350-701 Exam Questions

Total 626 Questions

Last Updated Exam : 15-Apr-2025

Topic 1: Exam Pool A

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.
Which task can you perform to determine where each message was lost?


A.

Configure the trackingconfig command to enable message tracking.


B.

Generate a system report.


C.

Review the log files.


D.

Perform a trace.





A.
  

Configure the trackingconfig command to enable message tracking.



https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-
0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011110.ht
ml

Which cryptographic process provides origin confidentiality, integrity, and origin
authentication for packets?


A.

IKEv1


B.

AH


C.

ESP


D.

IKEv2





C.
  

ESP



Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)


A.

RADIUS


B.

TACACS+


C.

DHCP


D.

sFlow


E.

SMTP





A.
  

RADIUS



C.
  

DHCP



An organization is receiving SPAM emails from a known malicious domain. What must be
configured in order to
prevent the session during the initial TCP communication?


A.

Configure the Cisco ESA to drop the malicious emails


B.

Configure policies to quarantine malicious emails


C.

Configure policies to stop and reject communication


D.

Configure the Cisco ESA to reset the TCP connection





A.
  

Configure the Cisco ESA to drop the malicious emails



Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?


A.

transparent


B.

redirection


C.

forward


D.

proxy gateway





A.
  

transparent



What is managed by Cisco Security Manager?


A.

access point


B.

WSA


C.

ASA


D.

ESA





C.
  

ASA



Which type of protection encrypts RSA keys when they are exported and imported?


A.

file


B.

passphrase


C.

NGE


D.

nonexportable





B.
  

passphrase



Which two fields are defined in the NetFlow flow? (Choose two)


A.

type of service byte


B.

class of service bits


C.

Layer 4 protocol type


D.

destination port


E.

output logical interface





A.
  

type of service byte



D.
  

destination port



Cisco standard NetFlow version 5 defines a flow as
a unidirectional sequence of packets that all share seven values which define a unique key
for the flow:+ Ingress interface (SNMP ifIndex)+ Source IP address+ Destination IP
address+ IP protocol+ Source port for UDP or TCP, 0 for other protocols+ Destination port
for UDP or TCP, type and code for ICMP, or 0 for other protocols+ IP Type of ServiceNote:
A flow is a unidirectional series of packets between a given source and destination.

Which type of dashboard does Cisco DNA Center provide for complete control of the
network?


A.

service management


B.

centralized management


C.

application management


D.

distributed management





B.
  

centralized management



Reference: https://www.cisco.com/c/en/us/products/collateral/cloud-systemsmanagement/
dna-center/nb-06- dna-center-faq-cte-en.html

Why is it important to implement MFA inside of an organization?


A.

To prevent man-the-middle attacks from being successful.


B.

To prevent DoS attacks from being successful.


C.

To prevent brute force attacks from being successful


D.

To prevent phishing attacks from being successful.





C.
  

To prevent brute force attacks from being successful




Page 20 out of 63 Pages
Previous