ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 13

Question list
Search
Search

Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?

A.

RBAC

A.

RBAC

Answers
B.

ETHOS detection engine

B.

ETHOS detection engine

Answers
C.

SPERO detection engine

C.

SPERO detection engine

Answers
D.

TETRA detection engine

D.

TETRA detection engine

Answers
Suggested answer: B

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?

A.

device flow correlation

A.

device flow correlation

Answers
B.

simple detections

B.

simple detections

Answers
C.

application blocking list

C.

application blocking list

Answers
D.

advanced custom detections

D.

advanced custom detections

Answers
Suggested answer: C

Which function is the primary function of Cisco AMP threat Grid?

A.

automated email encryption

A.

automated email encryption

Answers
B.

applying a real-time URI blacklist

B.

applying a real-time URI blacklist

Answers
C.

automated malware analysis

C.

automated malware analysis

Answers
D.

monitoring network traffic

D.

monitoring network traffic

Answers
Suggested answer: C

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

A.

blocked ports

A.

blocked ports

Answers
B.

simple custom detections

B.

simple custom detections

Answers
C.

command and control

C.

command and control

Answers
D.

allowed applications

D.

allowed applications

Answers
E.

URL

E.

URL

Answers
Suggested answer: B, D

Explanation:

Advanced Malware Protection (AMP) for Endpoints offers a variety of lists, referred to as Outbreak Control, that allow you to customize it to your needs. The main lists are: Simple Custom Detections, Blocked Applications, Allowed

Applications, Advanced Custom Detections, and IP Blocked and Allowed Lists.

A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine.

Allowed applications lists are for files you never want to convict. Some examples are a custom application that is detected by a generic engine or a standard image that you use throughout the company Reference: https:// docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdf

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

A.

Enable IP Layer enforcement.

A.

Enable IP Layer enforcement.

Answers
B.

Activate the Advanced Malware Protection license

B.

Activate the Advanced Malware Protection license

Answers
C.

Activate SSL decryption.

C.

Activate SSL decryption.

Answers
D.

Enable Intelligent Proxy.

D.

Enable Intelligent Proxy.

Answers
Suggested answer: D

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

A.

authentication server: Cisco Identity Service Engine

A.

authentication server: Cisco Identity Service Engine

Answers
B.

supplicant: Cisco AnyConnect ISE Posture module

B.

supplicant: Cisco AnyConnect ISE Posture module

Answers
C.

authenticator: Cisco Catalyst switch

C.

authenticator: Cisco Catalyst switch

Answers
D.

authenticator: Cisco Identity Services Engine

D.

authenticator: Cisco Identity Services Engine

Answers
E.

authentication server: Cisco Prime Infrastructure

E.

authentication server: Cisco Prime Infrastructure

Answers
Suggested answer: A, C

Refer to the exhibit.

Which command was used to display this output?

A.

show dot1x all

A.

show dot1x all

Answers
B.

show dot1x

B.

show dot1x

Answers
C.

show dot1x all summary

C.

show dot1x all summary

Answers
D.

show dot1x interface gi1/0/12

D.

show dot1x interface gi1/0/12

Answers
Suggested answer: A

Refer to the exhibit.

Which statement about the authentication protocol used in the configuration is true?

A.

The authentication request contains only a password

A.

The authentication request contains only a password

Answers
B.

The authentication request contains only a username

B.

The authentication request contains only a username

Answers
C.

The authentication and authorization requests are grouped in a single packet

C.

The authentication and authorization requests are grouped in a single packet

Answers
D.

There are separate authentication and authorization request packets

D.

There are separate authentication and authorization request packets

Answers
Suggested answer: C

Explanation:

This command uses RADIUS which combines authentication and authorization in one function (packet).

An engineer needs a solution for TACACS+ authentication and authorization for device administration.

The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?

A.

Cisco Prime Infrastructure

A.

Cisco Prime Infrastructure

Answers
B.

Cisco Identity Services Engine

B.

Cisco Identity Services Engine

Answers
C.

Cisco Stealthwatch

C.

Cisco Stealthwatch

Answers
D.

Cisco AMP for Endpoints

D.

Cisco AMP for Endpoints

Answers
Suggested answer: B

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

A.

aaa server radius dynamic-author

A.

aaa server radius dynamic-author

Answers
B.

aaa new-model

B.

aaa new-model

Answers
C.

auth-type all

C.

auth-type all

Answers
D.

ip device-tracking

D.

ip device-tracking

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64