Cisco 350-701 Practice Test - Questions Answers, Page 48
List of questions
Related questions
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
It is defined as a Transparent proxy deployment.
In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.
The PAC file, which references the proxy, is deployed to the client web browser.
It is defined as an Explicit proxy deployment.
It is defined as a Bridge proxy deployment.
Which solution should be leveraged for secure access of a CI/CD pipeline?
Duo Network Gateway
remote access client
SSL WebVPN
Cisco FTD network gateway
Which function is included when Cisco AMP is added to web security?
multifactor, authentication-based user identity
detailed analytics of the unknown file's behavior
phishing detection on emails
threat prevention on an infected endpoint
A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the network?
Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.
Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,
Configure VPN load balancing to send non-corporate traffic straight to the internet.
Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.
Which solution detects threats across a private network, public clouds, and encrypted traffic?
Cisco Stealthwatch
Cisco CTA
Cisco Encrypted Traffic Analytics
Cisco Umbrella
Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated?
Cisco Tajos
Cisco Steaithwatch Cloud
Cisco Cloudlock
Cisco Umbrella Investigate
Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security?(Choose two.)
The latest antivirus updates are applied before access is allowed.
Assignments to endpoint groups are made dynamically, based on endpoint attributes.
Patch management remediation is performed.
A centralized management solution is deployed.
Endpoint supplicant configuration is deployed.
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
WCCP
NTLM
TLS
SSL
LDAP
When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?
It blocks the request.
It applies the global policy.
It applies the next identification profile policy.
It applies the advanced policy.
Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments?
Cisco Umbrella
Cisco Stealthwatch Cloud
Cisco Appdynamics
Cisco CloudLock
Question