350-701 Exam Questions

Total 626 Questions

Last Updated Exam : 15-Apr-2025

Topic 1: Exam Pool A

Refer to the exhibit.

Which statement about the authentication protocol used in the configuration is true?


A.

The authentication request contains only a password


B.

The authentication request contains only a username


C.

The authentication and authorization requests are grouped in a single packet


D.

There are separate authentication and authorization request packets





C.
  

The authentication and authorization requests are grouped in a single packet



ExplanationThis command uses RADIUS which combines authentication
and authorization in one function (packet).

Which cloud model is a collaborative effort where infrastructure is shared and jointly
accessed by several
organizations from a specific group?


A.

Hybrid


B.

Community


C.

Private


D.

Public





B.
  

Community



Community Cloud allows system and services to be accessible
by group of organizations. It shares theinfrastructure between several organizations from a
specific community. It may be managed internally byorganizations or by the third-party.

A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on
a trusted interface.
How does the switch behave in this situation?


A.

It forwards the packet after validation by using the MAC Binding Table.


B.

It drops the packet after validation by using the IP & MAC Binding Table


C.

It forwards the packet without validation


D.

It drops the packet without validation





C.
  

It forwards the packet without validation



What are two DDoS attack categories? (Choose two)


A.

sequential


B.

protocol


C.

database


D.

volume-based


E.

screen-based





B.
  

protocol



D.
  

volume-based



There are three basic categories of attack:+
volume-based attacks, which use high traffic to inundate the network bandwidth+ protocol attacks, which focus on exploiting server resources+ application attacks, which focus on
web applications and are considered the most sophisticated and serious type of attacks
Reference: https://www.esecurityplanet.com/networks/types-of-ddos-attacks/

An administrator is configuring a DHCP server to better secure their environment. They
need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped.
How would this be accomplished?


A.

Set a trusted interface for the DHCP server


B.

Set the DHCP snooping bit to 1


C.

Add entries in the DHCP snooping database


D.

Enable ARP inspection for the required VLAN





A.
  

Set a trusted interface for the DHCP server



To understand DHCP snooping we need to learn about DHCP
spoofing attack first.

In which cloud services model is the tenant responsible for virtual machine OS patching?


A.

IaaS


B.

UCaaS


C.

PaaS


D.

SaaS





A.
  

IaaS



ExplanationOnly in On-site (on-premises) and IaaS we (tenant) manage
O/S (Operating System).

In which two ways does Easy Connect help control network access when used with Cisco
TrustSec? (Choose two)


A.

It allows multiple security products to share information and work together to enhance
security posture in the network.


B.

It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.


C.

It allows for the assignment of Security Group Tags and does not require 802.1x to be
configured on the switch or the endpoint.


D.

It integrates with third-party products to provide better visibility throughout the network.


E.

It allows for managed endpoints that authenticate to AD to be mapped to Security
Groups (PassiveID).





C.
  

It allows for the assignment of Security Group Tags and does not require 802.1x to be
configured on the switch or the endpoint.



E.
  

It allows for managed endpoints that authenticate to AD to be mapped to Security
Groups (PassiveID).



Refer to the exhibit.

An administrator is adding a new Cisco FTD device to their network and wants to manage it
with Cisco FMC.
The Cisco FTD is not behind a NAT device. Which command is needed to enable this on
the Cisco FTD?


A.

configure manager add DONTRESOLVE kregistration key>


B.

configure manager add <FMC IP address> <registration key> 16


C.

configure manager add DONTRESOLVE <registration key> FTD123


D.

configure manager add <FMC IP address> <registration key>





D.
  

configure manager add <FMC IP address> <registration key>



Which two deployment model configurations are supported for Cisco FTDv in AWS?
(Choose two)


A.

Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS


B.

Cisco FTDv with one management interface and two traffic interfaces configured


C.

Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises


D.

Cisco FTDv with two management interfaces and one traffic interface configured


E.

Cisco FTDv configured in routed mode and IPv6 configured





A.
  

Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS



C.
  

Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises



What are the two types of managed Intercloud Fabric deployment models? (Choose two)


A.

Service Provider managed


B.

Public managed


C.

Hybrid managed


D.

User managed


E.

Enterprise managed





E.
  

Enterprise managed




Page 14 out of 63 Pages
Previous