Download Cisco.350-701.NewDumps.2023-09-19.28q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Cisco.350-701.NewDumps.2023-09-19.28q.vcex
Size 669 KB
Posted Sep 19, 2023
Download Cisco.350-701.NewDumps.2023-09-19.28q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?


  1. security intelligence
  2. impact flags
  3. health monitoring
  4. URL filtering
Correct answer: A



Question 2

Refer to the exhibit. 
 
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?


  1. show authentication registrations
  2. show authentication method
  3. show dot1x all
  4. show authentication sessions
Correct answer: B



Question 3

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?


  1. Cisco Identity Services Engine and AnyConnect Posture module
  2. Cisco Stealthwatch and Cisco Identity Services Engine integration
  3. Cisco ASA firewall with Dynamic Access Policies configured
  4. Cisco Identity Services Engine with PxGrid services enabled
Correct answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html



Question 4

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)


  1. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
  2. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
  3. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
  4. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
  5. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Correct answer: BC
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html



Question 5

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?


  1. user input validation in a web page or web application
  2. Linux and Windows operating systems 
  3. database
  4. web page images
Correct answer: C
Explanation:
Reference: https://tools.cisco.com/security/center/resources/sql_injection
Reference: https://tools.cisco.com/security/center/resources/sql_injection



Question 6

Refer to the exhibit. 
 
What does the number 15 represent in this configuration?


  1. privilege level for an authorized user to this router
  2. access list that identifies the SNMP devices that can access the router
  3. interval in seconds between SNMPv3 authentication attempts
  4. number of possible failed attempts until the SNMPv3 user is locked out
Correct answer: B



Question 7

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?


  1. SNMP
  2. SMTP
  3. syslog
  4. model-driven telemetry
Correct answer: D
Explanation:
Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide



Question 8

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?


  1. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
  2. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
  3. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
  4. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Correct answer: B
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-cr-c4.html#wp6039879000
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-cr-c4.html#wp6039879000



Question 9

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. 


Correct answer: To work with this question, an Exam Simulator is required.
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/detecting_specific_threats.html
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/detecting_specific_threats.html



Question 10

Which two descriptions of AES encryption are true? (Choose two.) 


  1. AES is less secure than 3DES.
  2. AES is more secure than 3DES.
  3. AES can use a 168-bit key for encryption.
  4. AES can use a 256-bit key for encryption.
  5. AES encrypts and decrypts a key three times in sequence.
Correct answer: BD
Explanation:
Reference: https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html
Reference: https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files