Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Version: Demo [ Total Questions: 10] Web: www.dumpscafe.com Email: [email protected] IMPORTANT NOTICE Feedback We have developed quality product and state-of-art service to ensure our customers interest. If you have any suggestions, please feel free to contact us at [email protected] Support If you have any questions about our product, please provide the following items: exam code screenshot of the question login id/email please contact us at [email protected] and our technical experts will provide support within 24 hours. Copyright The product of each order has its own encryption code, so you should use it independently. Any unauthorized changes will inflict legal punishment. We reserve the right of final explanation for this statement. Pass Exam Cisco - 350-701 Exam Topic Breakdown Exam Topic Number of Questions Topic 3 : Exam Pool C 4 Topic 1 : Exam Pool A 4 Topic 2 : Exam Pool B 2 TOTAL 10 Verified Solution - 100% Result 1 of 7 Pass Exam Cisco - 350-701 Topic 3, Exam Pool C Question #:1 - (Exam Topic 3) What are two functions of IKEv1 but not IKEv2? (Choose two) A. NAT-T is supported in IKEv1 but rot in IKEv2. B. With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext C. With IKEv1, mode negotiates faster than main mode D. IKEv1 uses EAP authentication E. IKEv1 conversations are initiated by the IKE_SA_INIT message Answer: C E Question #:2 - (Exam Topic 3) Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats? A. Cisco AMP for Endpoints B. Cisco AnyConnect C. Cisco Umbrella D. Cisco Duo Answer: A Question #:3 - (Exam Topic 3) Refer to the exhibit. Verified Solution - 100% Result 2 of 7 Pass Exam Cisco - 350-701 How does Cisco Umbrella manage traffic that is directed toward risky domains? A. Traffic is proximed through the intelligent proxy. B. Traffic is managed by the security settings and blocked. C. Traffic is managed by the application settings, unhandled and allowed. D. Traffic is allowed but logged. Answer: B Question #:4 - (Exam Topic 3) Which API method and required attribute are used to add a device into Cisco DNA Center with the native API? A. GET and serialNumber B. userSudiSerlalNos and deviceInfo C. POST and name D. lastSyncTime and pid Answer: A Verified Solution - 100% Result 3 of 7 Pass Exam Cisco - 350-701 Topic 1, Exam Pool A Question #:5 - (Exam Topic 1) An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work? A. NetFlow B. NMAP C. SNMP D. DHCP Answer: B Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling Question #:6 - (Exam Topic 1) Why would a user choose an on-premises ESA versus the CES solution? A. Sensitive data must remain onsite. B. Demand is unpredictable. C. The server team wants to outsource this service. D. ESA is deployed inline. Answer: A Question #:7 - (Exam Topic 1) What are the two most commonly used authentication factors in multifactor authentication? (Choose two) A. biometric factor B. time factor C. confidentiality factor D. Verified Solution - 100% Result 4 of 7 Pass Exam Cisco - 350-701 D. knowledge factor E. encryption factor Answer: A D Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.htmlThe two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint,face, and retina scans. Biometrics is used commonly in mobile devices). Question #:8 - (Exam Topic 1) Which information is required when adding a device to Firepower Management Center? A. username and password B. encryption method C. device serial number D. registration key Answer: D Verified Solution - 100% Result 5 of 7 Pass Exam Cisco - 350-701 Topic 2, Exam Pool B Question #:9 - (Exam Topic 2) For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two) A. SDP B. LDAP C. subordinate CA D. SCP E. HTTP Answer: B E Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pki-overv Question #:10 - (Exam Topic 2) Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity? A. ip dhcp snooping verify mac-address B. ip dhcp snooping limit 41 C. ip dhcp snooping vlan 41 D. ip dhcp snooping trust Verified Solution - 100% Result 6 of 7 Pass Exam Cisco - 350-701 Answer: D Explanation Explanation To understand DHCP snooping we need to learn about DHCP spoofing attack first. DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers them with fake DHCP Response before the authorized DHCP Response comes to the clients. The fake DHCP Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go through the attacker computer, the attacker becomes a “man-in-the-middle”.The attacker can have some ways to make sure its fake DHCP Response arrives first. In fact, if the attacker is “closer” than the DHCP Server then he doesn’t need to do anything. Or he can DoS the DHCP Server so that it can’t send the DHCP Response.DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature thatdetermines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted. Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down. The port connected to a DHCP server should be configured as trusted port with the “ip dhcp snooping trust” command. Other ports connecting to hosts are untrusted ports by default. In this question, we need to configure the uplink to “trust” (under interface Gi1/0/1) as shown below. Verified Solution - 100% Result 7 of 7 About dumpscafe.com dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam Questions, Study Guides, Practice Tests. We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on. View list of all certification exams: All vendors We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed below. Sales: [email protected] Feedback: [email protected] Support: [email protected] Any problems about IT certification or our products, You can write us back and we will get back to you within 24 hours.