cisco 350-701 practice test

Implementing and Operating Cisco Security Core Technologies


Question 1 Topic 6

Topic 6
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

  • A. malware installation
  • B. network footprinting
  • C. command-and-control communication
  • D. data exfiltration
Answer:

D

Discussions
0 / 600

Question 2 Topic 6

Topic 6
What is a benefit of performing device compliance?

  • A. providing multi-factor authentication
  • B. verification of the latest OS patches
  • C. providing attribute-driven policies
  • D. device classification and authorization
Answer:

B

Discussions
0 / 600

Question 3 Topic 6

Topic 6
An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to
extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network.
Which solution meets these requirements?

  • A. Cisco Umbrella Cloud
  • B. Cisco Stealthwatch Cloud PNM
  • C. Cisco Stealthwatch Cloud PCM
  • D. Cisco Umbrella Om-Premises
Answer:

B

Discussions
0 / 600

Question 4 Topic 6

Topic 6
A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the
Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement, using the Ubuntu-
based VM appliance deployed in a VMware-based hypervisor?

  • A. Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud.
  • B. Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud.
  • C. Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud.
  • D. Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud.
Answer:

D

Discussions
0 / 600

Question 5 Topic 6

Topic 6
Drag and drop the solutions from the left onto the solutions benefits on the right.
Select and Place:

Answer:

Discussions
0 / 600

Question 6 Topic 6

Topic 6
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC
server, and the new device does not have a supplicant available. What must be done in order to securely connect this device
to the network?

  • A. Use 802.1X with posture assessment.
  • B. Use MAB with profiling.
  • C. Use 802.1X with profiling.
  • D. Use MAB with posture assessment.
Answer:

B

Discussions
0 / 600

Question 7 Topic 6

Topic 6
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but
logs are not being received from the on-premise network. What action will resolve this issue?

  • A. Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud.
  • B. Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud.
  • C. Configure security appliances to send syslogs to Cisco Stealthwatch Cloud.
  • D. Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud.
Answer:

B

Discussions
0 / 600

Question 8 Topic 6

Topic 6
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the
applications within the network. The solution must be able to maintain and force compliance. Which product should be used
to meet these requirements?

  • A. Cisco Stealthwatch
  • B. Cisco Tetration
  • C. Cisco AMP
  • D. Cisco Umbrella
Answer:

A

Discussions
0 / 600

Question 9 Topic 6

Topic 6
Which compliance status is shown when a configured posture policy requirement is not met?

  • A. authorized
  • B. compliant
  • C. unknown
  • D. noncompliant
Answer:

D

Discussions
0 / 600

Question 10 Topic 6

Topic 6
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other
vendors to share data and interoperate with each other?

  • A. Platform Exchange Grid
  • B. Multifactor Platform Integration
  • C. Firepower Threat Defense
  • D. Advanced Malware Protection
Answer:

A

Explanation:
Reference: https://www.cisco.com/c/en/us/products/security/pxgrid.html

Discussions
0 / 600
To page 2