Cisco 350-701 Practice Test - Questions Answers, Page 57
List of questions
Related questions
Which feature must be configured before implementing NetFlow on a router?
SNMPv3
syslog
VRF
IP routing
What is an advantage of the Cisco Umbrella roaming client?
the ability to see all traffic without requiring TLS decryption
visibility into IP-based threats by tunneling suspicious IP connections
the ability to dynamically categorize traffic to previously uncategorized sites
visibility into traffic that is destined to sites within the office environment
What is a function of Cisco AMP for Endpoints?
It detects DNS attacks
It protects against web-based attacks
It blocks email-based attacks
It automates threat responses of an infected host
An engineer is implementing DHCP security mechanisms and needs the ability to add additional attributes to profiles that are created within Cisco ISE Which action accomplishes this task?
Define MAC-to-lP address mappings in the switch to ensure that rogue devices cannot get an IP address
Use DHCP option 82 to ensure that the request is from a legitimate endpoint and send the information to Cisco ISE
Modify the DHCP relay and point the IP address to Cisco ISE.
Configure DHCP snooping on the switch VLANs and trust the necessary interfaces
Which feature requires that network telemetry be enabled?
per-interface stats
SNMP trap notification
Layer 2 device discovery
central syslog system
Refer to the exhibit
When configuring this access control rule in Cisco FMC, what happens with the traffic destined to the DMZ_inside zone once the configuration is deployed?
All traffic from any zone to the DMZ_inside zone will be permitted with no further inspection
No traffic will be allowed through to the DMZ_inside zone regardless of if it's trusted or not
All traffic from any zone will be allowed to the DMZ_inside zone only after inspection
No traffic will be allowed through to the DMZ_inside zone unless it's already trusted
An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, Cisco Stealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers as well as protection against data exfiltration Which solution best meets these requirements?
Cisco CloudLock
Cisco AppDynamics Cloud Monitoring
Cisco Umbrella
Cisco Stealthwatch
An engineer needs to detect and quarantine a file named abc424400664 zip based on the MD5 signature of the file using the Outbreak Control list feature within Cisco Advanced Malware Protection (AMP) for Endpoints The configured detection method must work on files of unknown disposition Which Outbreak Control list must be configured to provide this?
Blocked Application
Simple Custom Detection
Advanced Custom Detection
Android Custom Detection
With regard to RFC 5176 compliance, how many IETF attributes are supported by the RADIUS CoA feature?
3
5
10
12
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
It is included m the license cost for the multi-org console of Cisco Umbrella
It can grant third-party SIEM integrations write access to the S3 bucket
No other applications except Cisco Umbrella can write to the S3 bucket
Data can be stored offline for 30 days.
Question