Cisco 350-701 Practice Test - Questions Answers, Page 35

List of questions
Question 341

Refer to the exhibit.
How does Cisco Umbrella manage traffic that is directed toward risky domains?
Traffic is proximed through the intelligent proxy.
Traffic is managed by the security settings and blocked.
Traffic is managed by the application settings, unhandled and allowed.
Traffic is allowed but logged.
Question 342

An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?
Provision the email appliance
Deploy an encryption appliance.
Map sender !P addresses to a host interface.
Enable flagged message handling
Question 343

How does a cloud access security broker function?
It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution
lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution
It acts as a security information and event management solution and receives syslog from other cloud solutions.
It scans other cloud solutions being used within the network and identifies vulnerabilities
Question 344

An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?
client
server
controller
publisher
Question 345

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address Error! Hyperlink reference not valid.
IP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?
Disable the proxy setting on the browser
Disable the HTTPS server and use HTTP instead
Use the Cisco FTD IP address as the proxy server setting on the browser
Enable the HTTPS server for the device platform policy
Question 346

What is a description of microsegmentation?
Environments apply a zero-trust model and specify how applications on different servers or containers can communicate
Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery
Environments implement private VLAN segmentation to group servers with similar applications.
Environments deploy centrally managed host-based firewall rules on each server or container
Question 347

What must be enabled to secure SaaS-based applications?
modular policy framework
two-factor authentication
application security gateway
end-to-end encryption
Question 348

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.
Create NTLM or Kerberos authentication realm and enable transparent user identification
Deploy a separate Active Directory agent such as Cisco Context Directory Agent.
Create an LDAP authentication realm and disable transparent user identification.
Deploy a separate eDirectory server: the client IP address is recorded in this server
Transparently identify users with authentication realms-- This option is available when one or more authentication realms are configured to support transparent identification using one of the following authentication servers: Active Directory-- Create an NTLM or Kerberos authentication realm and enable transparent user identification. In addition, you must deploy a separate Active Directory agent such as Cisco's Context Directory Agent. For more information, seeTransparent User Identification with Active Directory. LDAP-- Create an LDAP authentication realm configured as an eDirectory, and enable transparent user identification. For more information, seeTransparent User Identification with LDAP. Details: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11- 0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html#:~:text=Transparently%20id entify%20users%20with%20authentication,User%20Identification%20with%20LDAP.
Question 349

Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?
buffer overflow
browser WGET
SQL injection
cross-site scripting
Question 350

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?
consumption
sharing
editing
authoring
Question