Cisco 350-701 Practice Test - Questions Answers, Page 13
List of questions
Question 121

Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
RBAC
ETHOS detection engine
SPERO detection engine
TETRA detection engine
Question 122

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?
device flow correlation
simple detections
application blocking list
advanced custom detections
Question 123

Which function is the primary function of Cisco AMP threat Grid?
automated email encryption
applying a real-time URI blacklist
automated malware analysis
monitoring network traffic
Question 124

What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
blocked ports
simple custom detections
command and control
allowed applications
URL
Advanced Malware Protection (AMP) for Endpoints offers a variety of lists, referred to as Outbreak Control, that allow you to customize it to your needs. The main lists are: Simple Custom Detections, Blocked Applications, Allowed
Applications, Advanced Custom Detections, and IP Blocked and Allowed Lists.
A Simple Custom Detection list is similar to a blocked list. These are files that you want to detect and quarantine.
Allowed applications lists are for files you never want to convict. Some examples are a custom application that is detected by a generic engine or a standard image that you use throughout the company Reference: https:// docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdf
Question 125

What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Enable IP Layer enforcement.
Activate the Advanced Malware Protection license
Activate SSL decryption.
Enable Intelligent Proxy.
Question 126

When wired 802.1X authentication is implemented, which two components are required? (Choose two)
authentication server: Cisco Identity Service Engine
supplicant: Cisco AnyConnect ISE Posture module
authenticator: Cisco Catalyst switch
authenticator: Cisco Identity Services Engine
authentication server: Cisco Prime Infrastructure
Question 127

Refer to the exhibit.
Which command was used to display this output?
show dot1x all
show dot1x
show dot1x all summary
show dot1x interface gi1/0/12
Question 128

Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
The authentication request contains only a password
The authentication request contains only a username
The authentication and authorization requests are grouped in a single packet
There are separate authentication and authorization request packets
This command uses RADIUS which combines authentication and authorization in one function (packet).
Question 129

An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Cisco Prime Infrastructure
Cisco Identity Services Engine
Cisco Stealthwatch
Cisco AMP for Endpoints
Question 130

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
aaa server radius dynamic-author
aaa new-model
auth-type all
ip device-tracking
Question