Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 21 out of 126 Pages

Topic 2: Exam Pool B

A Cisco Firepower administrator needs to configure a rule to allow a new application that
has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without
inspection? (Choose
two)


A.

permit


B.

trust


C.

reset


D.

allow


E.

monitor





B.
  

trust



E.
  

monitor



Each rule also has an action, which determines
whether you monitor, trust, block, or allow matching traffic.Note: With action “trust”,
Firepower does not do any more inspection on the traffic. There will be no intrusion
protection and also no file-policy on this traffic.

Refer to the exhibit.

An engineer configured wired 802.1x on the network and is unable to get a laptop to
authenticate. Which port configuration is missing?


A.

authentication open


B.

dotlx reauthentication


C.

cisp enable


D.

dot1x pae authenticator





D.
  

dot1x pae authenticator



In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?


A.

when there is a need for traditional anti-malware detection


B.

when there is no need to have the solution centrally managed


C.

when there is no firewall on the network


D.

when there is a need to have more advanced detection capabilities





D.
  

when there is a need to have more advanced detection capabilities



Endpoint protection platforms (EPP) prevent
endpoint security threats like known and unknown malware.Endpoint detection and
response (EDR) solutions can detect and respond to threats that your EPP and other
security tools did not catch.EDR and EPP have similar goals but are designed to fulfill
different purposes. EPP is designed to providedevice-level protection by identifying
malicious files, detecting potentially malicious activity, and providing tools for incident
investigation and response.The preventative nature of EPP complements proactive EDR.
EPP acts as the first line of defense, filtering out attacks that can be detected by the
organization’s deployed security solutions. EDR acts as a second layer of protection,
enabling security analysts to perform threat hunting and identify more subtle threats to the
endpoint.Effective endpoint defense requires a solution that integrates the capabilities of
both EDR and EPP to provide protection against cyber threats without overwhelming an
organization’s security team.

Which command enables 802.1X globally on a Cisco switch?


A.

dot1x system-auth-control


B.

dot1x pae authenticator


C.

authentication port-control aut


D.

aaa new-model





A.
  

dot1x system-auth-control



An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work?


A.

NetFlow


B.

NMAP


C.

SNMP


D.

DHCP





B.
  

NMAP



http://www.network-node.com/blog/2016/1/2/ise-20-profiling


Page 21 out of 126 Pages
Previous