ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 47

Question list
Search
Search

Which technology provides a combination of endpoint protection endpoint detection, and response?

A.

Cisco AMP

A.

Cisco AMP

Answers
B.

Cisco Talos

B.

Cisco Talos

Answers
C.

Cisco Threat Grid

C.

Cisco Threat Grid

Answers
D.

Cisco Umbrella

D.

Cisco Umbrella

Answers
Suggested answer: A

What is a feature of container orchestration?

A.

ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane

A.

ability to deploy Amazon ECS clusters by using the Cisco Container Platform data plane

Answers
B.

ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane

B.

ability to deploy Amazon EKS clusters by using the Cisco Container Platform data plane

Answers
C.

ability to deploy Kubernetes clusters in air-gapped sites

C.

ability to deploy Kubernetes clusters in air-gapped sites

Answers
D.

automated daily updates

D.

automated daily updates

Answers
Suggested answer: C

What are two security benefits of an MDM deployment? (Choose two.)

A.

robust security policy enforcement

A.

robust security policy enforcement

Answers
B.

privacy control checks

B.

privacy control checks

Answers
C.

on-device content management

C.

on-device content management

Answers
D.

distributed software upgrade

D.

distributed software upgrade

Answers
E.

distributed dashboard

E.

distributed dashboard

Answers
Suggested answer: A, C

Refer to the exhibit.

Consider that any feature of DNS requests, such as the length off the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?

A.

Spectre Worm

A.

Spectre Worm

Answers
B.

Eternal Blue Windows

B.

Eternal Blue Windows

Answers
C.

Heartbleed SSL Bug

C.

Heartbleed SSL Bug

Answers
D.

W32/AutoRun worm

D.

W32/AutoRun worm

Answers
Suggested answer: D

What is the recommendation in a zero-trust model before granting access to corporate applications and resources?

A.

to use multifactor authentication

A.

to use multifactor authentication

Answers
B.

to use strong passwords

B.

to use strong passwords

Answers
C.

to use a wired network, not wireless

C.

to use a wired network, not wireless

Answers
D.

to disconnect from the network when inactive

D.

to disconnect from the network when inactive

Answers
Suggested answer: A

Which Cisco AMP feature allows an engineer to look back to trace past activities, such as file and process activity on an endpoint?

A.

endpoint isolation

A.

endpoint isolation

Answers
B.

advanced search

B.

advanced search

Answers
C.

advanced investigation

C.

advanced investigation

Answers
D.

retrospective security

D.

retrospective security

Answers
Suggested answer: D

Which solution stops unauthorized access to the system if a user's password is compromised?

A.

VPN

A.

VPN

Answers
B.

MFA

B.

MFA

Answers
C.

AMP

C.

AMP

Answers
D.

SSL

D.

SSL

Answers
Suggested answer: B

What is a benefit of using Cisco Tetration?

A.

It collects telemetry data from servers and then uses software sensors to analyze flow information.

A.

It collects telemetry data from servers and then uses software sensors to analyze flow information.

Answers
B.

It collects policy compliance data and process details.

B.

It collects policy compliance data and process details.

Answers
C.

It collects enforcement data from servers and collects interpacket variation.

C.

It collects enforcement data from servers and collects interpacket variation.

Answers
D.

It collects near-real time data from servers and inventories the software packages that exist on servers.

D.

It collects near-real time data from servers and inventories the software packages that exist on servers.

Answers
Suggested answer: C

How does Cisco Umbrella protect clients when they operate outside of the corporate network?

A.

by modifying the registry for DNS lookups

A.

by modifying the registry for DNS lookups

Answers
B.

by using Active Directory group policies to enforce Cisco Umbrella DNS servers

B.

by using Active Directory group policies to enforce Cisco Umbrella DNS servers

Answers
C.

by using the Cisco Umbrella roaming client

C.

by using the Cisco Umbrella roaming client

Answers
D.

by forcing DNS queries to the corporate name servers

D.

by forcing DNS queries to the corporate name servers

Answers
Suggested answer: C

Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other interoperable security platforms?

A.

IEEE

A.

IEEE

Answers
B.

IETF

B.

IETF

Answers
C.

NIST

C.

NIST

Answers
D.

ANSI

D.

ANSI

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64