ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 8

List of questions

Question 71

Report Export Collapse

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)

DDoS

DDoS

antispam

antispam

antivirus

antivirus

encryption

encryption

DLP

DLP

Suggested answer: D, E
Explanation:

Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based email security deployment (on premises) to provide maximum choice and control for your organization. The cloud-based infrastructure is typically used for inbound email cleansing, while the onpremises appliances provide granular control – protecting sensitive information with data loss prevention (DLP) and encryption technologies.

Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf

asked 10/10/2024
AHOPkos Varga
30 questions

Question 72

Report Export Collapse

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

IP Blacklist Center

IP Blacklist Center

File Reputation Center

File Reputation Center

AMP Reputation Center

AMP Reputation Center

IP and Domain Reputation Center

IP and Domain Reputation Center

Suggested answer: D
asked 10/10/2024
Samuel rodriguez
33 questions

Question 73

Report Export Collapse

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

transparent

transparent

redirection

redirection

forward

forward

proxy gateway

proxy gateway

Suggested answer: A
Explanation:

There are two possible methods to accomplish the redirection of traffic to Cisco WSA: transparent proxy mode and explicit proxy mode.

In a transparent proxy deployment, a WCCP v2-capable network device redirects all TCP traffic with a destination of port 80 or 443 to Cisco WSA, without any configuration on the client. The transparent proxy deployment is used in this design, and the Cisco ASA firewall is used to redirect traffic to the appliance because all of the outbound web traffic passes through the device and is generally managed by the same operations staff who manage Cisco WSA.

Reference:

https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

asked 10/10/2024
Mark Singer
47 questions

Question 74

Report Export Collapse

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.

Which task can you perform to determine where each message was lost?

Configure the trackingconfig command to enable message tracking.

Configure the trackingconfig command to enable message tracking.

Generate a system report.

Generate a system report.

Review the log files.

Review the log files.

Perform a trace.

Perform a trace.

Suggested answer: A
Explanation:

Message tracking helps resolve help desk calls by giving a detailed view of message flow. For example, if a message was not delivered as expected, you can determine if it was found to contain a virus or placed in a spam quarantine

β€” or if it is located somewhere else in the mail stream.

Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011110.html

asked 10/10/2024
DAVIDE MCGARR
43 questions

Question 75

Report Export Collapse


What is the primary benefit of deploying an ESA in hybrid mode?

You can fine-tune its settings to provide the optimum balance between security and performance for your environment

You can fine-tune its settings to provide the optimum balance between security and performance for your environment

It provides the lowest total cost of ownership by reducing the need for physical appliances

It provides the lowest total cost of ownership by reducing the need for physical appliances

It provides maximum protection and control of outbound messages

It provides maximum protection and control of outbound messages

It provides email security while supporting the transition to the cloud

It provides email security while supporting the transition to the cloud

Suggested answer: D
Explanation:

Cisco Hybrid Email Security is a unique service offering that facilitates the deployment of your email security infrastructure both on premises and in the cloud. You can change the number of on-premises versus cloud users at any time throughout the term of your contract, assuming the total number of users does not change.

This allows for deployment flexibility as your organization's needs change.

asked 10/10/2024
Mario Jose Oliveros Recinos
49 questions

Question 76

Report Export Collapse

What is the primary role of the Cisco Email Security Appliance?

Mail Submission Agent

Mail Submission Agent

Mail Transfer Agent

Mail Transfer Agent

Mail Delivery Agent

Mail Delivery Agent

Mail User Agent

Mail User Agent

Suggested answer: B
Explanation:

Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay.

Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/February2013/Cisco_SBA_BN_EmailSecurityUsingCiscoESADeploymentGuide-Feb2013.pdf

asked 10/10/2024
Justin Bake
49 questions

Question 77

Report Export Collapse

Which technology is used to improve web traffic performance by proxy caching?

WSA

WSA

Firepower

Firepower

FireSIGHT

FireSIGHT

ASA

ASA

Suggested answer: A
asked 10/10/2024
metodija durtanoski
45 questions

Question 78

Report Export Collapse

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

(Choose two)

configure Active Directory Group Policies to push proxy settings

configure Active Directory Group Policies to push proxy settings

configure policy-based routing on the network infrastructure

configure policy-based routing on the network infrastructure

reference a Proxy Auto Config file

reference a Proxy Auto Config file

configure the proxy IP address in the web-browser settings

configure the proxy IP address in the web-browser settings

use Web Cache Communication Protocol

use Web Cache Communication Protocol

Suggested answer: B, E
asked 10/10/2024
Claudious Utete
45 questions

Question 79

Report Export Collapse

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Cisco SDA

Cisco SDA

Cisco Firepower

Cisco Firepower

Cisco HyperFlex

Cisco HyperFlex

Cisco Cloudlock

Cisco Cloudlock

Suggested answer: D
asked 10/10/2024
Lizbeth Perea Joseph
41 questions

Question 80

Report Export Collapse

Which deployment model is the most secure when considering risks to cloud adoption?

Public Cloud

Public Cloud

Hybrid Cloud

Hybrid Cloud

Community Cloud

Community Cloud

Private Cloud

Private Cloud

Suggested answer: D
asked 10/10/2024
Gishi Anurag
32 questions
Total 631 questions
Go to page: of 64

Related questions