ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 15

Question list
Search
Search

How is Cisco Umbrella configured to log only security events?

A.

per policy

A.

per policy

Answers
B.

in the Reporting settings

B.

in the Reporting settings

Answers
C.

in the Security Settings section

C.

in the Security Settings section

Answers
D.

per network in the Deployments section

D.

per network in the Deployments section

Answers
Suggested answer: A

Explanation:

The logging of your identities' activities is set per-policy when you first create a policy. By default, logging is on and set to log all requests an identity makes to reach destinations. At any time after you create a policy, you can change what level of identity activity Umbrella logs.

From the Policy wizard, log settings are:

Log All Requests—For full logging, whether for content, security or otherwise Log Only Security Events—For security logging only, which gives your users more privacy—a good setting for people with the roaming client installed on personal devices Don't Log Any Requests—Disables all logging. If you select this option, most reporting for identities with this policy will not be helpful as nothing is logged to report on.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management

How does Cisco Umbrella archive logs to an enterprise owned storage?

A.

by using the Application Programming Interface to fetch the logs

A.

by using the Application Programming Interface to fetch the logs

Answers
B.

by sending logs via syslog to an on-premises or cloud-based syslog server

B.

by sending logs via syslog to an on-premises or cloud-based syslog server

Answers
C.

by the system administrator downloading the logs from the Cisco Umbrella web portal

C.

by the system administrator downloading the logs from the Cisco Umbrella web portal

Answers
D.

by being configured to send logs to a self-managed AWS S3 bucket

D.

by being configured to send logs to a self-managed AWS S3 bucket

Answers
Suggested answer: D

Explanation:

The Cisco Umbrella Multi-Org console has the ability to upload, store, and archive traffic activity logs from your organizations' Umbrella dashboards to the cloud through Amazon S3. CSV formatted Umbrella logs are compressed (gzip) and uploaded every ten minutes so that there's a minimum of delay between traffic from the organization's Umbrella dashboard being logged and then being available to download from an S3 bucket.

By having your organizations' logs uploaded to an S3 bucket, you can then download logs automatically to keep in perpetuity in backup storage.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/manage-logs

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

A.

Application Control

A.

Application Control

Answers
B.

Security Category Blocking

B.

Security Category Blocking

Answers
C.

Content Category Blocking

C.

Content Category Blocking

Answers
D.

File Analysis

D.

File Analysis

Answers
Suggested answer: B

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

A.

AMP

A.

AMP

Answers
B.

AnyConnect

B.

AnyConnect

Answers
C.

DynDNS

C.

DynDNS

Answers
D.

Talos

D.

Talos

Answers
Suggested answer: D

Explanation:

When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky — meaning the domain contains both malicious and legitimate content. Safe and malicious requests are routed as usual or blocked, respectively. Risky requests are routed to our cloud-based proxy for deeper inspection. The Umbrella proxy uses Cisco Talos web reputation and other third-party feeds to determine if a URL is malicious.

Where are individual sites specified to be blacklisted in Cisco Umbrella?

A.

application settings

A.

application settings

Answers
B.

content categories

B.

content categories

Answers
C.

security settings

C.

security settings

Answers
D.

destination lists

D.

destination lists

Answers
Suggested answer: D

Explanation:

A destination list is a list of internet destinations that can be blocked or allowed based on the administrative preferences for the policies applied to the identities within your organization. A destination is an IP address (IPv4), URL, or fully qualified domain name. You can add a destination list to Umbrella at any time; however, a destination list does not come into use until it is added to a policy.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

A.

Cisco Stealthwatch

A.

Cisco Stealthwatch

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

Cisco Firepower

C.

Cisco Firepower

Answers
D.

NGIPS

D.

NGIPS

Answers
Suggested answer: B

Explanation:

Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations – before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent.

Cisco Umbrella roaming protects your employees even when they are off the VPN.

How does Cisco Stealthwatch Cloud provide security for cloud environments?

A.

It delivers visibility and threat detection.

A.

It delivers visibility and threat detection.

Answers
B.

It prevents exfiltration of sensitive data.

B.

It prevents exfiltration of sensitive data.

Answers
C.

It assigns Internet-based DNS protection for clients and servers.

C.

It assigns Internet-based DNS protection for clients and servers.

Answers
D.

It facilitates secure connectivity between public and private networks.

D.

It facilitates secure connectivity between public and private networks.

Answers
Suggested answer: A

Explanation:

Cisco Stealthwatch Cloud: Available as an SaaS product offer to provide visibility and threat detection within public cloud infrastructures such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)

A.

data exfiltration

A.

data exfiltration

Answers
B.

command and control communication

B.

command and control communication

Answers
C.

intelligent proxy

C.

intelligent proxy

Answers
D.

snort

D.

snort

Answers
E.

URL categorization

E.

URL categorization

Answers
Suggested answer: A, B

Explanation:

Cisco Cognitive Threat Analytics helps you quickly detect and respond to sophisticated, clandestine attacks that are already under way or are attempting to establish a presence within your environment. The solution automatically identifies and investigates suspicious or malicious webbased traffic. It identifies both potential and confirmed threats, allowing you to quickly remediate the infection and reduce the scope and damage of an attack, whether it's a known threat campaign that has spread across multiple organizations or a unique threat you've never seen before.

Detection and analytics features provided in Cognitive Threat Analytics are shown below:

+ Data exfiltration: Cognitive Threat Analytics uses statistical modeling of an organization's network to identify anomalous web traffic and pinpoint the exfiltration of sensitive data. It recognizes data exfiltration even in HTTPS-encoded traffic, without any need for you to decrypt transferred content + Command-and-control (C2) communication: Cognitive Threat Analytics combines a wide range of data, ranging from statistics collected on an Internet-wide level to host- specific local anomaly scores.

Combining these indicators inside the statistical detection algorithms allows us to distinguish C2 communication from benign traffic and from other malicious activities. Cognitive Threat Analytics recognizes C2 even in HTTPSencoded or anonymous traffic, including Tor, without any need to decrypt transferred content, detecting a broad range of threats … Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatQuestions & Answers PDF P-70 analytics/at-aglance-c45-736555.pdf

Which network monitoring solution uses streams and pushes operational data to provide a near realtime view of activity?

A.

SNMP

A.

SNMP

Answers
B.

SMTP

B.

SMTP

Answers
C.

syslog

C.

syslog

Answers
D.

model-driven telemetry

D.

model-driven telemetry

Answers
Suggested answer: D

Explanation:

The traditional use of the pull model, where the client requests data from the network does not scale when what you want is near real-time data. Moreover, in some use cases, there is the need to be notified only when some data changes, like interfaces status, protocol neighbors change etc.

Model-Driven Telemetry is a new approach for network monitoring in which data is streamed from network devices continuously using a push model and provides near real-time access to operational statistics.

Applications can subscribe to specific data items they need, by using standard-based YANG data models over NETCONF-YANG. Cisco IOS XE streaming telemetry allows to push data off of the device to an external collector at a much higher frequency, more efficiently, as well as data on-change streaming.

Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide

What provides visibility and awareness into what is currently occurring on the network?

A.

CMX

A.

CMX

Answers
B.

WMI

B.

WMI

Answers
C.

Prime Infrastructure

C.

Prime Infrastructure

Answers
D.

Telemetry

D.

Telemetry

Answers
Suggested answer: D

Explanation:

Telemetry – Information and/or data that provides awareness and visibility into what is occurring on the network at any given time from networking devices, appliances, applications or servers in which the core function of the device is not to generate security alerts designed to detect unwanted or malicious activity from computer networks.

Reference:

https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/activethreat-analytics-premier.pdf

Total 631 questions
Go to page: of 64