Cisco 350-701 Practice Test - Questions Answers, Page 25
List of questions
Related questions
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?
Use security services to configure the traffic monitor, .
Use URL categorization to prevent the application traffic.
Use an access policy group to configure application control settings.
Use web security reporting to validate engine functionality
Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?
BYOD on boarding
Simple Certificate Enrollment Protocol
Client provisioning
MAC authentication bypass
Refer to the exhibit.
What will happen when this Python script is run?
The compromised computers and malware trajectories will be received from Cisco AMP
The list of computers and their current vulnerabilities will be received from Cisco AMP
The compromised computers and what compromised them will be received from Cisco AMP
The list of computers, policies, and connector statuses will be received from Cisco AMP
An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?
Cisco Umbrella
Cisco AMP
Cisco Stealthwatch
Cisco Tetration
Which factor must be considered when choosing the on-premise solution over the cloud-based one?
With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
With an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it.
Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?
consumption
sharing
analysis
authoring
An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?
Configure security appliances to send syslogs to Cisco Stealthwatch Cloud
Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud
Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud
Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud
What does Cisco AMP for Endpoints use to help an organization detect different families of malware?
Ethos Engine to perform fuzzy fingerprinting
Tetra Engine to detect malware when me endpoint is connected to the cloud
Clam AV Engine to perform email scanning
Spero Engine with machine learning to perform dynamic analysis
What are two characteristics of Cisco DNA Center APIs? (Choose two)
Postman is required to utilize Cisco DNA Center API calls.
They do not support Python scripts.
They are Cisco proprietary.
They quickly provision new devices.
They view the overall health of the network
What is a benefit of conducting device compliance checks?
It indicates what type of operating system is connecting to the network.
It validates if anti-virus software is installed.
It scans endpoints to determine if malicious activity is taking place.
It detects email phishing attacks.
Question