350-701 Practice Test Questions

626 Questions


Topic 1: Exam Pool A

What must be used to share data between multiple security products?


A.

Cisco Rapid Threat Containment


B.

Cisco Platform Exchange Grid


C.

Cisco Advanced Malware Protection


D.

Cisco Stealthwatch Cloud





B.
  

Cisco Platform Exchange Grid



How does Cisco Stealthwatch Cloud provide security for cloud environments?


A.

It delivers visibility and threat detection.


B.

It prevents exfiltration of sensitive data.


C.

It assigns Internet-based DNS protection for clients and servers.


D.

It facilitates secure connectivity between public and private networks





A.
  

It delivers visibility and threat detection.



Explanation Cisco Stealthwatch Cloud: Available as an SaaS product offer to
provide visibility and threat detection within public cloud infrastructures such as Amazon
Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

Which algorithm provides encryption and authentication for data plane communication?


A.

AES-GCM


B.

SHA-96


C.

AES-256


D.

SHA-384





A.
  

AES-GCM



https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/securitybook/security-overview.html

Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?


A.

It allows the endpoint to authenticate with 802.1x or MAB.


B.

It verifies that the endpoint has the latest Microsoft security patches installed.


C.

It adds endpoints to identity groups dynamically.


D.

It allows CoA to be applied if the endpoint status is compliant.





A.
  

It allows the endpoint to authenticate with 802.1x or MAB.



What Cisco command shows you the status of an 802.1X connection on interface gi0/1?


A.

show authorization status


B.

show authen sess int gi0/1


C.

show connection status gi0/1


D.

show ver gi0/1





B.
  

show authen sess int gi0/1



What is the function of Cisco Cloudlock for data security?


A.

data loss prevention


B.

controls malicious cloud apps


C.

detects anomalies


D.

user and entity behavior analytics





A.
  

data loss prevention



When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?


A.

Common Security Exploits


B.

Common Vulnerabilities and Exposures


C.

Common Exploits and Vulnerabilities


D.

Common Vulnerabilities, Exploits and Threats





B.
  

Common Vulnerabilities and Exposures



CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)


A.

data exfiltration


B.

command and control communication


C.

intelligent proxy


D.

snort


E.

URL categorization





A.
  

data exfiltration



B.
  

command and control communication



Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatanalytics/
at-aglance-c45-736555.pdf

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?


A.

IP Blacklist Center


B.

File Reputation Center


C.

AMP Reputation Center


D.

IP and Domain Reputation Center





D.
  

IP and Domain Reputation Center



Which form of attack is launched using botnets?


A.

EIDDOS


B.

virus


C.

DDOS


D.

TCP flood





C.
  

DDOS



ExplanationA botnet is a collection of internet-connected devices infected by
malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet
attacks, which include malicious activities such as credentialsleaks, unauthorized access,
data theft and DDoS attacks.

What is the primary benefit of deploying an ESA in hybrid mode?


A.

You can fine-tune its settings to provide the optimum balance between security and
performance for your environment


B.

It provides the lowest total cost of ownership by reducing the need for physical
appliances


C.

It provides maximum protection and control of outbound messages


D.

It provides email security while supporting the transition to the cloud





D.
  

It provides email security while supporting the transition to the cloud



Cisco Hybrid Email Security is a unique service offering that
facilitates the deployment of your email securityinfrastructure both on premises and in the
cloud. You can change the number of on-premises versus cloudusers at any time
throughout the term of your contract, assuming the total number of users does not
change.This allows for deployment flexibility as your organization’s needs change.

Which policy represents a shared set of features or parameters that define the aspects of a
managed device that are likely to be similar to other managed devices in a deployment?


A.

Group Policy

 


B.

 Access Control Policy


C.

Device Management Policy


D.

Platform Service Policy





D.
  

Platform Service Policy



https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmcconfigguide-
v62/platform_settings_policies_for_managed_devices.htmlTherefore the
answer should be “Platform Settings Policy”, not “Platform Service Policy” but it is the
bestanswer here so we have to choose it.


Page 1 out of 53 Pages