ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 48

Question list
Search
Search

What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)

A.

It is defined as a Transparent proxy deployment.

A.

It is defined as a Transparent proxy deployment.

Answers
B.

In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.

B.

In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.

Answers
C.

The PAC file, which references the proxy, is deployed to the client web browser.

C.

The PAC file, which references the proxy, is deployed to the client web browser.

Answers
D.

It is defined as an Explicit proxy deployment.

D.

It is defined as an Explicit proxy deployment.

Answers
E.

It is defined as a Bridge proxy deployment.

E.

It is defined as a Bridge proxy deployment.

Answers
Suggested answer: C, D

Which solution should be leveraged for secure access of a CI/CD pipeline?

A.

Duo Network Gateway

A.

Duo Network Gateway

Answers
B.

remote access client

B.

remote access client

Answers
C.

SSL WebVPN

C.

SSL WebVPN

Answers
D.

Cisco FTD network gateway

D.

Cisco FTD network gateway

Answers
Suggested answer: A

Which function is included when Cisco AMP is added to web security?

A.

multifactor, authentication-based user identity

A.

multifactor, authentication-based user identity

Answers
B.

detailed analytics of the unknown file's behavior

B.

detailed analytics of the unknown file's behavior

Answers
C.

phishing detection on emails

C.

phishing detection on emails

Answers
D.

threat prevention on an infected endpoint

D.

threat prevention on an infected endpoint

Answers
Suggested answer: B

A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the network?

A.

Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.

A.

Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.

Answers
B.

Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,

B.

Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,

Answers
C.

Configure VPN load balancing to send non-corporate traffic straight to the internet.

C.

Configure VPN load balancing to send non-corporate traffic straight to the internet.

Answers
D.

Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.

D.

Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.

Answers
Suggested answer: A

Which solution detects threats across a private network, public clouds, and encrypted traffic?

A.

Cisco Stealthwatch

A.

Cisco Stealthwatch

Answers
B.

Cisco CTA

B.

Cisco CTA

Answers
C.

Cisco Encrypted Traffic Analytics

C.

Cisco Encrypted Traffic Analytics

Answers
D.

Cisco Umbrella

D.

Cisco Umbrella

Answers
Suggested answer: A

Which Cisco security solution integrates with cloud applications like Dropbox and Office 365 while protecting data from being exfiltrated?

A.

Cisco Tajos

A.

Cisco Tajos

Answers
B.

Cisco Steaithwatch Cloud

B.

Cisco Steaithwatch Cloud

Answers
C.

Cisco Cloudlock

C.

Cisco Cloudlock

Answers
D.

Cisco Umbrella Investigate

D.

Cisco Umbrella Investigate

Answers
Suggested answer: C

Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security?(Choose two.)

A.

The latest antivirus updates are applied before access is allowed.

A.

The latest antivirus updates are applied before access is allowed.

Answers
B.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

B.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

Answers
C.

Patch management remediation is performed.

C.

Patch management remediation is performed.

Answers
D.

A centralized management solution is deployed.

D.

A centralized management solution is deployed.

Answers
E.

Endpoint supplicant configuration is deployed.

E.

Endpoint supplicant configuration is deployed.

Answers
Suggested answer: A, D

Which two authentication protocols are supported by the Cisco WSA? (Choose two.)

A.

WCCP

A.

WCCP

Answers
B.

NTLM

B.

NTLM

Answers
C.

TLS

C.

TLS

Answers
D.

SSL

D.

SSL

Answers
E.

LDAP

E.

LDAP

Answers
Suggested answer: B, E

When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?

A.

It blocks the request.

A.

It blocks the request.

Answers
B.

It applies the global policy.

B.

It applies the global policy.

Answers
C.

It applies the next identification profile policy.

C.

It applies the next identification profile policy.

Answers
D.

It applies the advanced policy.

D.

It applies the advanced policy.

Answers
Suggested answer: B

Which Cisco solution extends network visibility, threat detection, and analytics to public cloud environments?

A.

Cisco Umbrella

A.

Cisco Umbrella

Answers
B.

Cisco Stealthwatch Cloud

B.

Cisco Stealthwatch Cloud

Answers
C.

Cisco Appdynamics

C.

Cisco Appdynamics

Answers
D.

Cisco CloudLock

D.

Cisco CloudLock

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64