View: 771|Reply: 0

350-701 low score over 0715

[Copy link]

0

Threads

0

Posts

0

Credits

Guest

Credits
0
Post time 16-7-2021 16:34:17 | Show all posts |Read mode


Today‘s test 350-701 uses the dump of q225. About half new and half old.

Some new questions can be found on the Internet

1.organizationhas a Cisco ESA set up with policies and would like to customize the actionassigned for violations. The organization wants a copy of the message to
Which actions must be performed in order to provide this capability?


quarantine  and alter the subject header with a DLP violation

deliver   and add disclaimer text

deliver and send copies to other recipients

quarantine and send a DLP   violation notification



2. Anorganization recently installed a Cisco WSA and would like to take advantage ofthe AVC engine to allow the organization to create a policy to controlapplication specific activity.
After enabling the AVC engine, what must be done to implement this?


Use  & nbsp;& nbsp;& nbsp; security services to configure the traffic monitor.

Use  & nbsp;& nbsp;& nbsp; web security reporting to validate engine functionality.

Use  & nbsp;& nbsp;& nbsp; URL categorization to prevent the application traffic.

Use an access policy group to configure   application control settings.



3. Whichfactor must be considered when choosing the on-premise solution over thecloud-based one?


With   a cloud-based solution, the provider is responsible for the installation,   but the customer is responsible for the maintenance of the product

With   an on-premise solution, the customer is responsible for the installation   and maintenance of the product, whereas with a cloud-based solution, the  provider responsiblefor it.

With  an on-premise solution, the provider is responsible for the installation  and maintenance of the product, whereas with a Cloud-based solution, the customer is responsible for it.

With an on-premise solution,  the provider is responsible for the installation, but the customer is   responsible for the maintenance of the product.



4. Whileusing Cisco Firepower‘s Security Intelligence policies, which two criteria isFirepower block based upon? ( Choose two)
URLs

port   numbers

protocol  IDs:

MAC   addresses

IP addresses



5. Refer to theexhibit.
Anadministrator is adding a new Cisco FTD device to their network and wants tomanage it with Cisco FMG. The Cisco FTD is not behind a NAT device.

Which command is needed to enable this on the Cisco FTD?



configure  manager add DONTRESOLVE kregistration key>

configure   manager add < FMC IP address>  registration key>  sixteen

configure   manager add DONTRESOLVE < registration key>  FTD123

configure manager add < FMC   IP address> & lt; registration key>



            
Reply

Use magic Report

You have to log in before you can reply Login | Register Now

Points Rules

Quick Reply Contact us with Skype Contact us with Whastsapp Contact us with Telegram Contact us with Line Contact us with Line Contact us with Line Contact us with Line To Top Return to the list