Cisco 350-701 Practice Test - Questions Answers, Page 38
List of questions
Related questions
Why is it important to have a patching strategy for endpoints?
to take advantage of new features released with patches
so that functionality is increased on a faster scale when it is used
so that known vulnerabilities are targeted and having a regular patch cycle reduces risks
so that patching strategies can assist with disabling nonsecure protocols in applications
An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?
Configure the default policy to redirect the requests to the correct policy
Place the policy with the most-specific configuration last in the policy order
Configure only the policy with the most recently changed timestamp
Make the correct policy first in the policy order
Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?
Cisco Content Platform
Cisco Container Controller
Cisco Container Platform
Cisco Cloud Platform
What is the intent of a basic SYN flood attack?
to solicit DNS responses
to exceed the threshold limit of the connection queue
to flush the register stack to re-initiate the buffers
to cause the buffer to overflow
An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?
Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.
Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.
Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.
Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.
Which endpoint solution protects a user from a phishing attack?
Cisco Identity Services Engine
Cisco AnyConnect with ISE Posture module
Cisco AnyConnect with Network Access Manager module
Cisco AnyConnect with Umbrella Roaming Security module
Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?
Cisco Identity Services Engine
Cisco Enterprise Security Appliance
Cisco Web Security Appliance
Cisco Advanced Stealthwatch Appliance
What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)
If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.
PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.
The WSA hosts PAC files on port 9001 by default.
The WSA hosts PAC files on port 6001 by default.
By default, they direct traffic through a proxy when the PC and the host are on the same subnet.
Which IETF attribute is supported for the RADIUS CoA feature?
24 State
30 Calling-Station-ID
42 Acct-Session-ID
81 Message-Authenticator
When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?
guest
limited Internet
blocked
full Internet
Question