Test Online Free Cisco 350-701 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 350-701 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)
Answer: Explanation:
Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.html
The two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint, face, and retina scans. Biometrics is used commonly in mobile devices).
Question 2Selectable Answer
Refer to the exhibit.
An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate.
Which port configuration is missing?
Answer:
Question 3Selectable Answer
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
Answer: Explanation:
SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives(“injects”) you an SQL statement that you will unknowingly run on your database.
For example:
Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a selectstring. The variable is fetched from user input (getRequestString):txtUserId = getRequestString(“UserId”);txtSQL = “SELECT * FROM Users WHERE UserId = ” + txtUserId;If user enter something like this: “100 OR 1=1” then the SzQL statement will look like this: SELECT * FROM Users WHERE UserId = 100 OR 1=1;The SQL above is valid and will return ALL rows from the “Users” table, since OR 1=1 is always TRUE. Ahacker might get access to all the user names and passwords in this database.
Question 5Selectable Answer
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
Answer:
Question 6Selectable Answer
Why would a user choose an on-premises ESA versus the CES solution?
Answer:
Question 7Selectable Answer
How is ICMP used an exfiltration technique?
Answer:
Question 8Selectable Answer
Which technology is used to improve web traffic performance by proxy caching?
Answer:
Question 9Selectable Answer
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
Answer: Explanation:
The ASA REST API gives you programmatic access to managing individual ASAs through a Representational State Transfer (REST) API. The API allows external clients to perform CRUD (Create, Read, Update, Delete) operations on ASA resources; it is based on the HTTPS protocol and REST methodology. All API requests are sent over HTTPS to the ASA, and a response is returned.
Request Structure Available request methods are:
GET C Retrieves data from the specified object.
PUT C Adds the supplied information to the specified object; returns a 404 Resource Not Found error if the object does not exist.
POST C Creates the object with the supplied information.
DELETE C Deletes the specified object
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Question 10Selectable Answer
What is a characteristic of Firepower NGIPS inline deployment mode?
Answer:
Question 11Selectable Answer
What is the primary benefit of deploying an ESA in hybrid mode?
Answer: Explanation:
Cisco Hybrid Email Security is a unique service offering that facilitates the deployment of your email security infrastructure both on premises and in the cloud. You can change the number of on-premises versus cloud users at any time throughout the term of your contract, assuming the total number of users does not change. This allows for deployment flexibility as your organization’s needs change.
Question 12Selectable Answer
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Answer: Explanation:
Malware means “malicious software”, is any software intentionally designed to cause damage to a computer, server, client, or computer network. The most popular types of malware includes viruses, ransomware and spyware. Virus Possibly the most common type of malware, viruses attach their malicious code to clean code and wait to be run.
Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. Spyware is spying software that can secretly record everything you enter, upload, download, and store on your computers or mobile devices. Spyware always tries to keep itself hidden. An exploit is a code that takes advantage of a software vulnerability or security flaw. Exploits and malware are two risks for endpoints that are not up to date. ARP spoofing and eavesdropping are attacks against the network while denial-of-service attack is based on the flooding of IP packets.
Question 13Selectable Answer
Which information is required when adding a device to Firepower Management Center?
Answer:
Question 14Selectable Answer
Which VPN technology can support a multivendor environment and secure traffic between sites?
Answer: Explanation:
FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-to-site VPN implementations. FlexVPN is a standards-based solution that can interoperate with non-Cisco IKEv2implementations. Therefore FlexVPN can support a multivendor environment. All of the three VPN technologies support traffic between sites (site-to-site or spoke-to-spoke).
Question 15Selectable Answer
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?