ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 38

List of questions

Question 371

Report
Export
Collapse

Why is it important to have a patching strategy for endpoints?

to take advantage of new features released with patches

to take advantage of new features released with patches

so that functionality is increased on a faster scale when it is used

so that functionality is increased on a faster scale when it is used

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

so that patching strategies can assist with disabling nonsecure protocols in applications

so that patching strategies can assist with disabling nonsecure protocols in applications

Suggested answer: C
asked 10/10/2024
Justin Schowalter
34 questions

Question 372

Report
Export
Collapse

An engineer is configuring Cisco Umbrella and has an identity that references two different policies. Which action ensures that the policy that the identity must use takes precedence over the second one?

Configure the default policy to redirect the requests to the correct policy

Configure the default policy to redirect the requests to the correct policy

Place the policy with the most-specific configuration last in the policy order

Place the policy with the most-specific configuration last in the policy order

Configure only the policy with the most recently changed timestamp

Configure only the policy with the most recently changed timestamp

Make the correct policy first in the policy order

Make the correct policy first in the policy order

Suggested answer: D
asked 10/10/2024
Fronzino Franco
35 questions

Question 373

Report
Export
Collapse

Which security product enables administrators to deploy Kubernetes clusters in air-gapped sites without needing Internet access?

Cisco Content Platform

Cisco Content Platform

Cisco Container Controller

Cisco Container Controller

Cisco Container Platform

Cisco Container Platform

Cisco Cloud Platform

Cisco Cloud Platform

Suggested answer: C
asked 10/10/2024
Henock Asmerom
40 questions

Question 374

Report
Export
Collapse

What is the intent of a basic SYN flood attack?

to solicit DNS responses

to solicit DNS responses

to exceed the threshold limit of the connection queue

to exceed the threshold limit of the connection queue

to flush the register stack to re-initiate the buffers

to flush the register stack to re-initiate the buffers

to cause the buffer to overflow

to cause the buffer to overflow

Suggested answer: B
asked 10/10/2024
Rick James
43 questions

Question 375

Report
Export
Collapse

An engineer configures new features within the Cisco Umbrella dashboard and wants to identify and proxy traffic that is categorized as risky domains and may contain safe and malicious content. Which action accomplishes these objectives?

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

Configure URL filtering within Cisco Umbrella to track the URLs and proxy the requests for those categories and below.

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

Configure intelligent proxy within Cisco Umbrella to intercept and proxy the requests for only those categories.

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

Upload the threat intelligence database to Cisco Umbrella for the most current information on reputations and to have the destination lists block them.

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

Create a new site within Cisco Umbrella to block requests from those categories so they can be sent to the proxy device.

Suggested answer: B
asked 10/10/2024
Massimiliano Parisi
39 questions

Question 376

Report
Export
Collapse

Which endpoint solution protects a user from a phishing attack?

Cisco Identity Services Engine

Cisco Identity Services Engine

Cisco AnyConnect with ISE Posture module

Cisco AnyConnect with ISE Posture module

Cisco AnyConnect with Network Access Manager module

Cisco AnyConnect with Network Access Manager module

Cisco AnyConnect with Umbrella Roaming Security module

Cisco AnyConnect with Umbrella Roaming Security module

Suggested answer: D
asked 10/10/2024
Arkadius Thoma
46 questions

Question 377

Report
Export
Collapse

Using Cisco Cognitive Threat Analytics, which platform automatically blocks risky sites, and test unknown sites for hidden advanced threats before allowing users to click them?

Cisco Identity Services Engine

Cisco Identity Services Engine

Cisco Enterprise Security Appliance

Cisco Enterprise Security Appliance

Cisco Web Security Appliance

Cisco Web Security Appliance

Cisco Advanced Stealthwatch Appliance

Cisco Advanced Stealthwatch Appliance

Suggested answer: C
asked 10/10/2024
Davide Maranzana
33 questions

Question 378

Report
Export
Collapse

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)

If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.

If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.

PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.

PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.

The WSA hosts PAC files on port 9001 by default.

The WSA hosts PAC files on port 9001 by default.

The WSA hosts PAC files on port 6001 by default.

The WSA hosts PAC files on port 6001 by default.

By default, they direct traffic through a proxy when the PC and the host are on the same subnet.

By default, they direct traffic through a proxy when the PC and the host are on the same subnet.

Suggested answer: A, D
asked 10/10/2024
Tiffany Peterson
38 questions

Question 379

Report
Export
Collapse

Which IETF attribute is supported for the RADIUS CoA feature?

24 State

24 State

30 Calling-Station-ID

30 Calling-Station-ID

42 Acct-Session-ID

42 Acct-Session-ID

81 Message-Authenticator

81 Message-Authenticator

Suggested answer: A
asked 10/10/2024
Jarrad Payne
36 questions

Question 380

Report
Export
Collapse

When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?

guest

guest

limited Internet

limited Internet

blocked

blocked

full Internet

full Internet

Suggested answer: C
asked 10/10/2024
Sam Poon
40 questions
Total 631 questions
Go to page: of 64

Related questions