Cisco 350-701 Practice Test - Questions Answers, Page 55

List of questions
Question 541

What is the difference between EPP and EDR?
Question 542

Which algorithm is an NGE hash function?
Question 543

What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Question 544

Which two capabilities does an MDM provide? (Choose two.)
Question 545

Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
Question 546

An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
Question 547

Which capability is provided by application visibility and control?
Question 548

When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
Question 549

In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
Question 550

An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380.
There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source.
What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
Question