Cisco 350-701 Practice Test - Questions Answers, Page 62
List of questions
Related questions
DRAG DROP
Drag and drop the security responsibilities from the left onto the corresponding cloud service models on the right.
What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?
Secure Endpoint authenticates users and provides segmentation, and the Umbrella Roaming Client allows only for VPN connectivity.
Secure Endpoint stops and tracks malicious activity on hosts, and the Umbrella Roaming Client tracks only URL-based threats.
The Umbrella Roaming Client authenticates users and provides segmentation, and Secure Endpoint allows only for VPN connectivity.
The Umbrella Roaming client stops and tracks malicious activity on hosts, and Secure Endpoint tracks only URL-based threats.
A network administrator is modifying a remote access VPN on an FTD managed by an FMC. The administrator wants to offload traffic to certain trusted domains. The administrator wants this traffic to go out of the client's local internet and send other internet-bound traffic over the VPN Which feature must the administrator configure?
dynamic split tunneling
local LAN access
dynamic access policies
reverse route injection
What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?
simplifies the distribution of software updates
provides faster performance
provides an automated setup process
enables the allocation of additional resources
Which method must be used to connect Cisco Secure Workload to external orchestrators at a client site when the client does not allow incoming connections?
source NAT
reverse tunnel
GRE tunnel
destination NAT
What is a difference between GRE over IPsec and IPsec with crypto map?
Multicast traffic is supported by IPsec with crypto map.
GRE over IPsec supports non-IP protocols.
GRE provides its own encryption mechanism.
IPsec with crypto map oilers better scalability.
A network administrator has configured TACACS on a network device using the key Cisc0467380030 tor authentication purposes. However, users are unable to authenticate. TACACS server is reachable, but authentication is tailing. Which configuration step must the administrator complete?
Implement synchronized system clock on TACACS server that matches the network device.
Install a compatible operating system version on the TACACS server.
Configure the TACACS key on the server to match with the network device.
Apply an access control list on TACACS server to allow communication with the network device.
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?
Use the simple custom detection feature and add each detection to the list.
Add a network IP block allowed list to the configuration and add the blocked files.
Create an advanced custom detection and upload the hash of each file
Configure an application control allowed applications list to block the files
What is the default action before identifying the URL during HTTPS inspection in Cisco Secure Firewall Threat Defense software?
reset
buffer
pass
drop
Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?
analysis
sharing
authoring
consumption
Question