ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?

RBAC

RBAC

ETHOS detection engine

ETHOS detection engine

SPERO detection engine

SPERO detection engine

TETRA detection engine

TETRA detection engine

Suggested answer: B
asked 10/10/2024
rene laas
57 questions

Question 122

Report Export Collapse

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?

device flow correlation

device flow correlation

simple detections

simple detections

application blocking list

application blocking list

advanced custom detections

advanced custom detections

Suggested answer: C
asked 10/10/2024
Brian Kryszewski
38 questions

Question 123

Report Export Collapse

Which function is the primary function of Cisco AMP threat Grid?

automated email encryption

automated email encryption

applying a real-time URI blacklist

applying a real-time URI blacklist

automated malware analysis

automated malware analysis

monitoring network traffic

monitoring network traffic

Suggested answer: C
asked 10/10/2024
Yousuf Shahzad
44 questions

Question 124

Report Export Collapse

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

blocked ports

blocked ports

simple custom detections

simple custom detections

command and control

command and control

allowed applications

allowed applications

URL

URL

Suggested answer: B, D
Explanation:

Advanced Malware Protection (AMP) for Endpoints offers a variety of lists, referred to as Outbreak Control, that allow you to customize it to your needs. The main lists are: Simple Custom Detections, Blocked Applications, Allowed

Applications, Advanced Custom Detections, and IP Blocked and Allowed Lists.

A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine.

Allowed applications lists are for files you never want to convict. Some examples are a custom application that is detected by a generic engine or a standard image that you use throughout the company Reference: https:// docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdf

asked 10/10/2024
Samori Augusto
48 questions

Question 125

Report Export Collapse

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

Enable IP Layer enforcement.

Enable IP Layer enforcement.

Activate the Advanced Malware Protection license

Activate the Advanced Malware Protection license

Activate SSL decryption.

Activate SSL decryption.

Enable Intelligent Proxy.

Enable Intelligent Proxy.

Suggested answer: D
asked 10/10/2024
Prenolan Kamiah
46 questions

Question 126

Report Export Collapse

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 127

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 127 117348 10102024233051000000

Which command was used to display this output?

Become a Premium Member for full access
  Unlock Premium Member

Question 128

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 128 117349 10102024233051000000

Which statement about the authentication protocol used in the configuration is true?

Become a Premium Member for full access
  Unlock Premium Member

Question 129

Report Export Collapse

An engineer needs a solution for TACACS+ authentication and authorization for device administration.

The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?

Become a Premium Member for full access
  Unlock Premium Member

Question 130

Report Export Collapse

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

Become a Premium Member for full access
  Unlock Premium Member
Total 631 questions
Go to page: of 64

Related questions