ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 8

Question list
Search
Search

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)

A.

DDoS

A.

DDoS

Answers
B.

antispam

B.

antispam

Answers
C.

antivirus

C.

antivirus

Answers
D.

encryption

D.

encryption

Answers
E.

DLP

E.

DLP

Answers
Suggested answer: D, E

Explanation:

Cisco Hybrid Email Security is a unique service offering that combines a cloud-based email security deployment with an appliance-based email security deployment (on premises) to provide maximum choice and control for your organization. The cloud-based infrastructure is typically used for inbound email cleansing, while the onpremises appliances provide granular control – protecting sensitive information with data loss prevention (DLP) and encryption technologies.

Reference: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

A.

IP Blacklist Center

A.

IP Blacklist Center

Answers
B.

File Reputation Center

B.

File Reputation Center

Answers
C.

AMP Reputation Center

C.

AMP Reputation Center

Answers
D.

IP and Domain Reputation Center

D.

IP and Domain Reputation Center

Answers
Suggested answer: D

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

A.

transparent

A.

transparent

Answers
B.

redirection

B.

redirection

Answers
C.

forward

C.

forward

Answers
D.

proxy gateway

D.

proxy gateway

Answers
Suggested answer: A

Explanation:

There are two possible methods to accomplish the redirection of traffic to Cisco WSA: transparent proxy mode and explicit proxy mode.

In a transparent proxy deployment, a WCCP v2-capable network device redirects all TCP traffic with a destination of port 80 or 443 to Cisco WSA, without any configuration on the client. The transparent proxy deployment is used in this design, and the Cisco ASA firewall is used to redirect traffic to the appliance because all of the outbound web traffic passes through the device and is generally managed by the same operations staff who manage Cisco WSA.

Reference:

https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesignGuide-AUG13.pdf

After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.

Which task can you perform to determine where each message was lost?

A.

Configure the trackingconfig command to enable message tracking.

A.

Configure the trackingconfig command to enable message tracking.

Answers
B.

Generate a system report.

B.

Generate a system report.

Answers
C.

Review the log files.

C.

Review the log files.

Answers
D.

Perform a trace.

D.

Perform a trace.

Answers
Suggested answer: A

Explanation:

Message tracking helps resolve help desk calls by giving a detailed view of message flow. For example, if a message was not delivered as expected, you can determine if it was found to contain a virus or placed in a spam quarantine

— or if it is located somewhere else in the mail stream.

Reference: https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_12_0_chapter_011110.html


What is the primary benefit of deploying an ESA in hybrid mode?

A.

You can fine-tune its settings to provide the optimum balance between security and performance for your environment

A.

You can fine-tune its settings to provide the optimum balance between security and performance for your environment

Answers
B.

It provides the lowest total cost of ownership by reducing the need for physical appliances

B.

It provides the lowest total cost of ownership by reducing the need for physical appliances

Answers
C.

It provides maximum protection and control of outbound messages

C.

It provides maximum protection and control of outbound messages

Answers
D.

It provides email security while supporting the transition to the cloud

D.

It provides email security while supporting the transition to the cloud

Answers
Suggested answer: D

Explanation:

Cisco Hybrid Email Security is a unique service offering that facilitates the deployment of your email security infrastructure both on premises and in the cloud. You can change the number of on-premises versus cloud users at any time throughout the term of your contract, assuming the total number of users does not change.

This allows for deployment flexibility as your organization's needs change.

What is the primary role of the Cisco Email Security Appliance?

A.

Mail Submission Agent

A.

Mail Submission Agent

Answers
B.

Mail Transfer Agent

B.

Mail Transfer Agent

Answers
C.

Mail Delivery Agent

C.

Mail Delivery Agent

Answers
D.

Mail User Agent

D.

Mail User Agent

Answers
Suggested answer: B

Explanation:

Cisco Email Security Appliance (ESA) protects the email infrastructure and employees who use email at work by filtering unsolicited and malicious email before it reaches the user. Cisco ESA easily integrates into existing email infrastructures with a high degree of flexibility. It does this by acting as a Mail Transfer Agent (MTA) within the email-delivery chain. Another name for an MTA is a mail relay.

Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/SBA/February2013/Cisco_SBA_BN_EmailSecurityUsingCiscoESADeploymentGuide-Feb2013.pdf

Which technology is used to improve web traffic performance by proxy caching?

A.

WSA

A.

WSA

Answers
B.

Firepower

B.

Firepower

Answers
C.

FireSIGHT

C.

FireSIGHT

Answers
D.

ASA

D.

ASA

Answers
Suggested answer: A

In which two ways does a system administrator send web traffic transparently to the Web Security Appliance?

(Choose two)

A.

configure Active Directory Group Policies to push proxy settings

A.

configure Active Directory Group Policies to push proxy settings

Answers
B.

configure policy-based routing on the network infrastructure

B.

configure policy-based routing on the network infrastructure

Answers
C.

reference a Proxy Auto Config file

C.

reference a Proxy Auto Config file

Answers
D.

configure the proxy IP address in the web-browser settings

D.

configure the proxy IP address in the web-browser settings

Answers
E.

use Web Cache Communication Protocol

E.

use Web Cache Communication Protocol

Answers
Suggested answer: B, E

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

A.

Cisco SDA

A.

Cisco SDA

Answers
B.

Cisco Firepower

B.

Cisco Firepower

Answers
C.

Cisco HyperFlex

C.

Cisco HyperFlex

Answers
D.

Cisco Cloudlock

D.

Cisco Cloudlock

Answers
Suggested answer: D

Which deployment model is the most secure when considering risks to cloud adoption?

A.

Public Cloud

A.

Public Cloud

Answers
B.

Hybrid Cloud

B.

Hybrid Cloud

Answers
C.

Community Cloud

C.

Community Cloud

Answers
D.

Private Cloud

D.

Private Cloud

Answers
Suggested answer: D
Total 631 questions
Go to page: of 64