350-701 Practice Test Questions

626 Questions


Topic 3: Exam Pool C

Which two capabilities does an MDM provide? (Choose two.)


A.

delivery of network malware reports to an inbox in a schedule


B.

unified management of mobile devices, Macs, and PCs from a centralized dashboard


C.

enforcement of device security policies from a centralized dashboard


D.

manual identification and classification of client devices


E.

unified management of Android and Apple devices from a centralized dashboard





B.
  

unified management of mobile devices, Macs, and PCs from a centralized dashboard



C.
  

enforcement of device security policies from a centralized dashboard



Which information is required when adding a device to Firepower Management Center?


A.

username and password


B.

encryption method


C.

device serial number


D.

registration key





D.
  

registration key



In which scenario is endpoint-based security the solution?


A.

inspecting encrypted traffic


B.

device profiling and authorization


C.

performing signature-based application control


D.

inspecting a password-protected archive





C.
  

performing signature-based application control



Which category includes DoS Attacks?


A.

Virus attacks


B.

Trojan attacks


C.

Flood attacks


D.

Phishing attacks





C.
  

Flood attacks



Which two mechanisms are used to control phishing attacks? (Choose two)


A.

Enable browser alerts for fraudulent websites


B.

Define security group memberships.


C.

Revoke expired CRL of the websites.


D.

Use antispyware software.


E.

Implement email filtering techniques.





A.
  

Enable browser alerts for fraudulent websites



E.
  

Implement email filtering techniques.



What are two features of NetFlow flow monitoring? (Choose two)


A.

Can track ingress and egress information


B.

Include the flow record and the flow importer


C.

Copies all ingress flow information to an interface


D.

Does not required packet sampling on interfaces


E.

Can be used to track multicast, MPLS, or bridged traffic





A.
  

Can track ingress and egress information



E.
  

Can be used to track multicast, MPLS, or bridged traffic



Drag and drop the concepts from the left onto the correct descriptions on the right:






What is a characteristic of a bridge group in ASA Firewall transparent mode?


A.

It includes multiple interfaces and access rules between interfaces are customizable


B.

It is a Layer 3 segment and includes one port and customizable access rules


C.

It allows ARP traffic with a single access rule


D.

It has an IP address on its BVI interface and is used for management traffic





A.
  

It includes multiple interfaces and access rules between interfaces are customizable



https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa-95- generalconfig/intro-fw.htmlNote: BVI interface is not used for management purpose. But we can add a separate Management slot/port interface that is not part of any bridge group, and that allows only management traffic to the ASA.

Which two criteria must a certificate meet before the WSA uses it to decrypt application
traffic? (Choose two.)


A.

It must include the current date.


B.

It must reside in the trusted store of the WSA.


C.

It must reside in the trusted store of the endpoint.


D.

It must have been signed by an internal CA.


E.

it must contain a SAN.





A.
  

It must include the current date.



B.
  

It must reside in the trusted store of the WSA.



An engineer is trying to decide between using L2TP or GRE over IPsec for their site-to-site
VPN implementation. What must be un solution?


A.

L2TP is an IP packet encapsulation protocol, and GRE over IPsec is a tunneling protocol.


B.

L2TP uses TCP port 47 and GRE over IPsec uses UDP port 1701.


C.

GRE over IPsec adds its own header, and L2TP does not.


D.

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.





D.
  

GRE over IPsec cannot be used as a standalone protocol, and L2TP can.



What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services?
(Choose two)


A.

multiple factor auth


B.

local web auth


C.

single sign-on


D.

central web auth


E.

TACACS+





B.
  

local web auth



D.
  

central web auth



What is the process In DevSecOps where all changes In the central code repository are
merged and synchronized?


A.

CD


B.

EP


C.

CI


D.

QA





C.
  

CI




Page 24 out of 53 Pages
Previous