Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 7 out of 52 pages Questions 61-70 out of 515 questions
Question#61

An engineer is configuring their router to send NetfFow data to Stealthwatch which has an IP address of 1.1.1.1 using the flow record Stealthwatch406143794 command. Which additional command is required to complete the flow record?

  • A. cache timeout active 60
  • B. destination 1.1.1.1
  • C. match ipv4 ttl
  • D. transport udp 2055
Discover Answer Hide Answer

C
Reference:
https://www.cisco.com/c/dam/en/us/td/docs/security/stealthwatch/netflow/config-trouble-netflow-stealth.pdf

Question#62

An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?

  • A. Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE.
  • B. Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE.
  • C. Modify the current policy with the condition MFA: SourceSequence:DUO=true in the authorization conditions within Cisco ISE.
  • D. Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.
Discover Answer Hide Answer

B
Reference:
https://duo.com/docs/authproxy-reference

Question#63

What is the function of the crypto isakmp key cisc406143794 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?

  • A. It prevents all IP addresses from connecting to the VPN server.
  • B. It configures the pre-shared authentication key.
  • C. It configures the local address for the VPN server.
  • D. It defines what data is going to be encrypted via the VPN.
Discover Answer Hide Answer

B
This command is used to configure pre-shared-key for IPsec remote acess users on the Cisco router. Address is mentioned as 0.0.0.0 0.0.0.0 because the users will be connecting from random ip addresses and it is almost impossible to mention all the ip addresses. Hence, 0.0.0.0 0.0.0.0 is used to allow all public ip addresses.

Question#64

An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?

  • A. Only requests that originate from a configured NAS IP are accepted by a RADIUS server.
  • B. The RADIUS authentication key is transmitted only from the defined RADIUS source interface.
  • C. RADIUS requests are generated only by a router if a RADIUS source interface is defined.
  • D. Encrypted RADIUS authentication requires the RADIUS source interface be defined.
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfrad.html#wp1027454

Question#65

Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

  • A. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
  • B. A sysopt command can be used to enable NSEL on a specific interface.
  • C. NSEL can be used without a collector configured.
  • D. A flow-export event type must be defined under a policy.
Discover Answer Hide Answer

D

Question#66

Which feature requires a network discovery policy on the Cisco Firepower NGIPS?

  • A. security intelligence
  • B. impact flags
  • C. health monitoring
  • D. URL filtering
Discover Answer Hide Answer

B

Question#67

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

  • A. correlation
  • B. intrusion
  • C. access control
  • D. network discovery
Discover Answer Hide Answer

D

Question#68

What is a characteristic of traffic storm control behavior?

  • A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.
  • B. Traffic storm control cannot determine if the packet is unicast or broadcast.
  • C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.
  • D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/td/docs/routers/7600/ios/12-1E/configuration/guide/storm.html

Question#69

DRAG DROP -
Drag and drop the Firepower Next Generation Intrusion Prevention System detectors from the left onto the correct definitions on the right.
Select and Place:

Discover Answer Hide Answer


Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-config-guide-v64/detecting_specific_threats.html

Question#70


Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?

  • A. The authentication request contains only a password
  • B. The authentication request contains only a username
  • C. The authentication and authorization requests are grouped in a single packet.
  • D. There are separate authentication and authorization request packets.
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right