ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 60

Question list
Search
Search

Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?

A.

Configure an advanced custom detection list.

A.

Configure an advanced custom detection list.

Answers
B.

Configure an IP Block & Allow custom detection list

B.

Configure an IP Block & Allow custom detection list

Answers
C.

Configure an application custom detection list

C.

Configure an application custom detection list

Answers
D.

Configure a simple custom detection list

D.

Configure a simple custom detection list

Answers
Suggested answer: A

What is the target in a phishing attack?

A.

perimeter firewall

A.

perimeter firewall

Answers
B.

IPS

B.

IPS

Answers
C.

web server

C.

web server

Answers
D.

endpoint

D.

endpoint

Answers
Suggested answer: D

Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)

A.

TACACS+

A.

TACACS+

Answers
B.

CHAP

B.

CHAP

Answers
C.

NTLMSSP

C.

NTLMSSP

Answers
D.

RADIUS

D.

RADIUS

Answers
E.

Kerberos

E.

Kerberos

Answers
Suggested answer: C, E

What is the purpose of the Cisco Endpoint IoC feature?

A.

It is an incident response tool.

A.

It is an incident response tool.

Answers
B.

It provides stealth threat prevention.

B.

It provides stealth threat prevention.

Answers
C.

It is a signature-based engine.

C.

It is a signature-based engine.

Answers
D.

It provides precompromise detection.

D.

It provides precompromise detection.

Answers
Suggested answer: A

Explanation:

The Endpoint Indication of Compromise (IOC) feature is a powerful incident response tool for scanning of post-compromise indicators across multiple computers.

An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?

A.

Use DNSSEC between the endpoints and Cisco Umbrella DNS servers.

A.

Use DNSSEC between the endpoints and Cisco Umbrella DNS servers.

Answers
B.

Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones.

B.

Modify the Cisco Umbrella configuration to pass queries only to non-DNSSEC capable zones.

Answers
C.

Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional.

C.

Integrate Cisco Umbrella with Cisco CloudLock to ensure that DNSSEC is functional.

Answers
D.

Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers.

D.

Configure Cisco Umbrella and use DNSSEC for domain authentication to authoritative servers.

Answers
Suggested answer: D

Which Cisco security solution provides patch management in the cloud?

A.

Cisco Umbrella

A.

Cisco Umbrella

Answers
B.

Cisco ISE

B.

Cisco ISE

Answers
C.

Cisco CloudLock

C.

Cisco CloudLock

Answers
D.

Cisco Tetration

D.

Cisco Tetration

Answers
Suggested answer: C

Refer to the exhibit,

which command results in these messages when attempting to troubleshoot an iPsec VPN connection?

A.

debug crypto isakmp

A.

debug crypto isakmp

Answers
B.

debug crypto ipsec endpoint

B.

debug crypto ipsec endpoint

Answers
C.

debug crypto Ipsec

C.

debug crypto Ipsec

Answers
D.

debug crypto isakmp connection

D.

debug crypto isakmp connection

Answers
Suggested answer: A

Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?

A.

SIG Advantage

A.

SIG Advantage

Answers
B.

DNS Security Essentials

B.

DNS Security Essentials

Answers
C.

SIG Essentials

C.

SIG Essentials

Answers
D.

DNS Security Advantage

D.

DNS Security Advantage

Answers
Suggested answer: C

A security engineer must add destinations into a destination list in Cisco Umbrella. What describes the application of these changes?

A.

The changes are applied immediately it the destination list is part or a policy.

A.

The changes are applied immediately it the destination list is part or a policy.

Answers
B.

The destination list must be removed from the policy before changes are made to It.

B.

The destination list must be removed from the policy before changes are made to It.

Answers
C.

The changes are applied only after the configuration is saved in Cisco Umbrella.

C.

The changes are applied only after the configuration is saved in Cisco Umbrella.

Answers
D.

The user role of Block Page Bypass or higher is needed to perform these changes.

D.

The user role of Block Page Bypass or higher is needed to perform these changes.

Answers
Suggested answer: A

Which solution is more secure than the traditional use of a username and password and encompasses at least two of the methods of authentication?

A.

single-sign on

A.

single-sign on

Answers
B.

RADIUS/LDAP authentication

B.

RADIUS/LDAP authentication

Answers
C.

Kerberos security solution

C.

Kerberos security solution

Answers
D.

multifactor authentication

D.

multifactor authentication

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64