ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 39

Question list
Search
Search

What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)

A.

Allows developers to create code once and deploy to multiple clouds

A.

Allows developers to create code once and deploy to multiple clouds

Answers
B.

helps maintain source code for cloud deployments

B.

helps maintain source code for cloud deployments

Answers
C.

manages Docker containers

C.

manages Docker containers

Answers
D.

manages Kubernetes clusters

D.

manages Kubernetes clusters

Answers
E.

Creates complex tasks for managing code

E.

Creates complex tasks for managing code

Answers
Suggested answer: A, E

Refer to the exhibit.

What does the API key do while working with https://api.amp.cisco.com/v1/computers?

A.

displays client ID

A.

displays client ID

Answers
B.

HTTP authorization

B.

HTTP authorization

Answers
C.

Imports requests

C.

Imports requests

Answers
D.

HTTP authentication

D.

HTTP authentication

Answers
Suggested answer: D

Which statement describes a serverless application?

A.

The application delivery controller in front of the server farm designates on which server the application runs each time.

A.

The application delivery controller in front of the server farm designates on which server the application runs each time.

Answers
B.

The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.

B.

The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.

Answers
C.

The application is installed on network equipment and not on physical servers.

C.

The application is installed on network equipment and not on physical servers.

Answers
D.

The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.

D.

The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.

Answers
Suggested answer: B

What is a description of microsegmentation?

A.

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.

A.

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.

Answers
B.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.

B.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.

Answers
C.

Environments deploy centrally managed host-based firewall rules on each server or container.

C.

Environments deploy centrally managed host-based firewall rules on each server or container.

Answers
D.

Environments implement private VLAN segmentation to group servers with similar applications.

D.

Environments implement private VLAN segmentation to group servers with similar applications.

Answers
Suggested answer: B

Which Cisco WSA feature supports access control using URL categories?

A.

transparent user identification

A.

transparent user identification

Answers
B.

SOCKS proxy services

B.

SOCKS proxy services

Answers
C.

web usage controls

C.

web usage controls

Answers
D.

user session restrictions

D.

user session restrictions

Answers
Suggested answer: A

Which technology limits communication between nodes on the same network segment to individual applications?

A.

serverless infrastructure

A.

serverless infrastructure

Answers
B.

microsegmentation

B.

microsegmentation

Answers
C.

SaaS deployment

C.

SaaS deployment

Answers
D.

machine-to-machine firewalling

D.

machine-to-machine firewalling

Answers
Suggested answer: B

An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?

A.

Restrict access to only websites with trusted third-party signed certificates.

A.

Restrict access to only websites with trusted third-party signed certificates.

Answers
B.

Modify the user's browser settings to suppress errors from Cisco Umbrella.

B.

Modify the user's browser settings to suppress errors from Cisco Umbrella.

Answers
C.

Upload the organization root CA to Cisco Umbrella.

C.

Upload the organization root CA to Cisco Umbrella.

Answers
D.

Install the Cisco Umbrella root CA onto the user's device.

D.

Install the Cisco Umbrella root CA onto the user's device.

Answers
Suggested answer: D

What is the purpose of joining Cisco WSAs to an appliance group?

A.

All WSAs in the group can view file analysis results.

A.

All WSAs in the group can view file analysis results.

Answers
B.

The group supports improved redundancy

B.

The group supports improved redundancy

Answers
C.

It supports cluster operations to expedite the malware analysis process.

C.

It supports cluster operations to expedite the malware analysis process.

Answers
D.

It simplifies the task of patching multiple appliances.

D.

It simplifies the task of patching multiple appliances.

Answers
Suggested answer: A

Why should organizations migrate to an MFA strategy for authentication?

A.

Single methods of authentication can be compromised more easily than MFA.

A.

Single methods of authentication can be compromised more easily than MFA.

Answers
B.

Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.

B.

Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.

Answers
C.

MFA methods of authentication are never compromised.

C.

MFA methods of authentication are never compromised.

Answers
D.

MFA does not require any piece of evidence for an authentication mechanism.

D.

MFA does not require any piece of evidence for an authentication mechanism.

Answers
Suggested answer: A

Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?

A.

RADIUS-based REAP

A.

RADIUS-based REAP

Answers
B.

fingerprinting

B.

fingerprinting

Answers
C.

Dynamic ARP Inspection

C.

Dynamic ARP Inspection

Answers
D.

multifactor authentication

D.

multifactor authentication

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64