Cisco 350-701 Practice Test - Questions Answers, Page 28
List of questions
Related questions
What are two Trojan malware attacks? (Choose two)
Frontdoor
Rootkit
Smurf
Backdoor
Sync
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
To protect the endpoint against malicious file transfers
To ensure that assets are secure from malicious links on and off the corporate network
To establish secure VPN connectivity to the corporate network
To enforce posture compliance and mandatory software
What is a capability of Cisco ASA Netflow?
It filters NSEL events based on traffic
It generates NSEL events even if the MPF is not configured
It logs all event types only to the same collector
It sends NetFlow data records from active and standby ASAs in an active standby failover pair
Which component of Cisco umbrella architecture increases reliability of the service?
Anycast IP
AMP Threat grid
Cisco Talos
BGP route reflector
What is the benefit of integrating Cisco ISE with a MDM solution?
It provides compliance checks for access to the network
It provides the ability to update other applications on the mobile device
It provides the ability to add applications to the mobile device through Cisco ISE
It provides network device administration access
An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?
Configure the *.com address in the block list.
Configure the *.domain.com address in the block list
Configure the *domain.com address in the block list
Configure the domain.com address in the block list
An organization wants to provide visibility and to identify active threats in its network using a VM.
The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?
Cisco Umbrella Cloud
Cisco Stealthwatch Cloud PNM
Cisco Stealthwatch Cloud PCM
Cisco Umbrella On-Premises
An organization deploys multiple Cisco FTD appliances and wants to manage them using one centralized solution. The organization does not have a local VM but does have existing Cisco ASAs that must migrate over to Cisco FTDs. Which solution meets the needs of the organization?
Cisco FMC
CSM
Cisco FDM
CDO
An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and dat a. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?
Virtual routing and forwarding
Microsegmentation
Access control policy
Virtual LAN
A Cisco FTD engineer is creating a new IKEv2 policy called s2s00123456789 for their organization to allow for additional protocols to terminate network devices with. They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?
Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy
Make the priority for the new policy 5 and the primary policy 1
Change the encryption to AES* to support all AES algorithms in the primary policy
Make the priority for the primary policy 10 and the new policy 1
Question