Cisco 350-701 Practice Test - Questions Answers, Page 55
List of questions
Related questions
What is the difference between EPP and EDR?
EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.
Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.
EDR focuses solely on prevention at the perimeter.
Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)
Use intrusion prevention system.
Block all TXT DNS records.
Enforce security over port 53.
Use next generation firewalls.
Use Cisco Umbrella.
Which two capabilities does an MDM provide? (Choose two.)
delivery of network malware reports to an inbox in a schedule
unified management of mobile devices, Macs, and PCs from a centralized dashboard
enforcement of device security policies from a centralized dashboard
manual identification and classification of client devices
unified management of Android and Apple devices from a centralized dashboard
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?
VMware APIC
VMwarevRealize
VMware fusion
VMware horizons
An organization is implementing AAA for their users. They need to ensure that authorization is verified for every command that is being entered by the network administrator. Which protocol must be configured in order to provide this capability?
EAPOL
SSH
RADIUS
TACACS+
Which capability is provided by application visibility and control?
reputation filtering
data obfuscation
data encryption
deep packet inspection
When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?
CDP
NTP
syslog
DNS
In which two ways does the Cisco Advanced Phishing Protection solution protect users? (Choose two.)
It prevents use of compromised accounts and social engineering.
It prevents all zero-day attacks coming from the Internet.
It automatically removes malicious emails from users' inbox.
It prevents trojan horse malware using sensors.
It secures all passwords that are shared in video conferences.
An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380.
There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source.
What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?
ntp server 192.168.1.110 primary key 1
ntp peer 192.168.1.110 prefer key 1
ntp server 192.168.1.110 key 1 prefer
ntp peer 192.168.1.110 key 1 primary
Question