ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 46

Question list
Search
Search

Which MDM configuration provides scalability?

A.

pushing WPA2-Enterprise settings automatically to devices

A.

pushing WPA2-Enterprise settings automatically to devices

Answers
B.

enabling use of device features such as camera use

B.

enabling use of device features such as camera use

Answers
C.

BYOD support without extra appliance or licenses

C.

BYOD support without extra appliance or licenses

Answers
D.

automatic device classification with level 7 fingerprinting

D.

automatic device classification with level 7 fingerprinting

Answers
Suggested answer: C

Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to the network?

A.

posture

A.

posture

Answers
B.

profiler

B.

profiler

Answers
C.

Cisco TrustSec

C.

Cisco TrustSec

Answers
D.

Threat Centric NAC

D.

Threat Centric NAC

Answers
Suggested answer: A

Which endpoint protection and detection feature performs correlation of telemetry, files, and intrusion events that are flagged as possible active breaches?

A.

retrospective detection

A.

retrospective detection

Answers
B.

indication of compromise

B.

indication of compromise

Answers
C.

file trajectory

C.

file trajectory

Answers
D.

elastic search

D.

elastic search

Answers
Suggested answer: B

Which feature enables a Cisco ISR to use the default bypass list automatically for web filtering?

A.

filters

A.

filters

Answers
B.

group key

B.

group key

Answers
C.

company key

C.

company key

Answers
D.

connector

D.

connector

Answers
Suggested answer: D

A network engineer has configured a NTP server on a Cisco ASA. The Cisco ASA has IP reachability to the NTP server and is not filtering any traffic. The show ntp association detail command indicates that the configured NTP server is unsynchronized and has a stratum of 16. What is the cause of this issue?

A.

Resynchronization of NTP is not forced

A.

Resynchronization of NTP is not forced

Answers
B.

NTP is not configured to use a working server.

B.

NTP is not configured to use a working server.

Answers
C.

An access list entry for UDP port 123 on the inside interface is missing.

C.

An access list entry for UDP port 123 on the inside interface is missing.

Answers
D.

An access list entry for UDP port 123 on the outside interface is missing.

D.

An access list entry for UDP port 123 on the outside interface is missing.

Answers
Suggested answer: B

When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.)

A.

signature-based endpoint protection on company endpoints

A.

signature-based endpoint protection on company endpoints

Answers
B.

macro-based protection to keep connected endpoints safe

B.

macro-based protection to keep connected endpoints safe

Answers
C.

continuous monitoring of all files that are located on connected endpoints

C.

continuous monitoring of all files that are located on connected endpoints

Answers
D.

email integration to protect endpoints from malicious content that is located in email

D.

email integration to protect endpoints from malicious content that is located in email

Answers
E.

real-time feeds from global threat intelligence centers

E.

real-time feeds from global threat intelligence centers

Answers
Suggested answer: C, E

What is the process of performing automated static and dynamic analysis of files against preloaded behavioral indicators for threat analysis?

A.

deep visibility scan

A.

deep visibility scan

Answers
B.

point-in-time checks

B.

point-in-time checks

Answers
C.

advanced sandboxing

C.

advanced sandboxing

Answers
D.

advanced scanning

D.

advanced scanning

Answers
Suggested answer: C

Which solution is made from a collection of secure development practices and guidelines that developers must follow to build secure applications?

A.

AFL

A.

AFL

Answers
B.

Fuzzing Framework

B.

Fuzzing Framework

Answers
C.

Radamsa

C.

Radamsa

Answers
D.

OWASP

D.

OWASP

Answers
Suggested answer: D

What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?

A.

continuous integration and continuous deployment

A.

continuous integration and continuous deployment

Answers
B.

cloud application security broker

B.

cloud application security broker

Answers
C.

compile-time instrumentation

C.

compile-time instrumentation

Answers
D.

container orchestration

D.

container orchestration

Answers
Suggested answer: A

Which direction do attackers encode data in DNS requests during exfiltration using DNS tunneling?

A.

inbound

A.

inbound

Answers
B.

north-south

B.

north-south

Answers
C.

east-west

C.

east-west

Answers
D.

outbound

D.

outbound

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64