ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 38

Question list
Search
Search

Why is it important to have a patching strategy for endpoints?

A.

to take advantage of new features released with patches

A.

to take advantage of new features released with patches

Answers
B.

so that functionality is increased on a faster scale when it is used

B.

so that functionality is increased on a faster scale when it is used

Answers
C.

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

C.

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

Answers
D.

so that patching strategies can assist with disabling nonsecure protocols in applications

D.

so that patching strategies can assist with disabling nonsecure protocols in applications

Answers
Suggested answer: C

An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?

A.

Configure the default policy to redirect the requests to the correct policy

A.

Configure the default policy to redirect the requests to the correct policy

Answers
B.

Place the policy with the most-specific configuration last in the policy order

B.

Place the policy with the most-specific configuration last in the policy order

Answers
C.

Configure only the policy with the most recently changed timestamp

C.

Configure only the policy with the most recently changed timestamp

Answers
D.

Make the correct policy first in the policy order

D.

Make the correct policy first in the policy order

Answers
Suggested answer: D

Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?

A.

Cisco Content Platform

A.

Cisco Content Platform

Answers
B.

Cisco Container Controller

B.

Cisco Container Controller

Answers
C.

Cisco Container Platform

C.

Cisco Container Platform

Answers
D.

Cisco Cloud Platform

D.

Cisco Cloud Platform

Answers
Suggested answer: C

What is the intent of a basic SYN flood attack?

A.

to solicit DNS responses

A.

to solicit DNS responses

Answers
B.

to exceed the threshold limit of the connection queue

B.

to exceed the threshold limit of the connection queue

Answers
C.

to flush the register stack to re-initiate the buffers

C.

to flush the register stack to re-initiate the buffers

Answers
D.

to cause the buffer to overflow

D.

to cause the buffer to overflow

Answers
Suggested answer: B

An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?

A.

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

A.

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

Answers
B.

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

B.

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

Answers
C.

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

C.

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

Answers
D.

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

D.

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

Answers
Suggested answer: B

Which endpoint solution protects a user from a phishing attack?

A.

Cisco Identity Services Engine

A.

Cisco Identity Services Engine

Answers
B.

Cisco AnyConnect with ISE Posture module

B.

Cisco AnyConnect with ISE Posture module

Answers
C.

Cisco AnyConnect with Network Access Manager module

C.

Cisco AnyConnect with Network Access Manager module

Answers
D.

Cisco AnyConnect with Umbrella Roaming Security module

D.

Cisco AnyConnect with Umbrella Roaming Security module

Answers
Suggested answer: D

Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?

A.

Cisco Identity Services Engine

A.

Cisco Identity Services Engine

Answers
B.

Cisco Enterprise Security Appliance

B.

Cisco Enterprise Security Appliance

Answers
C.

Cisco Web Security Appliance

C.

Cisco Web Security Appliance

Answers
D.

Cisco Advanced Stealthwatch Appliance

D.

Cisco Advanced Stealthwatch Appliance

Answers
Suggested answer: C

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)

A.

If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.

A.

If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.

Answers
B.

PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.

B.

PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.

Answers
C.

The WSA hosts PAC files on port 9001 by default.

C.

The WSA hosts PAC files on port 9001 by default.

Answers
D.

The WSA hosts PAC files on port 6001 by default.

D.

The WSA hosts PAC files on port 6001 by default.

Answers
E.

By default, they direct traffic through a proxy when the PC and the host are on the same subnet.

E.

By default, they direct traffic through a proxy when the PC and the host are on the same subnet.

Answers
Suggested answer: A, D

Which IETF attribute is supported for the RADIUS CoA feature?

A.

24 State

A.

24 State

Answers
B.

30 Calling-Station-ID

B.

30 Calling-Station-ID

Answers
C.

42 Acct-Session-ID

C.

42 Acct-Session-ID

Answers
D.

81 Message-Authenticator

D.

81 Message-Authenticator

Answers
Suggested answer: A

When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?

A.

guest

A.

guest

Answers
B.

limited Internet

B.

limited Internet

Answers
C.

blocked

C.

blocked

Answers
D.

full Internet

D.

full Internet

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64