents users from executing file named abc424952615.exe without
quarantining that file. What type of Outbreak Control list must the SHA.-256 hash value for the file
be added to in order to accomplish this?
Answer: D
QUESTION 547
Which Cisco security solution stops exfiltration using HTTPS?
A. Cisco FTD
B. Cisco AnyConnect
C. Cisco CTA
D. Cisco ASA
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 206
http://www.passleader.com
QUESTION 548
What is the difference between EPP and EDR?
A. EPP focuses primarily on threats that have evaded front-line defenses that entered the
environment.
B. Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.
C. EDR focuses solely on prevention at the perimeter.
D. Having an EDR solution gives an engineer the capability to flag offending files at the first sign of
malicious behavior.
Answer: B
QUESTION 549
Which algorithm is an NGE hash function?
A. HMAC
B. SHA-1
C. MD5
D. SISHA-2
Answer: D
QUESTION 550
What are two recommended approaches to stop DNS tunneling for data exfiltration and command
and control call backs? (Choose two.)
Answer: CE
QUESTION 551
Which two capabilities does an MDM provide? (Choose two.)
Answer: BC
QUESTION 552
Which ESA implementation method segregates inbound and outbound email?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 207
http://www.passleader.com
B. pair of logical listeners on a single physical interface with two unique logical IPv4 addresses and
one IPv6 address
C. pair of logical IPv4 listeners and a pair of IPv6 listeners on two physically separate interfaces
D. one listener on one logical IPv4 address on a single logical interface
Answer: D
QUESTION 553
During a recent security audit, a Cisco IOS router with a working IPSEC configuration using
IKEv1 was flagged for using a wildcard mask with the crypto isakmp key command. The VPN
peer is a SOHO router with a dynamically assigned IP address. Dynamic DNS has been
configured on the SOHO router to map the dynamic IP address to the host name of
vpn.sohoroutercompany.com. In addition to the command crypto isakmp key Cisc123456789
hostname vpn.sohoroutercompany.com, what other two commands are now required on the
Cisco IOS router far the VPN to continue to function after the wildcard command is removed?
(Choose two.)
Answer: BC
QUESTION 554
Which command is used to log all events to a destination colector 209.165.201.10?
Answer: C
Explanation:
hostname (config)# access-list flow_export_acl permit ip host 209.165.200.224 host
209.165.201.224
hostname (config)# class-map flow_export_class
hostname (config-cmap)# match access-list flow_export_acl
hostname (config)# policy-map flow_export_policy
hostname (config-pmap)# class flow_export_class
hostname (config-pmap-c)# flow-export event-type all destination 209.165.200.230
hostname (config-pmap)# class class-default
hostname (config-pmap-c)# flow-export event-type all destination 209.165.201.29
hostname (config)# service-policy flow_export_policy global
QUESTION 555
What is the most commonly used protocol for network telemetry?
A. NetFlow
B. SNMP
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 208
http://www.passleader.com
C. TFTP
D. SMTP
Answer: B
Explanation:
Prior to streaming network telemetry technologies, the simple network monitoring protocol
(SNMP) was the standard method for collecting network telemetry information.
https://www.techtarget.com/searchnetworking/definition/streaming-network-telemetry
QUESTION 556
What are two functions of IKEv1 but not IKEv2? (Choose two.)
Answer: BE
Explanation:
https://community.cisco.com/t5/routing/internet-key-exchange-ike-aggressive-mode/td-p/2081283
QUESTION 557
Which threat intelligence standard contains malware hashes?
Answer: C
QUESTION 558
A company identified a phishing vulnerability during a pentest.
What are two ways the company can protect employees from the attack? (Choose two.)
Answer: AB
QUESTION 559
Which Cisco ISE feature helps to detect missing patches and helps with remediation?
A. posture assessment
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 209
http://www.passleader.com
B. profiling policy
C. authentication policy
D. enabling probes
Answer: A
QUESTION 560
Refer to the exhibit. What is the result of using this authentication protocol in the configuration?
Answer: D
QUESTION 561
Which feature must be configured before implementing NetFlow on a router?
A. SNMPv3
B. syslog
C. VRF
D. IP routing
Answer: D
QUESTION 562
What is an advantage of the Cisco Umbrella roaming client?
Answer: C
QUESTION 563
What is a function of Cisco AMP for Endpoints?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 210
http://www.passleader.com
Answer: D
QUESTION 564
An engineer is implementing DHCP security mechanisms and needs the ability to add additional
attributes to profiles that are created within Cisco ISE. Which action accomplishes this task?
A. Define MAC-to-lP address mappings in the switch to ensure that rogue devices cannot get an IP
address
B. Use DHCP option 82 to ensure that the request is from a legitimate endpoint and send the
information to Cisco ISE
C. Modify the DHCP relay and point the IP address to Cisco ISE.
D. Configure DHCP snooping on the switch VLANs and trust the necessary interfaces
Answer: D
QUESTION 565
Which feature requires that network telemetry be enabled?
A. per-interface stats
B. SNMP trap notification
C. Layer 2 device discovery
D. central syslog system
Answer: D
QUESTION 566
Refer to the exhibit. When configuring this access control rule in Cisco FMC, what happens with
the traffic destined to the DMZjnside zone once the configuration is deployed?
A. All traffic from any zone to the DMZ_inside zone will be permitted with no further inspection
B. No traffic will be allowed through to the DMZ_inside zone regardless of if it's trusted or not
C. All traffic from any zone will be allowed to the DMZ_inside zone only after inspection
D. No traffic will be allowed through to the DMZ_inside zone unless it's already trusted
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 211
http://www.passleader.com
Answer: A
QUESTION 567
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco
Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as
protection against data exfiltration. Which solution best meets these requirements?
Answer: C
QUESTION 568
An engineer needs to detect and quarantine a file named abc123456789.zip based on the MD5
signature of the file using the Outbreak Control list feature within Cisco Advanced Malware
Protection (AMP) for Endpoints. The configured detection method must work on files of unknown
disposition. Which Outbreak Control list must be configured to provide this?
Answer: C
QUESTION 569
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS
CoA feature?
A. 3
B. 5
C. 10
D. 12
Answer: D
QUESTION 570
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco
Umbrella logs. What benefit does this configuration provide for accessing log data?
A. It is included m the license cost for the multi-org console of Cisco Umbrella
B. It can grant third-party SIEM integrations write access to the S3 bucket
C. No other applications except Cisco Umbrella can write to the S3 bucket
D. Data can be stored offline for 30 days.
Answer: D
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 212
http://www.passleader.com
QUESTION 571
For a given policy in Cisco Umbrella, how should a customer block website based on a custom
list?
Answer: C
QUESTION 572
On their laptops around to simplify administration. Which switch port MAC address security
setting must be used?
A. sticky
B. static
C. aging
D. maximum
Answer: A
QUESTION 573
Which Cisco Firewall solution requires zone definition?
A. CBAC
B. Cisco AMP
C. ZBFW
D. Cisco ASA
Answer: C
QUESTION 574
A company recently discovered an attack propagating throughout their Windows network via a file
named abc428565580xyz exe. The malicious file was uploaded to a Simple Custom Detection list
in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was
updated to reference the detection list. Verification testing scans on known infected systems
shows that AMP for Endpoints is not detecting the presence of this file as an indicator of
compromise. What must be performed to ensure detection of the malicious file?
Answer: D
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 213
http://www.passleader.com
QUESTION 575
Which two configurations must be made on Cisco ISE and on Cisco TrustSec devices to force a
session to be adjusted after a policy change is made? (Choose two)
A. posture assessment
B. aaa authorization exec default local
C. tacacs-server host 10.1.1.250 key password
D. aaa server radius dynamic-author
E. CoA
Answer: DE
QUESTION 576
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode.
Which configuration component must be used to accomplish this goal?
Answer: C
QUESTION 577
Which feature is used in a push model to allow for session identification, host reauthentication,
and session termination?
A. AAA attributes
B. CoA request
C. AV pair
D. carrier-grade NAT
Answer: C
QUESTION 578
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter
multiple forms of identification before gaining access to the SEG.
The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be
taken to support this?
A. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG
GUI.
B. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG
CLI.
C. Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG
CLI
D. Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG
GUI.
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 214
http://www.passleader.com
Explanation:
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-
0/user_guide_fs/b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.pdf
QUESTION 579
What is the concept of Cl/CD pipelining?
A. The project is split into several phases where one phase cannot start before the previous phase
finishes successfully.
B. The project code is centrally maintained and each code change should trigger an automated build
and test sequence
C. The project is split into time-limited cycles and focuses on pair programming for continuous code
review
D. Each project phase is independent from other phases to maintain adaptiveness and continual
improvement
Answer: A
QUESTION 580
Why should organizations migrate to a multifactor authentication strategy?
Answer: D
QUESTION 581
What is the function of the crypto isakmp key cisc406143794 address 0.0.0.0 0.0.0.0 command
when establishing an IPsec VPN tunnel?
Answer: B
Explanation:
This command is used to configure pre-shared-key for IPsec remote acess users on the Cisco
router. Address is mentioned as 0.0.0.0 0.0.0.0 because the users will be connecting from
random ip addresses and it is almost impossible to mention all the ip addresses. Hence, 0.0.0.0
0.0.0.0 is used to allow all public ip addresses.
QUESTION 582
Client workstations are experiencing extremely poor response time. An engineer suspects that an
attacker is eavesdropping and making independent connections while relaying messages
between victims to make them think they are talking to each other over a private connection.
Which feature must be enabled and configured to provide relief from this type of attack?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 215
http://www.passleader.com
A. Link Aggregation
B. Reverse ARP
C. private VLANs
D. Dynamic ARP Inspection
Answer: D
QUESTION 583
An administrator is testing new configuration on a network device. The network device had a
previously established association with the NTP server but is no longer processing time updates.
What is the cause of this issue?
Answer: C
QUESTION 584
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
A. probes
B. posture assessment
C. Cisco AnyConnect Secure Mobility Client
D. Cisco pxGrid
Answer: A
QUESTION 585
Which two Cisco ISE components enforce security policies on noncompliant endpoints by
blocking network access? (Choose two.)
A. Apex licensing
B. TACACS+
C. profiling
D. DHCP and SNMP probes
E. posture agents
Answer: CE
QUESTION 586
Which Cisco security solution gives the most complete view of the relationships and evolution of
Internet domains, IPs, and files, and helps to pinpoint attackers' infrastructures and predict future
threat?
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 216
http://www.passleader.com
C. Cisco pxGrid
D. Cisco Stealthwatch Cloud
Answer: A
Explanation:
https://umbrella.cisco.com/products/umbrella-investigate
QUESTION 587
Which two commands are required when configuring a flow-export action on a Cisco ASA?
(Choose two.)
A. flow-export event-type
B. policy-map
C. access-list
D. flow-export template timeout-rate 15
E. access-group
Answer: AB
QUESTION 588
What are two benefits of using an MDM solution? (Choose two.)
Answer: BC
QUESTION 589
Which VPN provides scalability for organizations with many remote sites?
A. DMVPN
B. SSLVPN
C. GRE over IPsec
D. site-to-site IPsec
Answer: A
QUESTION 590
Which Cisco security solution secures public, private, hybrid, and community clouds?
A. Cisco ISE
B. Cisco ASAv
C. Cisco Cloudlock
D. Cisco pxGrid
Answer: C
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 217
http://www.passleader.com
QUESTION 591
What is the target in a phishing attack?
A. perimeter firewall
B. IPS
C. web server
D. endpoint
Answer: D
QUESTION 592
A university policy must allow open access to resources on the Internet for research, but internal
workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to
determine whether a file is installed on a selected few workstations?
A. file prevalence
B. file discovery
C. file conviction
D. file manager
Answer: A
Explanation:
Prevalence: AMP displays all files that are running across your organization, ordered by
prevalence, to help you surface previously undetected threats seen by a small number of users.
Files opened by only a few users may be malicious.
QUESTION 593
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures
on endpoints and then quarantine the files?
Answer: A
QUESTION 594
Drag and Drop Question
A network engineer is configuring NetFlow top talkers on a Cisco router. Drag and drop the steps
in the process from the left into the sequence on the right.
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 218
http://www.passleader.com
Answer:
Get Latest & Actual 350-701 Exam's Question and Answers from Passleader. 219
http://www.passleader.com