Cisco 350-701 Practice Test - Questions Answers, Page 55
List of questions
Question 541
What is the difference between EPP and EDR?
Question 542
Which algorithm is an NGE hash function?
Question 543
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Question 544
Which two capabilities does an MDM provide? (Choose two.)
Question 545
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
Question 546
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
Question 547
Which capability is provided by application visibility and control?
Question 548
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
Question 549
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
Question 550
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380.
There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source.
What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
Question