exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 129 discussion

Actual exam question from Cisco's 350-701
Question #: 129
Topic #: 1
[All 350-701 Questions]

A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower.
What must be configured to accomplish this?

  • A. a Network Analysis policy to receive NetFlow data from the host
  • B. a File Analysis policy to send file data into Cisco Firepower
  • C. a Network Discovery policy to receive data from the host
  • D. a Threat Intelligence policy to download the data from the host
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
abdulmalik_mail
Highly Voted 2 years, 10 months ago
It's C, https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/network_discovery_policies.html
upvoted 6 times
NikoNiko
2 years, 3 months ago
yes, C is correct. From your link (and from my practice): "The network discovery policy on the Firepower Management Center controls how the system collects data on your organization’s network assets and which network segments and ports are monitored. ... You can also add sources for host input and NetFlow exporters to monitor." - i. e. data from external devices.
upvoted 2 times
...
...
iluvmicrosoft
Most Recent 6 months, 4 weeks ago
statement 1, statement 2, what must be configured to accomplish this?? not these?? assets on the network = Network Discovery Policy third party systems feed FMC = Threat Intelligence Director horrible questions imo.. I do think the answer is C however, because even if we were using Threat Intelligence Director.. the feed wouldn't be from the "host"
upvoted 2 times
...
flejd
2 years, 10 months ago
its D. Network Discovery is a passive mechanizm. You want data from third party ? use TiD
upvoted 2 times
pr0fectus
2 years, 10 months ago
We are looking for "assets" on the network. TID is used for threat feeds not discovering assets on the network.
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago