ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 25

List of questions

Question 241

Report Export Collapse

An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

Use security services to configure the traffic monitor, .

Use security services to configure the traffic monitor, .

Use URL categorization to prevent the application traffic.

Use URL categorization to prevent the application traffic.

Use an access policy group to configure application control settings.

Use an access policy group to configure application control settings.

Use web security reporting to validate engine functionality

Use web security reporting to validate engine functionality

Suggested answer: C
Explanation:

The Application Visibility and Control (AVC) engine lets you create policies to control application activity on the network without having to fully understand the underlying technology of each application. You can configure application control settings in Access Policy groups. You can block or allow applications individually or according to application type. You can also apply controls to particular application types.

asked 10/10/2024
Edgar Zapico
44 questions

Question 242

Report Export Collapse

Which method is used to deploy certificates and configure the supplicant on mobile devices to gain access to network resources?

BYOD on boarding

BYOD on boarding

Simple Certificate Enrollment Protocol

Simple Certificate Enrollment Protocol

Client provisioning

Client provisioning

MAC authentication bypass

MAC authentication bypass

Suggested answer: A
Explanation:

When supporting personal devices on a corporate network, you must protect network services and enterprise data by authenticating and authorizing users (employees, contractors, and guests) and their devices.

Cisco ISE provides the tools you need to allow employees to securely use personal devices on a corporate network.

Guests can add their personal devices to the network by running the native supplicant provisioning

(Network Setup Assistant), or by adding their devices to the My Devices portal.

Because native supplicant profiles are not available for all devices, users can use the My Devices portal to add these devices manually; or you can configure Bring Your Own Device (BYOD) rules to register these devices.

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-

4/admin_guide/b_ISE_admin_guide_24/ m_ise_devices_byod.html

asked 10/10/2024
Garwin Liu
37 questions

Question 243

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 243 117464 10102024233051000000

What will happen when this Python script is run?

The compromised computers and malware trajectories will be received from Cisco AMP

The compromised computers and malware trajectories will be received from Cisco AMP

The list of computers and their current vulnerabilities will be received from Cisco AMP

The list of computers and their current vulnerabilities will be received from Cisco AMP

The compromised computers and what compromised them will be received from Cisco AMP

The compromised computers and what compromised them will be received from Cisco AMP

The list of computers, policies, and connector statuses will be received from Cisco AMP

The list of computers, policies, and connector statuses will be received from Cisco AMP

Suggested answer: D
Explanation:

The call to API of "https://api.amp.cisco.com/v1/computers" allows us to fetch list of computersacross yourorganization that Advanced Malware Protection (AMP) sees

Reference: https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fcomputers&api_host=api.apjc.amp.cisco.com&api_resource=Computer&api_version=v1

asked 10/10/2024
Eric Hebert
38 questions

Question 244

Report Export Collapse

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?

Cisco Umbrella

Cisco Umbrella

Cisco AMP

Cisco AMP

Cisco Stealthwatch

Cisco Stealthwatch

Cisco Tetration

Cisco Tetration

Suggested answer: D
Explanation:

Micro-segmentation secures applications by expressly allowing particular application traffic and, by default, denying all other traffic. Micro-segmentation is the foundation for implementing a zero-trust security model for application workloads in the data center and cloud.

Cisco Tetration is an application workload security platform designed to secure your compute instances across any infrastructure and any cloud. To achieve this, it uses behavior and attribute-driven microsegmentation policy generation and enforcement. It enables trusted access through automated, exhaustive context from various systems to automatically adapt security policies.

To generate accurate microsegmentation policy, Cisco Tetration performs application dependency mapping to discover the relationships between different application tiers and infrastructure services. In addition, the platform supports "what- if" policy analysis using real-time data or historical data to assist in the validation and risk assessment of policy application pre-enforcement to ensure ongoing application availability. The normalized microsegmentation policy can be enforced through the application workload itself for a consistent approach to workload microsegmentation across any environment, including virtualized, bare-metal, and container workloads running in any public cloud or any data center.

Once the microsegmentation policy is enforced, Cisco Tetration continues to monitor for compliance deviations, ensuring the segmentation policy is up to date as the application behavior change.

Reference: https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetrationanalytics/solutionoverview-c22-739268.pdf

asked 10/10/2024
Dmitrii Nikolaevich
41 questions

Question 245

Report Export Collapse

Which factor must be considered when choosing the on-premise solution over the cloud-based one?

With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it

With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it

With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.

With an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it.

With an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it.

Suggested answer: D
asked 10/10/2024
Cristian Melo
40 questions

Question 246

Report Export Collapse

Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

consumption

consumption

sharing

sharing

analysis

analysis

authoring

authoring

Suggested answer: A
Explanation:

… we will showcase Cisco Threat Intelligence Director (CTID) an exciting feature on Cisco's Firepower Management Center (FMC) product offering that automates the operationalization of threat intelligence. TID has the ability to consume threat intelligence via STIX over TAXII and allows uploads/downloads of STIX and simple blacklists. Reference:

https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threatintelligencedirector

asked 10/10/2024
Gbolahan Olukole
33 questions

Question 247

Report Export Collapse

An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?

Configure security appliances to send syslogs to Cisco Stealthwatch Cloud

Configure security appliances to send syslogs to Cisco Stealthwatch Cloud

Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud

Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud

Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud

Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud

Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud

Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud

Suggested answer: D
Explanation:

You can also monitor on-premises networks in your organizations using Cisco Stealthwatch Cloud. In order to do so, you need to deploy at least one Cisco Stealthwatch Cloud Sensor appliance (virtual or physical appliance).

Reference: CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide

asked 10/10/2024
Henrik Persson
40 questions

Question 248

Report Export Collapse

What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

Ethos Engine to perform fuzzy fingerprinting

Ethos Engine to perform fuzzy fingerprinting

Tetra Engine to detect malware when me endpoint is connected to the cloud

Tetra Engine to detect malware when me endpoint is connected to the cloud

Clam AV Engine to perform email scanning

Clam AV Engine to perform email scanning

Spero Engine with machine learning to perform dynamic analysis

Spero Engine with machine learning to perform dynamic analysis

Suggested answer: A
Explanation:

ETHOS is the Cisco file grouping engine. It allows us to group families of files together so if we see variants of a malware, we mark the ETHOS hash as malicious and whole families of malware are instantly detected.

Reference: https://docs.amp.cisco.com/AMP%20for%20Endpoints%20User%20Guide.pdfETHOS = Fuzzy Fingerprinting using static/passive heuristics

Reference: https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKSEC-2139.pdf

asked 10/10/2024
Lakshmi Yechuri
44 questions

Question 249

Report Export Collapse

What are two characteristics of Cisco DNA Center APIs? (Choose two)

Postman is required to utilize Cisco DNA Center API calls.

Postman is required to utilize Cisco DNA Center API calls.

They do not support Python scripts.

They do not support Python scripts.

They are Cisco proprietary.

They are Cisco proprietary.

They quickly provision new devices.

They quickly provision new devices.

They view the overall health of the network

They view the overall health of the network

Suggested answer: D, E
asked 10/10/2024
Orry Meijer
39 questions

Question 250

Report Export Collapse

What is a benefit of conducting device compliance checks?

It indicates what type of operating system is connecting to the network.

It indicates what type of operating system is connecting to the network.

It validates if anti-virus software is installed.

It validates if anti-virus software is installed.

It scans endpoints to determine if malicious activity is taking place.

It scans endpoints to determine if malicious activity is taking place.

It detects email phishing attacks.

It detects email phishing attacks.

Suggested answer: B
asked 10/10/2024
Christina Chelioti
40 questions
Total 631 questions
Go to page: of 64

Related questions