ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 35

Add to Whishlist

List of questions

Question 341

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 341 117562 10102024233051000000

How does Cisco Umbrella manage traffic that is directed toward risky domains?

Traffic is proximed through the intelligent proxy.

Traffic is proximed through the intelligent proxy.

Traffic is managed by the security settings and blocked.

Traffic is managed by the security settings and blocked.

Traffic is managed by the application settings, unhandled and allowed.

Traffic is managed by the application settings, unhandled and allowed.

Traffic is allowed but logged.

Traffic is allowed but logged.

Suggested answer: B
asked 10/10/2024
Ramzi Smair
39 questions

Question 342

Report Export Collapse

An engineer needs to add protection for data in transit and have headers in the email message Which configuration is needed to accomplish this goal?

Provision the email appliance

Provision the email appliance

Deploy an encryption appliance.

Deploy an encryption appliance.

Map sender !P addresses to a host interface.

Map sender !P addresses to a host interface.

Enable flagged message handling

Enable flagged message handling

Suggested answer: D
asked 10/10/2024
Djordje Novakovic
44 questions

Question 343

Report Export Collapse

How does a cloud access security broker function?

It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution

It is an authentication broker to enable single sign-on and multi-factor authentication for a cloud solution

lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution

lt integrates with other cloud solutions via APIs and monitors and creates incidents based on events from the cloud solution

It acts as a security information and event management solution and receives syslog from other cloud solutions.

It acts as a security information and event management solution and receives syslog from other cloud solutions.

It scans other cloud solutions being used within the network and identifies vulnerabilities

It scans other cloud solutions being used within the network and identifies vulnerabilities

Suggested answer: B
asked 10/10/2024
Josh Davis
42 questions

Question 344

Report Export Collapse

An engineer integrates Cisco FMC and Cisco ISE using pxGrid Which role is assigned for Cisco FMC?

client

client

server

server

controller

controller

publisher

publisher

Suggested answer: D
asked 10/10/2024
Zulkarnain Hashim
44 questions

Question 345

Report Export Collapse

A network security engineer must export packet captures from the Cisco FMC web browser while troubleshooting an issue. When navigating to the address Error! Hyperlink reference not valid.

IP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file. Which action must the engineer take to resolve this issue?

Disable the proxy setting on the browser

Disable the proxy setting on the browser

Disable the HTTPS server and use HTTP instead

Disable the HTTPS server and use HTTP instead

Use the Cisco FTD IP address as the proxy server setting on the browser

Use the Cisco FTD IP address as the proxy server setting on the browser

Enable the HTTPS server for the device platform policy

Enable the HTTPS server for the device platform policy

Suggested answer: D
asked 10/10/2024
mohamed mamdouh
46 questions

Question 346

Report Export Collapse

What is a description of microsegmentation?

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery

Environments implement private VLAN segmentation to group servers with similar applications.

Environments implement private VLAN segmentation to group servers with similar applications.

Environments deploy centrally managed host-based firewall rules on each server or container

Environments deploy centrally managed host-based firewall rules on each server or container

Suggested answer: A
asked 10/10/2024
Frank Acosta
46 questions

Question 347

Report Export Collapse

What must be enabled to secure SaaS-based applications?

modular policy framework

modular policy framework

two-factor authentication

two-factor authentication

application security gateway

application security gateway

end-to-end encryption

end-to-end encryption

Suggested answer: C
asked 10/10/2024
aakriti grover
60 questions

Question 348

Report Export Collapse

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.) The eDirectory client must be installed on each client workstation.

Create NTLM or Kerberos authentication realm and enable transparent user identification

Create NTLM or Kerberos authentication realm and enable transparent user identification

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

Create an LDAP authentication realm and disable transparent user identification.

Create an LDAP authentication realm and disable transparent user identification.

Deploy a separate eDirectory server: the client IP address is recorded in this server

Deploy a separate eDirectory server: the client IP address is recorded in this server

Suggested answer: A, B
Explanation:

Transparently identify users with authentication realms-- This option is available when one or more authentication realms are configured to support transparent identification using one of the following authentication servers: Active Directory-- Create an NTLM or Kerberos authentication realm and enable transparent user identification. In addition, you must deploy a separate Active Directory agent such as Cisco's Context Directory Agent. For more information, seeTransparent User Identification with Active Directory. LDAP-- Create an LDAP authentication realm configured as an eDirectory, and enable transparent user identification. For more information, seeTransparent User Identification with LDAP. Details: https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11- 0/user_guide/b_WSA_UserGuide/b_WSA_UserGuide_chapter_01001.html#:~:text=Transparently%20id entify%20users%20with%20authentication,User%20Identification%20with%20LDAP.


asked 10/10/2024
Marc Casin Martinez
43 questions

Question 349

Report Export Collapse

Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?

buffer overflow

buffer overflow

browser WGET

browser WGET

SQL injection

SQL injection

cross-site scripting

cross-site scripting

Suggested answer: D
asked 10/10/2024
Marco Morsiani
47 questions

Question 350

Report Export Collapse

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?

consumption

consumption

sharing

sharing

editing

editing

authoring

authoring

Suggested answer: A
asked 10/10/2024
Jagatnata Gurusinga
45 questions
Total 631 questions
Go to page: of 64

Related questions