Cisco 350-701 Practice Test - Questions Answers, Page 47
List of questions
Related questions
Which technology provides a combination of endpoint protection endpoint detection, and response?
Cisco AMP
Cisco Talos
Cisco Threat Grid
Cisco Umbrella
What is a feature of container orchestration?
ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane
ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane
ability to deploy Kubernetes clusters in air-gapped sites
automated daily updates
What are two security benefits of an MDM deployment? (Choose two.)
robust security policy enforcement
privacy control checks
on-device content management
distributed software upgrade
distributed dashboard
Refer to the exhibit.
Consider that any feature of DNS requests, such as the length off the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
Spectre Worm
Eternal Blue Windows
Heartbleed SSL Bug
W32/AutoRun worm
What is the recommendation in a zero-trust model before granting access to corporate applications and resources?
to use multifactor authentication
to use strong passwords
to use a wired network, not wireless
to disconnect from the network when inactive
Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?
endpoint isolation
advanced search
advanced investigation
retrospective security
Which solution stops unauthorized access to the system if a user's password is compromised?
VPN
MFA
AMP
SSL
What is a benefit of using Cisco Tetration?
It collects telemetry data from servers and then uses software sensors to analyze flow information.
It collects policy compliance data and process details.
It collects enforcement data from servers and collects interpacket variation.
It collects near-real time data from servers and inventories the software packages that exist on servers.
How does Cisco Umbrella protect clients when they operate outside of the corporate network?
by modifying the registry for DNS lookups
by using Active Directory group policies to enforce Cisco Umbrella DNS servers
by using the Cisco Umbrella roaming client
by forcing DNS queries to the corporate name servers
Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other interoperable security platforms?
IEEE
IETF
NIST
ANSI
Question