Cisco 350-701 Practice Test - Questions Answers, Page 30
List of questions
Related questions
With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?
Prevalence
File analysis
Detections
Vulnerable software
Threat root cause
A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?
Create an IP block list for the website from which the file was downloaded
Block the application that the file was using to open
Upload the hash for the file into the policy
Send the file to Cisco Threat Grid for dynamic analysis
A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.
They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?
DMVPN because it supports IKEv2 and FlexVPN does not
FlexVPN because it supports IKEv2 and DMVPN does not
FlexVPN because it uses multiple SAs and DMVPN does not
DMVPN because it uses multiple SAs and FlexVPN does not
How does Cisco Workload Optimization Manager help mitigate application performance issues?
It deploys an AWS Lambda system
It automates resource resizing
It optimizes a flow path
It sets up a workload forensic score
An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?
Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address
Use the tenant control features to identify each subnet being used and track the connections within the Cisco Umbrella dashboard
Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard
Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains
What is a difference between a DoS attack and a DDoS attack?
A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where multiple systems target a single system with a DoS attack
A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN
A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets
A DoS attack is where a computer is used to flood a server with TCP packets whereas a DDoS attack is where a computer is used to flood a server with UDP packets
Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)
Upgrade software on switches and routers
Third party reporting
Connect to ITSM platforms
Create new SSIDs on a wireless LAN controller
Automatically deploy new virtual routers
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
Integration
Intent
Event
Multivendor
What is the purpose of CA in a PKI?
To issue and revoke digital certificates
To validate the authenticity of a digital certificate
To create the private key for a digital certificate
To certify the ownership of a public key by the named subject
Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?
Orchestration
CI/CD pipeline
Container
Security
Question