Cisco 350-701 Practice Test - Questions Answers, Page 16
List of questions
Related questions
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
Cisco Umbrella
External Threat Feeds
Cisco Threat Grid
Cisco Stealthwatch
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Cisco Security Intelligence
Cisco Application Visibility and Control
Cisco Model Driven Telemetry
Cisco DNA Center
Which two activities can be done using Cisco DNA Center? (Choose two)
DHCP
Design
Accounting
DNS
Provision
What must be used to share data between multiple security products?
Cisco Rapid Threat Containment
Cisco Platform Exchange Grid
Cisco Advanced Malware Protection
Cisco Stealthwatch Cloud
Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?
Advanced Malware Protection
Platform Exchange Grid
Multifactor Platform Integration
Firepower Threat Defense
What is a feature of the open platform capabilities of Cisco DNA Center?
intent-based APIs
automation adapters
domain integration
application adapters
What is the function of the Context Directory Agent?
maintains users' group memberships
relays user authentication requests from Web Security Appliance to Active Directory
reads the Active Directory logs to map IP addresses to usernames
accepts user authentication requests on behalf of Web Security Appliance for user identification
What is a characteristic of a bridge group in ASA Firewall transparent mode?
It includes multiple interfaces and access rules between interfaces are customizable
It is a Layer 3 segment and includes one port and customizable access rules
It allows ARP traffic with a single access rule
It has an IP address on its BVI interface and is used for management traffic
When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?
Common Security Exploits
Common Vulnerabilities and Exposures
Common Exploits and Vulnerabilities
Common Vulnerabilities, Exploits and Threats
Which two fields are defined in the NetFlow flow? (Choose two)
type of service byte
class of service bits
Layer 4 protocol type
destination port
output logical interface
Question