350-701試験問題集でPDF問題とテストエンジン [Q323-Q344]

Share

350-701試験問題集でPDF問題とテストエンジン

350-701問題集で必ず試験合格させる


Cisco 350-701 認定試験の出題範囲:

トピック出題範囲
トピック 1
  • Identify Security Capabilities, Deployment Models, And Policy Management To Secure The Cloud
  • Security Assessment In The Cloud
トピック 2
  • Configure And Verify Network Infrastructure Security Methods
  • Configure AAA For Device And Network Access
トピック 3
  • Cloud-Delivered Security Solutions Such As Firewall, Management, Proxy, Security Intelligence, And CASB
  • Identify Security Solutions For Cloud Environments
トピック 4
  • Implement Management Options For Network Security Solutions Such As Intrusion Prevention And Perimeter Security
トピック 5
  • Compare Common Security Vulnerabilities Such As Software Bugs
  • Describe Functions Of The Cryptography Components Such As Hashing, Encryption
トピック 6
  • Compare Network Security Solutions That Provide Intrusion Prevention And Firewall Capabilities
  • Configure Secure Network Management Of Perimeter Security And Infrastructure Devices
トピック 7
  • Describe Deployment Models Of Network Security Solutions And Architectures That Provide Intrusion Prevention And Firewall Capabilities
トピック 8
  • Describe The Concept Of Devsecops (CI
  • CD Pipeline, Container Orchestration, And Security
  • Describe The Components, Capabilities, And Benefits Of Cisco Umbrella

 

質問 323
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.

正解:

解説:

 

質問 324
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.

正解:

解説:

 

質問 325
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A. database
  • B. Linux and Windows operating systems
  • C. user input validation in a web page or web application
  • D. web page images

正解: C

解説:
SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives ("injects") you an SQL statement that you will unknowingly run on your database. For example:
Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select string. The variable is fetched from user input (getRequestString):
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
If user enter something like this: "100 OR 1=1" then the SQL statement will look like this:
SELECT * FROM Users WHERE UserId = 100 OR 1=1;
The SQL above is valid and will return ALL rows from the "Users" table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database.

 

質問 326
Which functions of an SDN architecture require southbound APIs to enable communication?

  • A. management console and the cloud
  • B. SDN controller and the network elements
  • C. SDN controller and the cloud
  • D. management console and the SDN controller

正解: B

解説:
Explanation
The Southbound API is used to communicate between Controllers and network devices

 

質問 327
Which attribute has the ability to change during the RADIUS CoA?

  • A. Authorization
  • B. Membership
  • C. NTP
  • D. Accessibility

正解: A

解説:
The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated.
The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated.
Reference:
sy-book/sec-rad-coa.html
The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated.
sy-book/sec-rad-coa.html

 

質問 328
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

  • A. Protect against input validation and character escapes in the endpoint.
  • B. Install a spam and virus email filter.
  • C. Protect systems with an up-to-date antimalware program.
  • D. Perform backups to the private cloud.
  • E. Patch for cross-site scripting.

正解: B,C

 

質問 329
In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two)

  • A. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
  • B. It allows multiple security products to share information and work together to enhance security posture in the network.
  • C. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID).
  • D. It integrates with third-party products to provide better visibility throughout the network.
  • E. It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.

正解: A,C

解説:
Easy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity. Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/trustsec-witheasy-connect-configuration-guide.pdf Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity.
Easy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity. Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/trustsec-witheasy-connect-configuration-guide.pdf

 

質問 330
What are two functionalities of SDN Northbound APIs? (Choose two.)

  • A. Northbound APIs provide a programmable interface for applications to dynamically configure the network.
  • B. Northbound APIs form the interface between the SDN controller and the network switches or routers.
  • C. Northbound APIs form the interface between the SDN controller and business applications.
  • D. OpenFlow is a standardized northbound API protocol.
  • E. Northbound APIs use the NETCONF protocol to communicate with applications.

正解: A,C

 

質問 331
Which attack is preventable by Cisco ESA but not by the Cisco WSA?

  • A. phishing
  • B. SQL injection
  • C. buffer overflow
  • D. DoS

正解: A

解説:
The following are the benefits of deploying Cisco Advanced Phishing Protection on the Cisco Email Security Gateway: Prevents the following: + Attacks that use compromised accounts and social engineering. + Phishing, ransomware, zero-day attacks and spoofing. + BEC with no malicious payload or URL. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5/user_guide/b_ESA_Admin_Guide_13- 5/m_advanced_phishing_protection.html Gateway:
Prevents the following:
+ Attacks that use compromised accounts and social engineering.
+ Phishing, ransomware, zero-day attacks and spoofing.
+ BEC with no malicious payload or URL.
Reference:
The following are the benefits of deploying Cisco Advanced Phishing Protection on the Cisco Email Security Gateway: Prevents the following: + Attacks that use compromised accounts and social engineering. + Phishing, ransomware, zero-day attacks and spoofing. + BEC with no malicious payload or URL. Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5/user_guide/b_ESA_Admin_Guide_13- 5/m_advanced_phishing_protection.html

 

質問 332
Which suspicious pattern enables the Cisco Tetration platform to learn the normal behavior of users?

  • A. privilege escalation
  • B. user login suspicious behavior
  • C. file access from a different user
  • D. interesting file access

正解: B

 

質問 333
Drag and drop the exploits from the left onto the type of security vulnerability on the right.

正解:

解説:

 

質問 334
Which risk is created when using an Internet browser to access cloud-based service?

  • A. vulnerabilities within protocol
  • B. insecure implementation of API
  • C. misconfiguration of Infra, which allows unauthorized access
  • D. intermittent connection to the cloud connectors

正解: A

 

質問 335
How does Cisco Advanced Phishing Protection protect users?

  • A. It determines which identities are perceived by the sender
  • B. It validates the sender by using DKIM.
  • C. It utilizes sensors that send messages securely.
  • D. It uses machine learning and real-time behavior analytics.

正解: D

解説:
Cisco Advanced Phishing Protection provides sender authentication and BEC detection capabilities. It uses advanced machine learning techniques, real-time behavior analytics, relationship modeling, and telemetry to protect against identity deception-based threats.
Cisco Advanced Phishing Protection provides sender authentication and BEC detection capabilities. It uses advanced machine learning techniques, real-time behavior analytics, relationship modeling, and telemetry to protect against identity deception-based threats.
Reference:
Cisco Advanced Phishing Protection provides sender authentication and BEC detection capabilities. It uses advanced machine learning techniques, real-time behavior analytics, relationship modeling, and telemetry to protect against identity deception-based threats.

 

質問 336
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

  • A. File Analysis
  • B. Destination Lists
  • C. SafeSearch
  • D. SSL Decryption

正解: D

解説:
SSL Decryption is an important part of the Umbrella Intelligent Proxy. he feature allows the Intelligent Proxy to go beyond simply inspecting normal URLs and actually proxy and inspect traffic that's sent over HTTPS. The SSL Decryption feature does require the root certificate be installed. Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy SSL Decryption is an important part of the Umbrella Intelligent Proxy. he feature allows the Intelligent Proxy to go beyond simply inspecting normal URLs and actually proxy and inspect traffic that's sent over HTTPS. The SSL Decryption feature does require the root certificate be installed. Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy

 

質問 337
In a PaaS model, which layer is the tenant responsible for maintaining and patching?

  • A. network
  • B. application
  • C. virtual machine
  • D. hypervisor

正解: B

解説:
Explanation/Reference: https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/

 

質問 338
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?

  • A. Modify outbound malware scanning policies
  • B. Modify identification profiles.
  • C. Modify web proxy settings
  • D. Modify an access policy.

正解: C

解説:

 

質問 339
What is the intent of a basic SYN flood attack?

  • A. to cause the buffer to overflow
  • B. to exceed the threshold limit of the connection queue
  • C. to flush the register stack to re-initiate the buffers
  • D. to solicit DNS responses

正解: B

 

質問 340
An administrator is trying to determine which applications are being used in the network but does not want the network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?

  • A. Packet Tracer
  • B. Access Control
  • C. Network Discovery
  • D. NetFlow

正解: C

解説:
NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated by NetFlow-enabled routers and switches. The flows do not contain actual packet data, but rather the metadata for communications. It is a standard form of session data that details who, what, when, and where of network traffic -> Answer A is not correct.
NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated by NetFlow-enabled routers and switches. The flows do not contain actual packet data, but rather the metadata for communications. It is a standard form of session data that details who, what, when, and where of network traffic -> Answer A is not correct.
NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data generated by NetFlow-enabled routers and switches. The flows do not contain actual packet data, but rather the metadata for communications. It is a standard form of session data that details who, what, when, and where of network traffic -> Answer A is not correct.
Reference:
white-paper-c11-736595.html
white-paper-c11-736595.html

 

質問 341
An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

  • A. TCP 49
  • B. UDP 1812
  • C. UDP 1700
  • D. TCP 6514

正解: C

解説:
CoA Messages are sent on two different udp ports depending on the platform. Cisco standardizes on UDP port
1700, while the actual RFC calls out using UDP port 3799.

 

質問 342
What is a benefit of using Cisco FMC over Cisco ASDM?

  • A. Cisco FMC supports all firewall products whereas Cisco ASDM only supports Cisco ASA devices
  • B. Cisco FMC uses Java while Cisco ASDM uses HTML5.
  • C. Cisco FMC provides centralized management while Cisco ASDM does not.
  • D. Cisco FMC supports pushing configurations to devices while Cisco ASDM does not.

正解: A

解説:
Explanation
https://www.cisco.com/c/en/us/td/docs/security/firepower/compatibility/firepower-compatibility.html

 

質問 343
With which components does a southbound API within a software-defined network architecture communicate?

  • A. appliances
  • B. applications
  • C. controllers within the network
  • D. devices such as routers and switches

正解: D

解説:

The Southbound API is used to communicate between Controllers and network devices.

 

質問 344
......

合格させるCisco 350-701試験最速合格にはJPNTest:https://www.jpntest.com/shiken/350-701-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡