Cisco 350-701 Practice Test - Questions Answers, Page 46
List of questions
Related questions
Which MDM configuration provides scalability?
pushing WPA2-Enterprise settings automatically to devices
enabling use of device features such as camera use
BYOD support without extra appliance or licenses
automatic device classification with level 7 fingerprinting
Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to the network?
posture
profiler
Cisco TrustSec
Threat Centric NAC
Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion events that are flagged as possible active breaches?
retrospective detection
indication of compromise
file trajectory
elastic search
Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?
filters
group key
company key
connector
A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic. The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue?
Resynchronization of NTP is not forced
NTP is not configured to use a working server.
An access list entry for UDP port 123 on the inside interface is missing.
An access list entry for UDP port 123 on the outside interface is missing.
When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.)
signature-based endpoint protection on company endpoints
macro-based protection to keep connected endpoints safe
continuous monitoring of all files that are located on connected endpoints
email integration to protect endpoints from malicious content that is located in email
real-time feeds from global threat intelligence centers
What is the process of performing automated static and dynamic analysis of files against preloaded behavioral indicators for threat analysis?
deep visibility scan
point-in-time checks
advanced sandboxing
advanced scanning
Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?
AFL
Fuzzing Framework
Radamsa
OWASP
What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?
continuous integration and continuous deployment
cloud application security broker
compile-time instrumentation
container orchestration
Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?
inbound
north-south
east-west
outbound
Question