ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

How is Cisco Umbrella configured to log only security events?

per policy

per policy

in the Reporting settings

in the Reporting settings

in the Security Settings section

in the Security Settings section

per network in the Deployments section

per network in the Deployments section

Suggested answer: A
Explanation:

The logging of your identities' activities is set per-policy when you first create a policy. By default, logging is on and set to log all requests an identity makes to reach destinations. At any time after you create a policy, you can change what level of identity activity Umbrella logs.

From the Policy wizard, log settings are:

Log All Requestsβ€”For full logging, whether for content, security or otherwise Log Only Security Eventsβ€”For security logging only, which gives your users more privacyβ€”a good setting for people with the roaming client installed on personal devices Don't Log Any Requestsβ€”Disables all logging. If you select this option, most reporting for identities with this policy will not be helpful as nothing is logged to report on.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/log-management

asked 10/10/2024
Salvatore Andrisani
47 questions

Question 142

Report Export Collapse

How does Cisco Umbrella archive logs to an enterprise owned storage?

by using the Application Programming Interface to fetch the logs

by using the Application Programming Interface to fetch the logs

by sending logs via syslog to an on-premises or cloud-based syslog server

by sending logs via syslog to an on-premises or cloud-based syslog server

by the system administrator downloading the logs from the Cisco Umbrella web portal

by the system administrator downloading the logs from the Cisco Umbrella web portal

by being configured to send logs to a self-managed AWS S3 bucket

by being configured to send logs to a self-managed AWS S3 bucket

Suggested answer: D
Explanation:

The Cisco Umbrella Multi-Org console has the ability to upload, store, and archive traffic activity logs from your organizations' Umbrella dashboards to the cloud through Amazon S3. CSV formatted Umbrella logs are compressed (gzip) and uploaded every ten minutes so that there's a minimum of delay between traffic from the organization's Umbrella dashboard being logged and then being available to download from an S3 bucket.

By having your organizations' logs uploaded to an S3 bucket, you can then download logs automatically to keep in perpetuity in backup storage.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/manage-logs

asked 10/10/2024
Martijn Bot
42 questions

Question 143

Report Export Collapse

When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?

Application Control

Application Control

Security Category Blocking

Security Category Blocking

Content Category Blocking

Content Category Blocking

File Analysis

File Analysis

Suggested answer: B
asked 10/10/2024
Jimmy Raiford
49 questions

Question 144

Report Export Collapse

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

AMP

AMP

AnyConnect

AnyConnect

DynDNS

DynDNS

Talos

Talos

Suggested answer: D
Explanation:

When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky β€” meaning the domain contains both malicious and legitimate content. Safe and malicious requests are routed as usual or blocked, respectively. Risky requests are routed to our cloud-based proxy for deeper inspection. The Umbrella proxy uses Cisco Talos web reputation and other third-party feeds to determine if a URL is malicious.

asked 10/10/2024
Juan Rodriguez
47 questions

Question 145

Report Export Collapse

Where are individual sites specified to be blacklisted in Cisco Umbrella?

application settings

application settings

content categories

content categories

security settings

security settings

destination lists

destination lists

Suggested answer: D
Explanation:

A destination list is a list of internet destinations that can be blocked or allowed based on the administrative preferences for the policies applied to the identities within your organization. A destination is an IP address (IPv4), URL, or fully qualified domain name. You can add a destination list to Umbrella at any time; however, a destination list does not come into use until it is added to a policy.

Reference: https://docs.umbrella.com/deployment-umbrella/docs/working-with-destination-lists

asked 10/10/2024
Alberto Castillo
38 questions

Question 146

Report Export Collapse

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

Cisco Stealthwatch

Cisco Stealthwatch

Cisco Umbrella

Cisco Umbrella

Cisco Firepower

Cisco Firepower

NGIPS

NGIPS

Suggested answer: B
Explanation:

Cisco Umbrella protects users from accessing malicious domains by proactively analyzing and blocking unsafe destinations – before a connection is ever made. Thus it can protect from phishing attacks by blocking suspicious domains when users click on the given links that an attacker sent.

Cisco Umbrella roaming protects your employees even when they are off the VPN.

asked 10/10/2024
Emmanuel Yeboah
43 questions

Question 147

Report Export Collapse

How does Cisco Stealthwatch Cloud provide security for cloud environments?

It delivers visibility and threat detection.

It delivers visibility and threat detection.

It prevents exfiltration of sensitive data.

It prevents exfiltration of sensitive data.

It assigns Internet-based DNS protection for clients and servers.

It assigns Internet-based DNS protection for clients and servers.

It facilitates secure connectivity between public and private networks.

It facilitates secure connectivity between public and private networks.

Suggested answer: A
Explanation:

Cisco Stealthwatch Cloud: Available as an SaaS product offer to provide visibility and threat detection within public cloud infrastructures such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

asked 10/10/2024
Emmanuel Esquivel Guzman
37 questions

Question 148

Report Export Collapse

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)

data exfiltration

data exfiltration

command and control communication

command and control communication

intelligent proxy

intelligent proxy

snort

snort

URL categorization

URL categorization

Suggested answer: A, B
Explanation:

Cisco Cognitive Threat Analytics helps you quickly detect and respond to sophisticated, clandestine attacks that are already under way or are attempting to establish a presence within your environment. The solution automatically identifies and investigates suspicious or malicious webbased traffic. It identifies both potential and confirmed threats, allowing you to quickly remediate the infection and reduce the scope and damage of an attack, whether it's a known threat campaign that has spread across multiple organizations or a unique threat you've never seen before.

Detection and analytics features provided in Cognitive Threat Analytics are shown below:

+ Data exfiltration: Cognitive Threat Analytics uses statistical modeling of an organization's network to identify anomalous web traffic and pinpoint the exfiltration of sensitive data. It recognizes data exfiltration even in HTTPS-encoded traffic, without any need for you to decrypt transferred content + Command-and-control (C2) communication: Cognitive Threat Analytics combines a wide range of data, ranging from statistics collected on an Internet-wide level to host- specific local anomaly scores.

Combining these indicators inside the statistical detection algorithms allows us to distinguish C2 communication from benign traffic and from other malicious activities. Cognitive Threat Analytics recognizes C2 even in HTTPSencoded or anonymous traffic, including Tor, without any need to decrypt transferred content, detecting a broad range of threats … Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatQuestions & Answers PDF P-70 analytics/at-aglance-c45-736555.pdf

asked 10/10/2024
rita whitfield
51 questions

Question 149

Report Export Collapse

Which network monitoring solution uses streams and pushes operational data to provide a near realtime view of activity?

SNMP

SNMP

SMTP

SMTP

syslog

syslog

model-driven telemetry

model-driven telemetry

Suggested answer: D
Explanation:

The traditional use of the pull model, where the client requests data from the network does not scale when what you want is near real-time data. Moreover, in some use cases, there is the need to be notified only when some data changes, like interfaces status, protocol neighbors change etc.

Model-Driven Telemetry is a new approach for network monitoring in which data is streamed from network devices continuously using a push model and provides near real-time access to operational statistics.

Applications can subscribe to specific data items they need, by using standard-based YANG data models over NETCONF-YANG. Cisco IOS XE streaming telemetry allows to push data off of the device to an external collector at a much higher frequency, more efficiently, as well as data on-change streaming.

Reference: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide

asked 10/10/2024
EduBP srl De Sanctis
39 questions

Question 150

Report Export Collapse

What provides visibility and awareness into what is currently occurring on the network?

CMX

CMX

WMI

WMI

Prime Infrastructure

Prime Infrastructure

Telemetry

Telemetry

Suggested answer: D
Explanation:

Telemetry – Information and/or data that provides awareness and visibility into what is occurring on the network at any given time from networking devices, appliances, applications or servers in which the core function of the device is not to generate security alerts designed to detect unwanted or malicious activity from computer networks.

Reference:

https://www.cisco.com/c/dam/en_us/about/doing_business/legal/service_descriptions/docs/activethreat-analytics-premier.pdf

asked 10/10/2024
Minh Phan
33 questions
Total 631 questions
Go to page: of 64

Related questions