ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 51

Question list
Search
Search

What are two benefits of using an MDM solution? (Choose two.)

A.

grants administrators a way to remotely wipe a lost or stolen device

A.

grants administrators a way to remotely wipe a lost or stolen device

Answers
B.

provides simple and streamlined login experience for multiple applications and users

B.

provides simple and streamlined login experience for multiple applications and users

Answers
C.

native integration that helps secure applications across multiple cloud platforms or on-premises environments

C.

native integration that helps secure applications across multiple cloud platforms or on-premises environments

Answers
D.

encrypts data that is stored on endpoints

D.

encrypts data that is stored on endpoints

Answers
E.

allows for centralized management of endpoint device applications and configurations

E.

allows for centralized management of endpoint device applications and configurations

Answers
Suggested answer: A, E

A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)

A.

Segment different departments to different IP blocks and enable Dynamic ARp inspection on all VLANs

A.

Segment different departments to different IP blocks and enable Dynamic ARp inspection on all VLANs

Answers
B.

Ensure that noncompliant endpoints are segmented off to contain any potential damage.

B.

Ensure that noncompliant endpoints are segmented off to contain any potential damage.

Answers
C.

Ensure that a user cannot enter the network of another department.

C.

Ensure that a user cannot enter the network of another department.

Answers
D.

Perform a posture check to allow only network access to (hose Windows devices that are already patched.

D.

Perform a posture check to allow only network access to (hose Windows devices that are already patched.

Answers
E.

Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW. ni

E.

Put all company users in the trusted segment of NGFW and put all servers to the DMZ segment of the Cisco NGFW. ni

Answers
Suggested answer: B, D

What provides total management for mobile and PC including managing inventory and device tracking, remote view, and live troubleshooting using the included native remote desktop support?

A.

mobile device management

A.

mobile device management

Answers
B.

mobile content management

B.

mobile content management

Answers
C.

mobile application management

C.

mobile application management

Answers
D.

mobile access management

D.

mobile access management

Answers
Suggested answer: A


What is the process In DevSecOps where all changes In the central code repository are merged and synchronized?

A.

CD

A.

CD

Answers
B.

EP

B.

EP

Answers
C.

CI

C.

CI

Answers
D.

QA

D.

QA

Answers
Suggested answer: C

Based on the NIST 800-145 guide, which cloud architecture may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises?

A.

hybrid cloud

A.

hybrid cloud

Answers
B.

private cloud

B.

private cloud

Answers
C.

public cloud

C.

public cloud

Answers
D.

community cloud

D.

community cloud

Answers
Suggested answer: D

Which type of data does the Cisco Stealthwatch system collect and analyze from routers, switches, and firewalls?

A.

NTP

A.

NTP

Answers
B.

syslog

B.

syslog

Answers
C.

SNMP

C.

SNMP

Answers
D.

NetFlow

D.

NetFlow

Answers
Suggested answer: D

What is the most common type of data exfiltration that organizations currently experience?

A.

HTTPS file upload site

A.

HTTPS file upload site

Answers
B.

Microsoft Windows network shares

B.

Microsoft Windows network shares

Answers
C.

SQL database injections

C.

SQL database injections

Answers
D.

encrypted SMTP

D.

encrypted SMTP

Answers
Suggested answer: B

Which security solution is used for posture assessment of the endpoints in a BYOD solution?

A.

Cisco FTD

A.

Cisco FTD

Answers
B.

Cisco ASA

B.

Cisco ASA

Answers
C.

Cisco Umbrella

C.

Cisco Umbrella

Answers
D.

Cisco ISE

D.

Cisco ISE

Answers
Suggested answer: D

An engineer is configuring Dropbox integration with Cisco Cloudlock. Which action must be taken before granting API access in the Dropbox admin console?

A.

Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal.

A.

Authorize Dropbox within the Platform settings in the Cisco Cloudlock portal.

Answers
B.

Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal.

B.

Add Dropbox to the Cisco Cloudlock Authentication and API section in the Cisco Cloudlock portal.

Answers
C.

Send an API request to Cisco Cloudlock from Dropbox admin portal.

C.

Send an API request to Cisco Cloudlock from Dropbox admin portal.

Answers
D.

Add Cisco Cloudlock to the Dropbox admin portal.

D.

Add Cisco Cloudlock to the Dropbox admin portal.

Answers
Suggested answer: A

How does Cisco AMP for Endpoints provide next-generation protection?

A.

It encrypts data on user endpoints to protect against ransomware.

A.

It encrypts data on user endpoints to protect against ransomware.

Answers
B.

It leverages an endpoint protection platform and endpoint detection and response.

B.

It leverages an endpoint protection platform and endpoint detection and response.

Answers
C.

It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers.

C.

It utilizes Cisco pxGrid, which allows Cisco AMP to pull threat feeds from threat intelligence centers.

Answers
D.

It integrates with Cisco FTD devices.

D.

It integrates with Cisco FTD devices.

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64