Free Cisco 350-701 Exam Actual Questions

The questions for 350-701 were last updated On Dec 16, 2024

Question No. 1

Refer to the exhibit.

What will occur when this device tries to connect to the port?

Show Answer Hide Answer
Correct Answer: B

Question No. 2

An organization wants to secure users, data, and applications in the cloud. The solution must be API-based and

operate as a cloud-native CASB. Which solution must be used for this implementation?

Show Answer Hide Answer
Correct Answer: A

Cisco Cloudlock: Secure your cloud users, data, and applications with the cloud-native Cloud Access Security

Broker (CASB) and cloud cybersecurity platform.


738565.pdf

Question No. 3

Which Cisco security solution protects remote users against phishing attacks when they are not connected to

the VPN?

Show Answer Hide Answer
Correct Answer: B

Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations -- before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent. Cisco Umbrella roaming protects your employees even when they are off the VPN.


Question No. 4

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention

System?

Show Answer Hide Answer
Correct Answer: D

The Firepower System uses network discovery and identity policies to collect host, application, and user data

for traffic on your network. You can use certain types of discovery and identity data to build a comprehensive

map of your network assets, perform forensic analysis, behavioral profiling, access control, and mitigate and

respond to the vulnerabilities and exploits to which your organization is susceptible.

You can configure your network discovery policy to perform host and application detection.


Question No. 5

What is the difference between deceptive phishing and spear phishing?

Show Answer Hide Answer
Correct Answer: B

In deceptive phishing, fraudsters impersonate a legitimate company in an attempt to steal people's personal data or login credentials. Those emails frequently use threats and a sense of urgency to scare users into doing what the attackers want.

Spear phishing is carefully designed to get a single recipient to respond. Criminals select an individual target within an organization, using social media and other public information -- and craft a fake email tailored for that person.