ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 35

Question list
Search
Search

Refer to the exhibit.

How does Cisco Umbrella manage traffic that is directed toward risky domains?

A.

Traffic is proximed through the intelligent proxy.

A.

Traffic is proximed through the intelligent proxy.

Answers
B.

Traffic is managed by the security settings and blocked.

B.

Traffic is managed by the security settings and blocked.

Answers
C.

Traffic is managed by the application settings, unhandled and allowed.

C.

Traffic is managed by the application settings, unhandled and allowed.

Answers
D.

Traffic is allowed but logged.

D.

Traffic is allowed but logged.

Answers
Suggested answer: B

An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?

A.

Provision the email appliance

A.

Provision the email appliance

Answers
B.

Deploy an encryption appliance.

B.

Deploy an encryption appliance.

Answers
C.

Map sender !P addresses to a host interface.

C.

Map sender !P addresses to a host interface.

Answers
D.

Enable flagged message handling

D.

Enable flagged message handling

Answers
Suggested answer: D

How does a cloud access security broker function?

A.

It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution

A.

It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution

Answers
B.

lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution

B.

lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution

Answers
C.

It acts as a security information and event management solution and receives syslog from other cloud solutions.

C.

It acts as a security information and event management solution and receives syslog from other cloud solutions.

Answers
D.

It scans other cloud solutions being used within the network and identifies vulnerabilities

D.

It scans other cloud solutions being used within the network and identifies vulnerabilities

Answers
Suggested answer: B

An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?

A.

client

A.

client

Answers
B.

server

B.

server

Answers
C.

controller

C.

controller

Answers
D.

publisher

D.

publisher

Answers
Suggested answer: D

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address Error! Hyperlink reference not valid.

IP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?

A.

Disable the proxy setting on the browser

A.

Disable the proxy setting on the browser

Answers
B.

Disable the HTTPS server and use HTTP instead

B.

Disable the HTTPS server and use HTTP instead

Answers
C.

Use the Cisco FTD IP address as the proxy server setting on the browser

C.

Use the Cisco FTD IP address as the proxy server setting on the browser

Answers
D.

Enable the HTTPS server for the device platform policy

D.

Enable the HTTPS server for the device platform policy

Answers
Suggested answer: D

What is a description of microsegmentation?

A.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate

A.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate

Answers
B.

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery

B.

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery

Answers
C.

Environments implement private VLAN segmentation to group servers with similar applications.

C.

Environments implement private VLAN segmentation to group servers with similar applications.

Answers
D.

Environments deploy centrally managed host-based firewall rules on each server or container

D.

Environments deploy centrally managed host-based firewall rules on each server or container

Answers
Suggested answer: A

What must be enabled to secure SaaS-based applications?

A.

modular policy framework

A.

modular policy framework

Answers
B.

two-factor authentication

B.

two-factor authentication

Answers
C.

application security gateway

C.

application security gateway

Answers
D.

end-to-end encryption

D.

end-to-end encryption

Answers
Suggested answer: C

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.

A.

Create NTLM or Kerberos authentication realm and enable transparent user identification

A.

Create NTLM or Kerberos authentication realm and enable transparent user identification

Answers
B.

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

B.

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

Answers
C.

Create an LDAP authentication realm and disable transparent user identification.

C.

Create an LDAP authentication realm and disable transparent user identification.

Answers
D.

Deploy a separate eDirectory server: the client IP address is recorded in this server

D.

Deploy a separate eDirectory server: the client IP address is recorded in this server

Answers
Suggested answer: A, B

Explanation:

Transparently identify users with authentication realms-- This option is available when one or more authentication realms are configured to support transparent identification using one of the following authentication servers: Active Directory-- Create an NTLM or Kerberos authentication realm and enable transparent user identification. In addition, you must deploy a separate Active Directory agent such as Cisco's Context Directory Agent. For more information, seeTransparent User Identification with Active Directory. LDAP-- Create an LDAP authentication realm configured as an eDirectory, and enable transparent user identification. For more information, seeTransparent User Identification with LDAP. Details: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11- 0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html#:~:text=Transparently%20id entify%20users%20with%20authentication,User%20Identification%20with%20LDAP.


Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?

A.

buffer overflow

A.

buffer overflow

Answers
B.

browser WGET

B.

browser WGET

Answers
C.

SQL injection

C.

SQL injection

Answers
D.

cross-site scripting

D.

cross-site scripting

Answers
Suggested answer: D

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?

A.

consumption

A.

consumption

Answers
B.

sharing

B.

sharing

Answers
C.

editing

C.

editing

Answers
D.

authoring

D.

authoring

Answers
Suggested answer: A
Total 631 questions
Go to page: of 64