ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 30

Question list
Search
Search

With Cisco AMP for Endpoints, which option shows a list of all files that have been executed in your environment?

A.

Prevalence

A.

Prevalence

Answers
B.

File analysis

B.

File analysis

Answers
C.

Detections

C.

Detections

Answers
D.

Vulnerable software

D.

Vulnerable software

Answers
E.

Threat root cause

E.

Threat root cause

Answers
Suggested answer: A

Explanation:

Prevalence allows you to view files that have been executed in your deployment.

Note: Threat Root Cause shows how malware is getting onto your computers.

Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise. What must be done in order to ensure that the created is functioning as it should?

A.

Create an IP block list for the website from which the file was downloaded

A.

Create an IP block list for the website from which the file was downloaded

Answers
B.

Block the application that the file was using to open

B.

Block the application that the file was using to open

Answers
C.

Upload the hash for the file into the policy

C.

Upload the hash for the file into the policy

Answers
D.

Send the file to Cisco Threat Grid for dynamic analysis

D.

Send the file to Cisco Threat Grid for dynamic analysis

Answers
Suggested answer: C

A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.

They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth. Which solution would be best for this and why?

A.

DMVPN because it supports IKEv2 and FlexVPN does not

A.

DMVPN because it supports IKEv2 and FlexVPN does not

Answers
B.

FlexVPN because it supports IKEv2 and DMVPN does not

B.

FlexVPN because it supports IKEv2 and DMVPN does not

Answers
C.

FlexVPN because it uses multiple SAs and DMVPN does not

C.

FlexVPN because it uses multiple SAs and DMVPN does not

Answers
D.

DMVPN because it uses multiple SAs and FlexVPN does not

D.

DMVPN because it uses multiple SAs and FlexVPN does not

Answers
Suggested answer: C

Explanation:

FlexVPN supports IKEv2 -> Answer A is not correct.

DMVPN supports both IKEv1 & IKEv2 -> Answer B is not correct.

FlexVPN support multiple SAs -> Answer D is not correct.

How does Cisco Workload Optimization Manager help mitigate application performance issues?

A.

It deploys an AWS Lambda system

A.

It deploys an AWS Lambda system

Answers
B.

It automates resource resizing

B.

It automates resource resizing

Answers
C.

It optimizes a flow path

C.

It optimizes a flow path

Answers
D.

It sets up a workload forensic score

D.

It sets up a workload forensic score

Answers
Suggested answer: B

Explanation:


An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address. What must be done to resolve this issue?

A.

Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address

A.

Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address

Answers
B.

Use the tenant control features to identify each subnet being used and track the connections within the Cisco Umbrella dashboard

B.

Use the tenant control features to identify each subnet being used and track the connections within the Cisco Umbrella dashboard

Answers
C.

Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard

C.

Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard

Answers
D.

Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains

D.

Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains

Answers
Suggested answer: A

What is a difference between a DoS attack and a DDoS attack?

A.

A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where multiple systems target a single system with a DoS attack

A.

A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where multiple systems target a single system with a DoS attack

Answers
B.

A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN

B.

A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN

Answers
C.

A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets

C.

A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets

Answers
D.

A DoS attack is where a computer is used to flood a server with TCP packets whereas a DDoS attack is where a computer is used to flood a server with UDP packets

D.

A DoS attack is where a computer is used to flood a server with TCP packets whereas a DDoS attack is where a computer is used to flood a server with UDP packets

Answers
Suggested answer: A

Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)

A.

Upgrade software on switches and routers

A.

Upgrade software on switches and routers

Answers
B.

Third party reporting

B.

Third party reporting

Answers
C.

Connect to ITSM platforms

C.

Connect to ITSM platforms

Answers
D.

Create new SSIDs on a wireless LAN controller

D.

Create new SSIDs on a wireless LAN controller

Answers
E.

Automatically deploy new virtual routers


E.

Automatically deploy new virtual routers


Answers
Suggested answer: B, C

Explanation:


Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

A.

Integration

A.

Integration

Answers
B.

Intent

B.

Intent

Answers
C.

Event

C.

Event

Answers
D.

Multivendor

D.

Multivendor

Answers
Suggested answer: B

What is the purpose of CA in a PKI?

A.

To issue and revoke digital certificates

A.

To issue and revoke digital certificates

Answers
B.

To validate the authenticity of a digital certificate

B.

To validate the authenticity of a digital certificate

Answers
C.

To create the private key for a digital certificate

C.

To create the private key for a digital certificate

Answers
D.

To certify the ownership of a public key by the named subject

D.

To certify the ownership of a public key by the named subject

Answers
Suggested answer: A

Explanation:

A trusted CA is the only entity that can issue trusted digital certificates. This is extremely important because while PKI manages more of the encryption side of these certificates, authentication is vital to understanding which entities own what keys. Without a trusted CA, anyone can issue their own keys, authentication goes out the window and chaos ensues.

Reference: https://cheapsslsecurity.com/blog/understanding-the-role-of-certificate-authorities-inpki/

Which DevSecOps implementation process gives a weekly or daily update instead of monthly or quarterly in the applications?

A.

Orchestration

A.

Orchestration

Answers
B.

CI/CD pipeline

B.

CI/CD pipeline

Answers
C.

Container

C.

Container

Answers
D.

Security

D.

Security

Answers
Suggested answer: B

Explanation:

Unlike the traditional software life cycle, the CI/CD implementation process gives a weekly or daily update instead of monthly or quarterly. The fun part is customers won't even realize the update is in their applications, as they happen on the fly.

Reference: https://devops.com/how-to-implement-an-effective-ci-cd-pipeline/

Total 631 questions
Go to page: of 64