Cisco 350-701 Practice Test - Questions Answers, Page 15
List of questions
Question 141

How is Cisco Umbrella configured to log only security events?
per policy
in the Reporting settings
in the Security Settings section
per network in the Deployments section
The logging of your identities' activities is set per-policy when you first create a policy. By default, logging is on and set to log all requests an identity makes to reach destinations. At any time after you create a policy, you can change what level of identity activity Umbrella logs.
From the Policy wizard, log settings are:
Log All RequestsβFor full logging, whether for content, security or otherwise Log Only Security EventsβFor security logging only, which gives your users more privacyβa good setting for people with the roaming client installed on personal devices Don't Log Any RequestsβDisables all logging. If you select this option, most reporting for identities with this policy will not be helpful as nothing is logged to report on.
Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management
Question 142

How does Cisco Umbrella archive logs to an enterprise owned storage?
by using the Application Programming Interface to fetch the logs
by sending logs via syslog to an on-premises or cloud-based syslog server
by the system administrator downloading the logs from the Cisco Umbrella web portal
by being configured to send logs to a self-managed AWS S3 bucket
The Cisco Umbrella Multi-Org console has the ability to upload, store, and archive traffic activity logs from your organizations' Umbrella dashboards to the cloud through Amazon S3. CSV formatted Umbrella logs are compressed (gzip) and uploaded every ten minutes so that there's a minimum of delay between traffic from the organization's Umbrella dashboard being logged and then being available to download from an S3 bucket.
By having your organizations' logs uploaded to an S3 bucket, you can then download logs automatically to keep in perpetuity in backup storage.
Reference: https://docs.umbrella.com/deployment-umbrella/docs/manage-logs
Question 143

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Application Control
Security Category Blocking
Content Category Blocking
File Analysis
Question 144

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
AMP
AnyConnect
DynDNS
Talos
When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky β meaning the domain contains both malicious and legitimate content. Safe and malicious requests are routed as usual or blocked, respectively. Risky requests are routed to our cloud-based proxy for deeper inspection. The Umbrella proxy uses Cisco Talos web reputation and other third-party feeds to determine if a URL is malicious.
Question 145

Where are individual sites specified to be blacklisted in Cisco Umbrella?
application settings
content categories
security settings
destination lists
A destination list is a list of internet destinations that can be blocked or allowed based on the administrative preferences for the policies applied to the identities within your organization. A destination is an IP address (IPv4), URL, or fully qualified domain name. You can add a destination list to Umbrella at any time; however, a destination list does not come into use until it is added to a policy.
Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists
Question 146

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
Cisco Stealthwatch
Cisco Umbrella
Cisco Firepower
NGIPS
Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations β before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent.
Cisco Umbrella roaming protects your employees even when they are off the VPN.
Question 147

How does Cisco Stealthwatch Cloud provide security for cloud environments?
It delivers visibility and threat detection.
It prevents exfiltration of sensitive data.
It assigns Internet-based DNS protection for clients and servers.
It facilitates secure connectivity between public and private networks.
Cisco Stealthwatch Cloud: Available as an SaaS product offer to provide visibility and threat detection within public cloud infrastructures such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).
Question 148

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)
data exfiltration
command and control communication
intelligent proxy
snort
URL categorization
Cisco Cognitive Threat Analytics helps you quickly detect and respond to sophisticated, clandestine attacks that are already under way or are attempting to establish a presence within your environment. The solution automatically identifies and investigates suspicious or malicious webbased traffic. It identifies both potential and confirmed threats, allowing you to quickly remediate the infection and reduce the scope and damage of an attack, whether it's a known threat campaign that has spread across multiple organizations or a unique threat you've never seen before.
Detection and analytics features provided in Cognitive Threat Analytics are shown below:
+ Data exfiltration: Cognitive Threat Analytics uses statistical modeling of an organization's network to identify anomalous web traffic and pinpoint the exfiltration of sensitive data. It recognizes data exfiltration even in HTTPS-encoded traffic, without any need for you to decrypt transferred content + Command-and-control (C2) communication: Cognitive Threat Analytics combines a wide range of data, ranging from statistics collected on an Internet-wide level to host- specific local anomaly scores.
Combining these indicators inside the statistical detection algorithms allows us to distinguish C2 communication from benign traffic and from other malicious activities. Cognitive Threat Analytics recognizes C2 even in HTTPSencoded or anonymous traffic, including Tor, without any need to decrypt transferred content, detecting a broad range of threats β¦ Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatQuestions & Answers PDF P-70 analytics/at-aglance-c45-736555.pdf
Question 149

Which network monitoring solution uses streams and pushes operational data to provide a near realtime view of activity?
SNMP
SMTP
syslog
model-driven telemetry
The traditional use of the pull model, where the client requests data from the network does not scale when what you want is near real-time data. Moreover, in some use cases, there is the need to be notified only when some data changes, like interfaces status, protocol neighbors change etc.
Model-Driven Telemetry is a new approach for network monitoring in which data is streamed from network devices continuously using a push model and provides near real-time access to operational statistics.
Applications can subscribe to specific data items they need, by using standard-based YANG data models over NETCONF-YANG. Cisco IOS XE streaming telemetry allows to push data off of the device to an external collector at a much higher frequency, more efficiently, as well as data on-change streaming.
Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide
Question 150

What provides visibility and awareness into what is currently occurring on the network?
CMX
WMI
Prime Infrastructure
Telemetry
Telemetry β Information and/or data that provides awareness and visibility into what is occurring on the network at any given time from networking devices, appliances, applications or servers in which the core function of the device is not to generate security alerts designed to detect unwanted or malicious activity from computer networks.
Reference:
https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/activethreat-analytics-premier.pdf
Question