Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 5 out of 52 pages Questions 41-50 out of 515 questions
Question#41

When configuring ISAKMP for IKEv1 Phase 1 on a Cisco IOS router, an administrator needs to input the command crypto isakmp key cisco address 0.0.0.0.
The administrator is not sure what the IP address in this command is used for. What would be the effect of changing the IP address from 0.0.0.0 to 1.2.3.4?

  • A. The key server that is managing the keys for the connection will be at 1.2.3.4.
  • B. The address that will be used as the crypto validation authority.
  • C. All IP addresses other than 1.2.3.4 will be allowed.
  • D. The remote connection will only be allowed from 1.2.3.4.
Discover Answer Hide Answer

D

Question#42

A network administrator is configuring SNMPv3 on a new router. The users have already been created, however an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?

  • A. define the encryption algorithm to be used by SNMPv3
  • B. set the password to be used for SNMPv3 authentication
  • C. map SNMPv3 users to SNMP views
  • D. specify the UDP port used by SNMP
Discover Answer Hide Answer

C

Question#43

DRAG DROP -
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.
Select and Place:

Discover Answer Hide Answer


Reference:
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2015/pdf/BRKNMS-3132.pdf

Question#44


Refer to the exhibit. When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?

  • A. Method
  • B. SAML Server
  • C. AAA Server Group
  • D. Group Policy
Discover Answer Hide Answer

C

Question#45

An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco
Firepower. Which feature should be used to accomplish this?

  • A. Network Discovery
  • B. Access Control
  • C. Packet Tracer
  • D. NetFlow
Discover Answer Hide Answer

D

Question#46

An engineer is implementing NTP authentication within their network and has configured both the client and server devices with the command ntp authentication-key 1 md5 Cisc392481137. The server at 1.1.1.1 is attempting to authenticate to the client at 1.1.1.2, however is unable to do so. Which command is required to enable the client to accept the server's authentication key?

  • A. ntp server 1.1.1.2 key 1
  • B. ntp peer 1.1.1.2 key 1
  • C. ntp server 1.1.1.1 key 1
  • D. ntp peer 1.1.1.1 key 1
Discover Answer Hide Answer

C
Reference:
https://www.oreilly.com/library/view/cisco-ios-cookbook/0596527225/ch14s13.html

Question#47

Due to a traffic storm on the network, two interfaces were error-disabled, and both interfaces sent SNMP traps. Which two actions must be taken to ensure that interfaces are put back into service? (Choose two.)

  • A. Enable the snmp-server enable traps command and wait 300 seconds.
  • B. Use EEM to have the ports return to service automatically in less than 300 seconds
  • C. Ensure that interfaces are configured with the error-disable detection and recovery feature.
  • D. Have Cisco Prime Infrastructure issue an SNMP set command to re-enable the ports after the preconfigured interval.
  • E. Enter the shutdown and no shutdown commands on the interfaces.
Discover Answer Hide Answer

CE

Question#48


Refer to the exhibit. An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD uses a registration key of Cisc392481137 and is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?

  • A. configure manager add <FMC IP address> <registration key> 16
  • B. configure manager add DONTRESOLVE <registration key> FTD123
  • C. configure manager add <FMC IP address> <registration key>
  • D. configure manager add DONTRESOLVE <registration key>
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_command_line_reference.html#ID-
2201-000004b4

Question#49

A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower.
What must be configured to accomplish this?

  • A. a Network Analysis policy to receive NetFlow data from the host
  • B. a File Analysis policy to send file data into Cisco Firepower
  • C. a Network Discovery policy to receive data from the host
  • D. a Threat Intelligence policy to download the data from the host
Discover Answer Hide Answer

C

Question#50

Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

  • A. file access from a different user
  • B. user login suspicious behavior
  • C. privilege escalation
  • D. interesting file access
Discover Answer Hide Answer

A

chevron rightPrevious Nextchevron right