Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 14 out of 126 Pages

Topic 2: Exam Pool B

What is a functional difference between a Cisco ASA and a Cisco IOS router with Zonebased
policy firewall?


A.

The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-
Based Policy Firewall starts out by allowing all traffic, even on untrusted interfaces


B.

The Cisco IOS router with Zone-Based Policy Firewall can be configured for high
availability, whereas the Cisco ASA cannot


C.

The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default,
whereas the Cisco ASA starts out by allowing all traffic until rules are added


D.

The Cisco ASA can be configured for high availability whereas the Cisco IOS router with
Zone-Based Policy Firewall cannot





A.
  

The Cisco ASA denies all traffic by default whereas the Cisco IOS router with Zone-
Based Policy Firewall starts out by allowing all traffic, even on untrusted interfaces



An organization has noticed an increase in malicious content downloads and wants to use
Cisco Umbrella to prevent this activity for suspicious domains while allowing normal web
traffic. Which action will accomplish this task?


A.

Set content settings to High


B.

Configure the intelligent proxy


C.

Use destination block lists


D.

Configure application block lists





B.
  

Configure the intelligent proxy



How is ICMP used an exfiltration technique?


A.

by flooding the destination host with unreachable packets


B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address


C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host


D.

by overwhelming a targeted host with ICMP echo-request packets





C.
  

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host



Refer to the exhibit.

What will happen when the Python script is executed?


A.

The hostname will be translated to an IP address and printed


B.

The hostname will be printed for the client in the client ID field


C.

The script will pull all computer hostnames and print them


D.

The script will translate the IP address to FODN and print it





C.
  

The script will pull all computer hostnames and print them



After a recent breach, an organization determined that phishing was used to gain initial
access to the network before regaining persistence. The information gained from the
phishing attack was a result of users visiting known malicious websites. What must be
done in order to prevent this from happening in the future?


A.

Modify an access policy


B.

Modify identification profiles


C.

Modify outbound malware scanning policies


D.

Modify web proxy settings





D.
  

Modify web proxy settings



Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmcconfig-
guidev60/Access_Control_Rules__URL_Filtering.html


Page 14 out of 126 Pages
Previous