ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 44

Question list
Search
Search

Which two functions does the Cisco Advanced Phishing Protection solution perform in trying to protect from phishing attacks? (Choose two.)

A.

blocks malicious websites and adds them to a block list

A.

blocks malicious websites and adds them to a block list

Answers
B.

does a real-time user web browsing behavior analysis

B.

does a real-time user web browsing behavior analysis

Answers
C.

provides a defense for on-premises email deployments

C.

provides a defense for on-premises email deployments

Answers
D.

uses a static algorithm to determine malicious

D.

uses a static algorithm to determine malicious

Answers
E.

determines if the email messages are malicious

E.

determines if the email messages are malicious

Answers
Suggested answer: C, E

What is a feature of NetFlow Secure Event Logging?

A.

It exports only records that indicate significant events in a flow.

A.

It exports only records that indicate significant events in a flow.

Answers
B.

It filters NSEL events based on the traffic and event type through RSVP.

B.

It filters NSEL events based on the traffic and event type through RSVP.

Answers
C.

It delivers data records to NSEL collectors through NetFlow over TCP only.

C.

It delivers data records to NSEL collectors through NetFlow over TCP only.

Answers
D.

It supports v5 and v8 templates.

D.

It supports v5 and v8 templates.

Answers
Suggested answer: A

A hacker initiated a social engineering attack and stole username and passwords of some users within a company. Which product should be used as a solution to this problem?

A.

Cisco NGFW

A.

Cisco NGFW

Answers
B.

Cisco AnyConnect

B.

Cisco AnyConnect

Answers
C.

Cisco AMP for Endpoints

C.

Cisco AMP for Endpoints

Answers
D.

Cisco Duo

D.

Cisco Duo

Answers
Suggested answer: D

Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection, enabling the platform to identify and output various applications within the network traffic flows?

A.

Cisco NBAR2

A.

Cisco NBAR2

Answers
B.

Cisco ASAV

B.

Cisco ASAV

Answers
C.

Account on Resolution

C.

Account on Resolution

Answers
D.

Cisco Prime Infrastructure

D.

Cisco Prime Infrastructure

Answers
Suggested answer: A

Which RADIUS feature provides a mechanism to change the AAA attributes of a session after it is authenticated?

A.

Authorization

A.

Authorization

Answers
B.

Accounting

B.

Accounting

Answers
C.

Authentication

C.

Authentication

Answers
D.

CoA

D.

CoA

Answers
Suggested answer: D

Which type of data exfiltration technique encodes data in outbound DNS requests to specific servers and can be stopped by Cisco Umbrella?

A.

DNS tunneling

A.

DNS tunneling

Answers
B.

DNS flood attack

B.

DNS flood attack

Answers
C.

cache poisoning

C.

cache poisoning

Answers
D.

DNS hijacking

D.

DNS hijacking

Answers
Suggested answer: A

A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco security appliance meets these requirements?

A.

Cisco Cloud Orchestrator

A.

Cisco Cloud Orchestrator

Answers
B.

Cisco ASAV

B.

Cisco ASAV

Answers
C.

Cisco WSAV

C.

Cisco WSAV

Answers
D.

Cisco Stealthwatch Cloud

D.

Cisco Stealthwatch Cloud

Answers
Suggested answer: B

Which CLI command is used to enable URL filtering support for shortened URLs on the Cisco ESA?

A.

webadvancedconfig

A.

webadvancedconfig

Answers
B.

websecurity advancedconfig

B.

websecurity advancedconfig

Answers
C.

outbreakconfig

C.

outbreakconfig

Answers
D.

websecurity config

D.

websecurity config

Answers
Suggested answer: B

Which standard is used to automate exchanging cyber threat information?

A.

TAXIL

A.

TAXIL

Answers
B.

MITRE

B.

MITRE

Answers
C.

IoC

C.

IoC

Answers
D.

STIX

D.

STIX

Answers
Suggested answer: A

What is a function of the Layer 4 Traffic Monitor on a Cisco WSA?

A.

blocks traffic from URL categories that are known to contain malicious content

A.

blocks traffic from URL categories that are known to contain malicious content

Answers
B.

decrypts SSL traffic to monitor for malicious content

B.

decrypts SSL traffic to monitor for malicious content

Answers
C.

monitors suspicious traffic across all the TCP/UDP ports

C.

monitors suspicious traffic across all the TCP/UDP ports

Answers
D.

prevents data exfiltration by searching all the network traffic for specified sensitive information

D.

prevents data exfiltration by searching all the network traffic for specified sensitive information

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64