Cisco 350-701 Practice Test - Questions Answers, Page 39
List of questions
Related questions
What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)
Allows developers to create code once and deploy to multiple clouds
helps maintain source code for cloud deployments
manages Docker containers
manages Kubernetes clusters
Creates complex tasks for managing code
Refer to the exhibit.
What does the API key do while working with https://api.amp.cisco.com/v1/computers?
displays client ID
HTTP authorization
Imports requests
HTTP authentication
Which statement describes a serverless application?
The application delivery controller in front of the server farm designates on which server the application runs each time.
The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.
The application is installed on network equipment and not on physical servers.
The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.
What is a description of microsegmentation?
Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.
Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.
Environments deploy centrally managed host-based firewall rules on each server or container.
Environments implement private VLAN segmentation to group servers with similar applications.
Which Cisco WSA feature supports access control using URL categories?
transparent user identification
SOCKS proxy services
web usage controls
user session restrictions
Which technology limits communication between nodes on the same network segment to individual applications?
serverless infrastructure
microsegmentation
SaaS deployment
machine-to-machine firewalling
An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?
Restrict access to only websites with trusted third-party signed certificates.
Modify the user's browser settings to suppress errors from Cisco Umbrella.
Upload the organization root CA to Cisco Umbrella.
Install the Cisco Umbrella root CA onto the user's device.
What is the purpose of joining Cisco WSAs to an appliance group?
All WSAs in the group can view file analysis results.
The group supports improved redundancy
It supports cluster operations to expedite the malware analysis process.
It simplifies the task of patching multiple appliances.
Why should organizations migrate to an MFA strategy for authentication?
Single methods of authentication can be compromised more easily than MFA.
Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.
MFA methods of authentication are never compromised.
MFA does not require any piece of evidence for an authentication mechanism.
Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?
RADIUS-based REAP
fingerprinting
Dynamic ARP Inspection
multifactor authentication
Question