ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?

RBAC

RBAC

ETHOS detection engine

ETHOS detection engine

SPERO detection engine

SPERO detection engine

TETRA detection engine

TETRA detection engine

Suggested answer: B
asked 10/10/2024
rene laas
56 questions

Question 122

Report Export Collapse

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?

device flow correlation

device flow correlation

simple detections

simple detections

application blocking list

application blocking list

advanced custom detections

advanced custom detections

Suggested answer: C
asked 10/10/2024
Brian Kryszewski
36 questions

Question 123

Report Export Collapse

Which function is the primary function of Cisco AMP threat Grid?

automated email encryption

automated email encryption

applying a real-time URI blacklist

applying a real-time URI blacklist

automated malware analysis

automated malware analysis

monitoring network traffic

monitoring network traffic

Suggested answer: C
asked 10/10/2024
Yousuf Shahzad
43 questions

Question 124

Report Export Collapse

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)

blocked ports

blocked ports

simple custom detections

simple custom detections

command and control

command and control

allowed applications

allowed applications

URL

URL

Suggested answer: B, D
Explanation:

Advanced Malware Protection (AMP) for Endpoints offers a variety of lists, referred to as Outbreak Control, that allow you to customize it to your needs. The main lists are: Simple Custom Detections, Blocked Applications, Allowed

Applications, Advanced Custom Detections, and IP Blocked and Allowed Lists.

A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine.

Allowed applications lists are for files you never want to convict. Some examples are a custom application that is detected by a generic engine or a standard image that you use throughout the company Reference: https:// docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdf

asked 10/10/2024
Samori Augusto
47 questions

Question 125

Report Export Collapse

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

Enable IP Layer enforcement.

Enable IP Layer enforcement.

Activate the Advanced Malware Protection license

Activate the Advanced Malware Protection license

Activate SSL decryption.

Activate SSL decryption.

Enable Intelligent Proxy.

Enable Intelligent Proxy.

Suggested answer: D
asked 10/10/2024
Prenolan Kamiah
44 questions

Question 126

Report Export Collapse

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

authentication server: Cisco Identity Service Engine

authentication server: Cisco Identity Service Engine

supplicant: Cisco AnyConnect ISE Posture module

supplicant: Cisco AnyConnect ISE Posture module

authenticator: Cisco Catalyst switch

authenticator: Cisco Catalyst switch

authenticator: Cisco Identity Services Engine

authenticator: Cisco Identity Services Engine

authentication server: Cisco Prime Infrastructure

authentication server: Cisco Prime Infrastructure

Suggested answer: A, C
asked 10/10/2024
Nagaretnam, Ravin
41 questions

Question 127

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 127 117348 10102024233051000000

Which command was used to display this output?

show dot1x all

show dot1x all

show dot1x

show dot1x

show dot1x all summary

show dot1x all summary

show dot1x interface gi1/0/12

show dot1x interface gi1/0/12

Suggested answer: A
asked 10/10/2024
Mustafa BeÅŸparmak
40 questions

Question 128

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 128 117349 10102024233051000000

Which statement about the authentication protocol used in the configuration is true?

The authentication request contains only a password

The authentication request contains only a password

The authentication request contains only a username

The authentication request contains only a username

The authentication and authorization requests are grouped in a single packet

The authentication and authorization requests are grouped in a single packet

There are separate authentication and authorization request packets

There are separate authentication and authorization request packets

Suggested answer: C
Explanation:

This command uses RADIUS which combines authentication and authorization in one function (packet).

asked 10/10/2024
Aleksei Chernikov
55 questions

Question 129

Report Export Collapse

An engineer needs a solution for TACACS+ authentication and authorization for device administration.

The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?

Cisco Prime Infrastructure

Cisco Prime Infrastructure

Cisco Identity Services Engine

Cisco Identity Services Engine

Cisco Stealthwatch

Cisco Stealthwatch

Cisco AMP for Endpoints

Cisco AMP for Endpoints

Suggested answer: B
asked 10/10/2024
Francesco Facco
33 questions

Question 130

Report Export Collapse

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

aaa server radius dynamic-author

aaa server radius dynamic-author

aaa new-model

aaa new-model

auth-type all

auth-type all

ip device-tracking

ip device-tracking

Suggested answer: B
asked 10/10/2024
Juan Jose Montero Caletrio
36 questions
Total 631 questions
Go to page: of 64

Related questions