Free 350-701 Exam Braindumps (page: 40)

Page 40 of 153

What is the function of the Context Directory Agent?

  1. maintains users' group memberships
  2. relays user authentication requests from Web Security Appliance to Active Directory
  3. reads the Active Directory logs to map IP addresses to usernames D. accepts user authentication requests on behalf of Web Security Appliance for user identification

Answer(s): C

Explanation:

Cisco Context Directory Agent (CDA) is a mechanism that maps IP Addresses to usernames in order to allow security gateways to understand which user is using which IP Address in the network, so those security gateways can now make decisions based on those users (or the groups to which the users belong to). CDA runs on a Cisco Linux machine; monitors in real time a collection of Active Directory domain controller (DC) machines for authentication-related events that generally indicate user logins; learns, analyzes, and caches mappings of IP Addresses and user identities in its database; and makes the latest mappings available to its consumer devices.


Reference:

https://www.cisco.com/c/en/us/td/docs/security/ibf/cda_10/Install_Config_guide/cda10/ cda_oveviw.html



What is a characteristic of a bridge group in ASA Firewall transparent mode?

  1. It includes multiple interfaces and access rules between interfaces are customizable
  2. It is a Layer 3 segment and includes one port and customizable access rules
  3. It allows ARP traffic with a single access rule
  4. It has an IP address on its BVI interface and is used for management traffic

Answer(s): A

Explanation:

A bridge group is a group of interfaces that the ASA bridges instead of routes. Bridge groups are only supported in Transparent Firewall Mode. Like any other firewall interfaces, access control between interfaces is controlled, and all of the usual firewall checks are in place. Each bridge group includes a Bridge Virtual Interface (BVI). The ASA uses the BVI IP address as the source address for packets originating from the bridge group. The BVI IP address must be on the same subnet as the bridge group member interfaces. The BVI does not support traffic on secondary networks; only traffic on the same network as the BVI IP address is supported. You can include multiple interfaces per bridge group. If you use more than 2 interfaces per bridge group, you can control communication between multiple segments on the same network, and not just between inside and outside. For example, if you have three inside segments that you do not want to communicate with each other, you can put each segment on a separate interface, and only allow them to communicate with the outside interface. Or you can customize the access rules between interfaces to allow only as much access as desired.


Reference:

https://www.cisco.com/c/en/us/td/docs/security/asa/asa95/configuration/general/asa- 95-generalconfig/intro-fw.html
Note: BVI interface is not used for management purpose. But we can add a separate Management slot/port interface that is not part of any bridge group, and that allows only management traffic to the ASA.



When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?

  1. Common Security Exploits
  2. Common Vulnerabilities and Exposures
  3. Common Exploits and Vulnerabilities
  4. Common Vulnerabilities, Exploits and Threats

Answer(s): B

Explanation:

Vendors, security researchers, and vulnerability coordination centers typically assign vulnerabilities an identifier that's disclosed to the public. This identifier is known as the Common Vulnerabilities and Exposures (CVE).
CVE is an industry-wide standard. CVE is sponsored by US-CERT, the office of Cybersecurity and Communications at the U.S. Department of Homeland Security. The goal of CVE is to make it's easier to share data across tools, vulnerability repositories, and security services.


Reference:

CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide



Which two fields are defined in the NetFlow flow? (Choose two)

  1. type of service byte
  2. class of service bits
  3. Layer 4 protocol type
  4. destination port
  5. output logical interface

Answer(s): A,D

Explanation:

Cisco standard NetFlow version 5 defines a flow as a unidirectional sequence of packets that all share seven values which define a unique key for the flow:
+ Ingress interface (SNMP ifIndex)
+ Source IP address
+ Destination IP address
+ IP protocol
+ Source port for UDP or TCP, 0 for other protocols
+ Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols + IP Type of Service
Note: A flow is a unidirectional series of packets between a given source and destination.



Page 40 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote