Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 31 out of 126 Pages

Topic 1: Exam Pool A

What is a characteristic of traffic storm control behavior?


A.

Traffic storm control drops all broadcast and multicast traffic if the combined traffic
exceeds the level within the interval.


B.

Traffic storm control cannot determine if the packet is unicast or broadcast


C.

Traffic storm control monitors incoming traffic levels over a 10-second traffic storm
control interval.


D.

Traffic storm control uses the Individual/Group bit in the packet source address to
determine if the packet is unicast or broadcast





A.
  

Traffic storm control drops all broadcast and multicast traffic if the combined traffic
exceeds the level within the interval.



An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?


A.

Configure security appliances to send syslogs to Cisco Stealthwatch Cloud


B.

Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud


C.

Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud


D.

Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco
Stealthwatch Cloud





D.
  

Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco
Stealthwatch Cloud



Which attack is preventable by Cisco ESA but not by the Cisco WSA?


A.

buffer overflow


B.

DoS


C.

SQL injection


D.

phishing





D.
  

phishing



What are two functions of secret key cryptography? (Choose two)


A.

key selection without integer factorization


B.

utilization of different keys for encryption and decryption


C.

utilization of large prime number iterations


D.

provides the capability to only know the key on one side


E.

utilization of less memory





B.
  

utilization of different keys for encryption and decryption



D.
  

provides the capability to only know the key on one side



What are the two most commonly used authentication factors in multifactor authentication?
(Choose two)


A.

biometric factor


B.

time factor


C.

confidentiality factor


D.

knowledge factor


E.

encryption factor





A.
  

biometric factor



D.
  

knowledge factor



https://www.cisco.com/c/en/us/products/security/what-is-multi-factorauthentication.htmlThe two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint,face, and retina scans. Biometrics is used commonly in mobile devices).


Page 31 out of 126 Pages
Previous