ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 55

Question list
Search
Search

What is the difference between EPP and EDR?

A.

EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.

A.

EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.

Answers
B.

Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.

B.

Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.

Answers
C.

EDR focuses solely on prevention at the perimeter.

C.

EDR focuses solely on prevention at the perimeter.

Answers
D.

Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.

D.

Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.

Answers
Suggested answer: B

Which algorithm is an NGE hash function?

A.

HMAC

A.

HMAC

Answers
B.

SHA-1

B.

SHA-1

Answers
C.

MD5

C.

MD5

Answers
D.

SHA-2

D.

SHA-2

Answers
Suggested answer: D

What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)

A.

Use intrusion prevention system.

A.

Use intrusion prevention system.

Answers
B.

Block all TXT DNS records.

B.

Block all TXT DNS records.

Answers
C.

Enforce security over port 53.

C.

Enforce security over port 53.

Answers
D.

Use next generation firewalls.

D.

Use next generation firewalls.

Answers
E.

Use Cisco Umbrella.

E.

Use Cisco Umbrella.

Answers
Suggested answer: C, E

Which two capabilities does an MDM provide? (Choose two.)

A.

delivery of network malware reports to an inbox in a schedule

A.

delivery of network malware reports to an inbox in a schedule

Answers
B.

unified management of mobile devices, Macs, and PCs from a centralized dashboard

B.

unified management of mobile devices, Macs, and PCs from a centralized dashboard

Answers
C.

enforcement of device security policies from a centralized dashboard

C.

enforcement of device security policies from a centralized dashboard

Answers
D.

manual identification and classification of client devices

D.

manual identification and classification of client devices

Answers
E.

unified management of Android and Apple devices from a centralized dashboard

E.

unified management of Android and Apple devices from a centralized dashboard

Answers
Suggested answer: B, C

Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?

A.

VMware APIC

A.

VMware APIC

Answers
B.

VMwarevRealize

B.

VMwarevRealize

Answers
C.

VMware fusion

C.

VMware fusion

Answers
D.

VMware horizons

D.

VMware horizons

Answers
Suggested answer: B

An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?

A.

EAPOL

A.

EAPOL

Answers
B.

SSH

B.

SSH

Answers
C.

RADIUS

C.

RADIUS

Answers
D.

TACACS+

D.

TACACS+

Answers
Suggested answer: D

Which capability is provided by application visibility and control?

A.

reputation filtering

A.

reputation filtering

Answers
B.

data obfuscation

B.

data obfuscation

Answers
C.

data encryption

C.

data encryption

Answers
D.

deep packet inspection

D.

deep packet inspection

Answers
Suggested answer: D

When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?

A.

CDP

A.

CDP

Answers
B.

NTP

B.

NTP

Answers
C.

syslog

C.

syslog

Answers
D.

DNS

D.

DNS

Answers
Suggested answer: B

In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)

A.

It prevents use of compromised accounts and social engineering.

A.

It prevents use of compromised accounts and social engineering.

Answers
B.

It prevents all zero-day attacks coming from the Internet.

B.

It prevents all zero-day attacks coming from the Internet.

Answers
C.

It automatically removes malicious emails from users' inbox.

C.

It automatically removes malicious emails from users' inbox.

Answers
D.

It prevents trojan horse malware using sensors.

D.

It prevents trojan horse malware using sensors.

Answers
E.

It secures all passwords that are shared in video conferences.

E.

It secures all passwords that are shared in video conferences.

Answers
Suggested answer: B, C

An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380.

There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source.

What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?

A.

ntp server 192.168.1.110 primary key 1

A.

ntp server 192.168.1.110 primary key 1

Answers
B.

ntp peer 192.168.1.110 prefer key 1

B.

ntp peer 192.168.1.110 prefer key 1

Answers
C.

ntp server 192.168.1.110 key 1 prefer

C.

ntp server 192.168.1.110 key 1 prefer

Answers
D.

ntp peer 192.168.1.110 key 1 primary

D.

ntp peer 192.168.1.110 key 1 primary

Answers
Suggested answer: A
Total 631 questions
Go to page: of 64