Free Cisco 350-701 Exam Actual Questions

The questions for 350-701 were last updated On Nov 16, 2024

Question No. 1

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this

requirement using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

Show Answer Hide Answer
Correct Answer: B

The Stealthwatch Cloud Private Network Monitoring (PNM) Sensor is an extremely flexible piece of technology,

capable of being utilized in a number of different deployment scenarios. It can be deployed as a complete

Ubuntu based virtual appliance on different hypervisors (e.g. --VMware, VirtualBox). It can be deployed on

hardware running a number of different Linux-based operating systems.


Question No. 2

What is the purpose of CA in a PKI?

Show Answer Hide Answer
Correct Answer: A

A trusted CA is the only entity that can issue trusted digital certificates. This is extremely important because while PKI manages more of the encryption side of these certificates, authentication is vital to understanding which entities own what keys. Without a trusted CA, anyone can issue their own keys, authentication goes out the window and chaos ensues.


Question No. 3

What is the purpose of a denial-of-service attack?

Show Answer Hide Answer
Correct Answer: A

The purpose of a Denial-of-Service (DoS) attack is to disrupt the normal operation of a targeted system, server, or network by overwhelming it with a flood of internet traffic. This is achieved by utilizing multiple compromised computer systems as sources of attack traffic. The overwhelming amount of traffic can cause the targeted system to slow down significantly or even crash and become unavailable to legitimate users, thereby denying service to intended users.


Question No. 4

Refer to the exhibit,

which command results in these messages when attempting to troubleshoot an iPsec VPN connection?

Show Answer Hide Answer
Correct Answer: A

Question No. 5

Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?

Show Answer Hide Answer
Correct Answer: C