Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 24 out of 52 pages Questions 231-240 out of 515 questions
Question#231

How is data sent out to the attacker during a DNS tunneling attack?

  • A. as part of the domain name
  • B. as part of the UDP/53 packet payload
  • C. as part of the TCP/53 packet header
  • D. as part of the DNS response packet
Discover Answer Hide Answer

A
Reference:
https://www.infoblox.com/glossary/dns-tunneling/

Question#232


Refer to the exhibit. A Cisco ISE administrator adds a new switch to an 802. 1X deployment and has difficulty with some endpoints gaining access. Most PCs and
IP phones can connect and authenticate using their machine certificate credentials; however, printers and video cameras cannot. Based on the interface configuration provided, what must be done to get these devices onto the network using Cisco ISE for authentication and authorization while maintaining security controls?

  • A. Configure authentication event fail retry 2 action authorize vlan 41 on the interface.
  • B. Add mab to the interface configuration.
  • C. Enable insecure protocols within Cisco ISE in the allowed protocols configuration.
  • D. Change the default policy in Cisco ISE to allow all devices not using machine authentication.
Discover Answer Hide Answer

D

Question#233

Cisco SensorBase gathers threat information from a variety of Cisco products and services and performs analytics to find pattern on threats. Which term describes this process?

  • A. authoring
  • B. consumption
  • C. deployment
  • D. sharing
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/security_management/cisco_security_manager/security_manager/414/user/guide/CSMUserGuide/ ipsglobe.html

Question#234


Refer to the exhibit. What will occur when this device tries to connect to the port?

  • A. 802. 1X will not work, but MAB will start and allow the device on the network.
  • B. 802. 1X will work and the device will be allowed on the network.
  • C. 802. 1X will not work and the device will not be allowed network access.
  • D. 802. 1X and MAB will both be used and ISE can use policy to determine the access level.
Discover Answer Hide Answer

D

Question#235

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

  • A. flow insight variation
  • B. software package variation
  • C. interpacket variation
  • D. process details variation
Discover Answer Hide Answer

C

Question#236

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

  • A. SNMP
  • B. SMTP
  • C. syslog
  • D. model-driven telemetry
Discover Answer Hide Answer

D
Reference:
https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide

Question#237

What two mechanisms are used to redirect users to a web portal to authenticate to ISE for guest services? (Choose two.)

  • A. TACACS+
  • B. central web auth
  • C. single sign-on
  • D. multiple factor auth
  • E. local web auth
Discover Answer Hide Answer

BE
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_01110.html

Question#238

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

  • A. RSA SecureID
  • B. Internal Database
  • C. Active Directory
  • D. LDAP
Discover Answer Hide Answer

C

Question#239

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

  • A. Cisco Identity Services Engine and AnyConnect Posture module
  • B. Cisco Stealthwatch and Cisco Identity Services Engine integration
  • C. Cisco ASA firewall with Dynamic Access Policies configured
  • D. Cisco Identity Services Engine with PxGrid services enabled
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/ configure-posture.html

Question#240

Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?

  • A. Cisco Identity Services Engine
  • B. Cisco Enterprise Security Appliance
  • C. Cisco Web Security Appliance
  • D. Cisco Advanced Stealthwatch Appliance
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right