Cisco 350-701 Practice Test - Questions Answers, Page 51
List of questions
Related questions
What are two benefits of using an MDM solution? (Choose two.)
grants administrators a way to remotely wipe a lost or stolen device
provides simple and streamlined login experience for multiple applications and users
native integration that helps secure applications across multiple cloud platforms or on-premises environments
encrypts data that is stored on endpoints
allows for centralized management of endpoint device applications and configurations
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
Segment different departments to different IP blocks and enable Dynamic ARp inspection on all VLANs
Ensure that noncompliant endpoints are segmented off to contain any potential damage.
Ensure that a user cannot enter the network of another department.
Perform a posture check to allow only network access to (hose Windows devices that are already patched.
Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW. ni
What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?
mobile device management
mobile content management
mobile application management
mobile access management
What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?
CD
EP
CI
QA
Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?
hybrid cloud
private cloud
public cloud
community cloud
Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?
NTP
syslog
SNMP
NetFlow
What is the most common type of data exfiltration that organizations currently experience?
HTTPS file upload site
Microsoft Windows network shares
SQL database injections
encrypted SMTP
Which security solution is used for posture assessment of the endpoints in a BYOD solution?
Cisco FTD
Cisco ASA
Cisco Umbrella
Cisco ISE
An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?
Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal.
Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal.
Send an API request to Cisco Cloudlock from Dropbox admin portal.
Add Cisco Cloudlock to the Dropbox admin portal.
How does Cisco AMP for Endpoints provide next-generation protection?
It encrypts data on user endpoints to protect against ransomware.
It leverages an endpoint protection platform and endpoint detection and response.
It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers.
It integrates with Cisco FTD devices.
Question