Cisco 350-701 Practice Test - Questions Answers, Page 60
List of questions
Related questions
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
Configure an advanced custom detection list.
Configure an IP Block & Allow custom detection list
Configure an application custom detection list
Configure a simple custom detection list
What is the target in a phishing attack?
perimeter firewall
IPS
web server
endpoint
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
TACACS+
CHAP
NTLMSSP
RADIUS
Kerberos
What is the purpose of the Cisco Endpoint IoC feature?
It is an incident response tool.
It provides stealth threat prevention.
It is a signature-based engine.
It provides precompromise detection.
An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?
Use DNSSEC between the endpoints and Cisco Umbrella DNS servers.
Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones.
Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional.
Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers.
Which Cisco security solution provides patch management in the cloud?
Cisco Umbrella
Cisco ISE
Cisco CloudLock
Cisco Tetration
Refer to the exhibit,
which command results in these messages when attempting to troubleshoot an iPsec VPN connection?
debug crypto isakmp
debug crypto ipsec endpoint
debug crypto Ipsec
debug crypto isakmp connection
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
SIG Advantage
DNS Security Essentials
SIG Essentials
DNS Security Advantage
A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?
The changes are applied immediately it the destination list is part or a policy.
The destination list must be removed from the policy before changes are made to It.
The changes are applied only after the configuration is saved in Cisco Umbrella.
The user role of Block Page Bypass or higher is needed to perform these changes.
Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?
single-sign on
RADIUS/LDAP authentication
Kerberos security solution
multifactor authentication
Question