Telechargé par Exams Buzz

Dumpscafe Cisco-350-701

publicité
Cisco
350-701
Implementing and
Operating Cisco
Security Core
Technologies (SCOR
350-701)
Version: Demo
[ Total Questions: 10]
Web: www.dumpscafe.com
Email: [email protected]
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at [email protected]
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at [email protected] and our technical experts will provide support within 24 hours.
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
Pass Exam
Cisco - 350-701
Exam Topic Breakdown
Exam Topic
Number of Questions
Topic 3 : Exam Pool C
4
Topic 1 : Exam Pool A
4
Topic 2 : Exam Pool B
2
TOTAL
10
Verified Solution - 100% Result
1 of 7
Pass Exam
Cisco - 350-701
Topic 3, Exam Pool C
Question #:1 - (Exam Topic 3)
What are two functions of IKEv1 but not IKEv2? (Choose two)
A. NAT-T is supported in IKEv1 but rot in IKEv2.
B. With IKEv1, when using aggressive mode, the initiator and responder identities are passed cleartext
C. With IKEv1, mode negotiates faster than main mode
D. IKEv1 uses EAP authentication
E. IKEv1 conversations are initiated by the IKE_SA_INIT message
Answer: C E
Question #:2 - (Exam Topic 3)
Which solution for remote workers enables protection, detection, and response on the endpoint against known
and unknown threats?
A. Cisco AMP for Endpoints
B. Cisco AnyConnect
C. Cisco Umbrella
D. Cisco Duo
Answer: A
Question #:3 - (Exam Topic 3)
Refer to the exhibit.
Verified Solution - 100% Result
2 of 7
Pass Exam
Cisco - 350-701
How does Cisco Umbrella manage traffic that is directed toward risky domains?
A. Traffic is proximed through the intelligent proxy.
B. Traffic is managed by the security settings and blocked.
C. Traffic is managed by the application settings, unhandled and allowed.
D. Traffic is allowed but logged.
Answer: B
Question #:4 - (Exam Topic 3)
Which API method and required attribute are used to add a device into Cisco DNA Center with the native
API?
A. GET and serialNumber
B. userSudiSerlalNos and deviceInfo
C. POST and name
D. lastSyncTime and pid
Answer: A
Verified Solution - 100% Result
3 of 7
Pass Exam
Cisco - 350-701
Topic 1, Exam Pool A
Question #:5 - (Exam Topic 1)
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group.
Which
probe must be enabled for this type of profiling to work?
A. NetFlow
B. NMAP
C. SNMP
D. DHCP
Answer: B
Reference:
http://www.network-node.com/blog/2016/1/2/ise-20-profiling
Question #:6 - (Exam Topic 1)
Why would a user choose an on-premises ESA versus the CES solution?
A. Sensitive data must remain onsite.
B. Demand is unpredictable.
C. The server team wants to outsource this service.
D. ESA is deployed inline.
Answer: A
Question #:7 - (Exam Topic 1)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
A. biometric factor
B. time factor
C. confidentiality factor
D.
Verified Solution - 100% Result
4 of 7
Pass Exam
Cisco - 350-701
D. knowledge factor
E. encryption factor
Answer: A D
Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.htmlThe two
most popular authentication factors are knowledge and inherent (including biometrics like fingerprint,face, and
retina scans. Biometrics is used commonly in mobile devices).
Question #:8 - (Exam Topic 1)
Which information is required when adding a device to Firepower Management Center?
A. username and password
B. encryption method
C. device serial number
D. registration key
Answer: D
Verified Solution - 100% Result
5 of 7
Pass Exam
Cisco - 350-701
Topic 2, Exam Pool B
Question #:9 - (Exam Topic 2)
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
A. SDP
B. LDAP
C. subordinate CA
D. SCP
E. HTTP
Answer: B E
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pki-overv
Question #:10 - (Exam Topic 2)
Refer to the exhibit.
An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is
complaining that an IP address is not being obtained. Which command should be configured on the switch
interface in order to provide the user with network connectivity?
A. ip dhcp snooping verify mac-address
B. ip dhcp snooping limit 41
C. ip dhcp snooping vlan 41
D. ip dhcp snooping trust
Verified Solution - 100% Result
6 of 7
Pass Exam
Cisco - 350-701
Answer: D
Explanation
Explanation To understand DHCP snooping we need to learn about DHCP spoofing attack first.
DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers
them with fake DHCP Response before the authorized DHCP Response comes to the clients. The fake DHCP
Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go
through the attacker computer, the attacker becomes a “man-in-the-middle”.The attacker can have some ways
to make sure its fake DHCP Response arrives first. In fact, if the attacker is “closer” than the DHCP Server
then he doesn’t need to do anything. Or he can DoS the DHCP Server so that it can’t send the DHCP
Response.DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature
thatdetermines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.
Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP
messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is
seen on an untrusted port, the port is shut down.
The port connected to a DHCP server should be configured as trusted port with the “ip dhcp snooping trust”
command. Other ports connecting to hosts are untrusted ports by default.
In this question, we need to configure the uplink to “trust” (under interface Gi1/0/1) as shown below.
Verified Solution - 100% Result
7 of 7
About dumpscafe.com
dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: [email protected]
Feedback: [email protected]
Support: [email protected]
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.
Téléchargement