Cisco 350-701 Practice Test - Questions Answers, Page 28

List of questions
Question 271

What are two Trojan malware attacks? (Choose two)
Question 272

What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
Question 273

What is a capability of Cisco ASA Netflow?
Question 274

Which component of Cisco umbrella architecture increases reliability of the service?
Question 275

What is the benefit of integrating Cisco ISE with a MDM solution?
Question 276

An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?
Question 277

An organization wants to provide visibility and to identify active threats in its network using a VM.
The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?
Question 278

An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs. Which solution meets the needs of the organization?
Question 279

An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and dat a. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
Question 280

A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?
Question