ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 62

Question list
Search
Search

List of questions

Search

DRAG DROP

Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.



Question 611
Correct answer: Question 611

What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?

A.

Secure Endpoint authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.

A.

Secure Endpoint authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.

Answers
B.

Secure Endpoint stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.

B.

Secure Endpoint stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.

Answers
C.

The Umbrella Roaming Client authenticates users and provides segmentation, and Secure Endpoint allows only for VPN connectivity.

C.

The Umbrella Roaming Client authenticates users and provides segmentation, and Secure Endpoint allows only for VPN connectivity.

Answers
D.

The Umbrella Roaming client stops and tracks malicious activity on hosts, and Secure Endpoint tracks only URL-based threats.

D.

The Umbrella Roaming client stops and tracks malicious activity on hosts, and Secure Endpoint tracks only URL-based threats.

Answers
Suggested answer: B

Explanation:

The functional difference between Cisco Secure Endpoint (formerly known as AMP for Endpoints) and Cisco Umbrella Roaming Client lies in their approach to security. Cisco Secure Endpoint is designed to prevent, detect, and respond to threats on the endpoint devices. It provides comprehensive protection by stopping and tracking malicious files and activities on hosts, utilizing continuous analysis and retrospective security to address threats at various stages of the attack continuum. On the other hand, Cisco Umbrella Roaming Client is focused on DNS and IP layer enforcement to prevent internet-based threats before a connection is established. It primarily tracks and blocks URL-based threats by enforcing security at the DNS layer, thus preventing access to malicious domains. Therefore, while Secure Endpoint provides broad endpoint protection against a variety of threats, the Umbrella Roaming Client specifically targets URL-based threats.

A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?

A.

dynamic split tunneling

A.

dynamic split tunneling

Answers
B.

local LAN access

B.

local LAN access

Answers
C.

dynamic access policies

C.

dynamic access policies

Answers
D.

reverse route injection

D.

reverse route injection

Answers
Suggested answer: A

Explanation:

In a remote access VPN configuration, dynamic split tunneling allows traffic to certain trusted domains to bypass the VPN tunnel and exit through the client's local internet gateway. This feature selectively directs only the necessary traffic over the VPN, while allowing direct internet access for specific domains or traffic deemed safe or trusted, optimizing bandwidth and performance for remote users.

What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?

A.

simplifies the distribution of software updates

A.

simplifies the distribution of software updates

Answers
B.

provides faster performance

B.

provides faster performance

Answers
C.

provides an automated setup process

C.

provides an automated setup process

Answers
D.

enables the allocation of additional resources

D.

enables the allocation of additional resources

Answers
Suggested answer: D

Explanation:

One of the benefits of a Cisco Secure Email Gateway Virtual appliance compared to a physical one is the ability to allocate additional resources as needed. Virtual appliances can be easily scaled up by allocating more CPU, memory, or storage resources, providing flexibility and scalability in response to changing demands or growth.

Which method must be used to connect Cisco Secure Workload to external orchestrators at a client site when the client does not allow incoming connections?

A.

source NAT

A.

source NAT

Answers
B.

reverse tunnel

B.

reverse tunnel

Answers
C.

GRE tunnel

C.

GRE tunnel

Answers
D.

destination NAT

D.

destination NAT

Answers
Suggested answer: B

Explanation:

To connect Cisco Secure Workload to external orchestrators at a client site where incoming connections are not allowed, a reverse tunnel must be used. A reverse tunnel initiates the connection from the inside of the client's network out to the external orchestrator, thereby bypassing restrictions on incoming connections and enabling secure communication.

What is a difference between GRE over IPsec and IPsec with crypto map?

A.

Multicast traffic is supported by IPsec with crypto map.

A.

Multicast traffic is supported by IPsec with crypto map.

Answers
B.

GRE over IPsec supports non-IP protocols.

B.

GRE over IPsec supports non-IP protocols.

Answers
C.

GRE provides its own encryption mechanism.

C.

GRE provides its own encryption mechanism.

Answers
D.

IPsec with crypto map oilers better scalability.

D.

IPsec with crypto map oilers better scalability.

Answers
Suggested answer: B

Explanation:

The difference between GRE over IPsec and IPsec with crypto map is that GRE (Generic Routing Encapsulation) over IPsec can encapsulate and transport non-IP protocols across an IP network, whereas IPsec with crypto map is typically used for IP traffic. GRE tunnels wrapped in IPsec provide a way to transport multicast traffic and other protocol types across an IPsec VPN, offering greater flexibility in the types of traffic that can be secured.

A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?

A.

Implement synchronized system clock on TACACS server that matches the network device.

A.

Implement synchronized system clock on TACACS server that matches the network device.

Answers
B.

Install a compatible operating system version on the TACACS server.

B.

Install a compatible operating system version on the TACACS server.

Answers
C.

Configure the TACACS key on the server to match with the network device.

C.

Configure the TACACS key on the server to match with the network device.

Answers
D.

Apply an access control list on TACACS server to allow communication with the network device.

D.

Apply an access control list on TACACS server to allow communication with the network device.

Answers
Suggested answer: C

Explanation:

For TACACS authentication to work, the key configured on the network device must match the key configured on the TACACS server. If users are unable to authenticate despite the TACACS server being reachable, it is likely due to a mismatch in the keys. Ensuring that both the network device and the TACACS server have the same key configured is crucial for successful authentication.

What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?

A.

Use the simple custom detection feature and add each detection to the list.

A.

Use the simple custom detection feature and add each detection to the list.

Answers
B.

Add a network IP block allowed list to the configuration and add the blocked files.

B.

Add a network IP block allowed list to the configuration and add the blocked files.

Answers
C.

Create an advanced custom detection and upload the hash of each file

C.

Create an advanced custom detection and upload the hash of each file

Answers
D.

Configure an application control allowed applications list to block the files

D.

Configure an application control allowed applications list to block the files

Answers
Suggested answer: C

Explanation:

In Cisco Secure Endpoint, to create a custom detection file list for detecting and quarantining future files, an advanced custom detection should be created, and the hash of each file to be detected and quarantined should be uploaded. This allows the system to uniquely identify and take action on files based on their hash values, providing a precise method for targeting specific malicious or unwanted files.

What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?

A.

reset

A.

reset

Answers
B.

buffer

B.

buffer

Answers
C.

pass

C.

pass

Answers
D.

drop

D.

drop

Answers
Suggested answer: C

Explanation:

Before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software, the default action is to 'pass.' This means that the traffic is allowed through without inspection until the URL can be identified, at which point appropriate security policies can be applied based on the URL categorization and reputation.

Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?

A.

analysis

A.

analysis

Answers
B.

sharing

B.

sharing

Answers
C.

authoring

C.

authoring

Answers
D.

consumption

D.

consumption

Answers
Suggested answer: D

Explanation:

When the Cisco Secure Firewall downloads threat intelligence updates from Cisco Talos, it is engaged in 'consumption.' This term refers to the process of receiving and utilizing threat intelligence data to enhance security measures. Cisco Talos provides comprehensive threat intelligence that Cisco Secure Firewall consumes to update its threat detection and prevention capabilities.



Total 631 questions
Go to page: of 64