Leads4pass > Cisco > CCNP > 350-701 > 350-701 Online Practice Questions and Answers

350-701 Online Practice Questions and Answers

Questions 4

What must be used to share data between multiple security products?

A. Cisco Rapid Threat Containment

B. Cisco Platform Exchange Grid

C. Cisco Advanced Malware Protection

D. Cisco Stealthwatch Cloud

Buy Now
Questions 5

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)

A. Windows service

B. computer identity

C. user identity

D. Windows firewall

E. default browser

Buy Now
Questions 6

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

A. SNMP

B. SMTP

C. syslog

D. model-driven telemetry

Buy Now
Questions 7

What is a characteristic of traffic storm control behavior?

A. Traffic storm control drops all broadcast and multicast traffic if the combined traffic exceeds the level within the interval.

B. Traffic storm control cannot determine if the packet is unicast or broadcast.

C. Traffic storm control monitors incoming traffic levels over a 10-second traffic storm control interval.

D. Traffic storm control uses the Individual/Group bit in the packet source address to determine if the packet is unicast or broadcast.

Buy Now
Questions 8

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

A. multiple context mode

B. user deployment of Layer 3 networks

C. IPv6

D. clustering

Buy Now
Questions 9

Refer to the exhibit.

What will happen when the Python script is executed?

A. The hostname will be translated to an IP address and printed.

B. The hostname will be printed for the client in the client ID field.

C. The script will pull all computer hostnames and print them.

D. The script will translate the IP address to FODN and print it

Buy Now
Questions 10

Which feature does the laaS model provide?

A. granular control of data

B. dedicated, restricted workstations

C. automatic updates and patching of software

D. software-defined network segmentation

Buy Now
Questions 11

What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)

A. REST uses methods such as GET, PUT, POST, and DELETE.

B. REST codes can be compiled with any programming language.

C. REST is a Linux platform-based architecture.

D. The POST action replaces existing data at the URL path.

E. REST uses HTTP to send a request to a web service.

Buy Now
Questions 12

What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)

A. It is defined as a Transparent proxy deployment.

B. In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.

C. The PAC file, which references the proxy, is deployed to the client web browser.

D. It is defined as an Explicit proxy deployment.

E. It is defined as a Bridge proxy deployment.

Buy Now
Questions 13

A network administrator is setting up a site-to-site VPN from a Cisco FTD to a cloud environment. After the administrator configures the VPN on both sides, they still cannot reach the cloud environment. Which command must the administrator run on the FTD to verify that the VPN is encrypting traffic in both directions?

A. show crypto ipsec sa

B. show crypto ipsec stats

C. show vpn-sessiondb detail l2l

D. show crypto isakmp sa

Buy Now
Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
Last Update: Oct 21, 2024
Questions: 753
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99