ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 39

List of questions

Question 381

Report
Export
Collapse

What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)

Allows developers to create code once and deploy to multiple clouds

Allows developers to create code once and deploy to multiple clouds

helps maintain source code for cloud deployments

helps maintain source code for cloud deployments

manages Docker containers

manages Docker containers

manages Kubernetes clusters

manages Kubernetes clusters

Creates complex tasks for managing code

Creates complex tasks for managing code

Suggested answer: A, E
asked 10/10/2024
Leonelo Sanchez
27 questions

Question 382

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-701 image Question 382 117603 10102024233052000000

What does the API key do while working with https://api.amp.cisco.com/v1/computers?

displays client ID

displays client ID

HTTP authorization

HTTP authorization

Imports requests

Imports requests

HTTP authentication

HTTP authentication

Suggested answer: D
asked 10/10/2024
GUY XAVIER DONGMO FAPONG
39 questions

Question 383

Report
Export
Collapse

Which statement describes a serverless application?

The application delivery controller in front of the server farm designates on which server the application runs each time.

The application delivery controller in front of the server farm designates on which server the application runs each time.

The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.

The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.

The application is installed on network equipment and not on physical servers.

The application is installed on network equipment and not on physical servers.

The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.

The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.

Suggested answer: B
asked 10/10/2024
Synathia Imafidon
41 questions

Question 384

Report
Export
Collapse

What is a description of microsegmentation?

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.

Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.

Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.

Environments deploy centrally managed host-based firewall rules on each server or container.

Environments deploy centrally managed host-based firewall rules on each server or container.

Environments implement private VLAN segmentation to group servers with similar applications.

Environments implement private VLAN segmentation to group servers with similar applications.

Suggested answer: B
asked 10/10/2024
DAVIDE MCGARR
37 questions

Question 385

Report
Export
Collapse

Which Cisco WSA feature supports access control using URL categories?

transparent user identification

transparent user identification

SOCKS proxy services

SOCKS proxy services

web usage controls

web usage controls

user session restrictions

user session restrictions

Suggested answer: A
asked 10/10/2024
Chien Fang
40 questions

Question 386

Report
Export
Collapse

Which technology limits communication between nodes on the same network segment to individual applications?

serverless infrastructure

serverless infrastructure

microsegmentation

microsegmentation

SaaS deployment

SaaS deployment

machine-to-machine firewalling

machine-to-machine firewalling

Suggested answer: B
asked 10/10/2024
Francisco Rocha de Oliveira Junior
28 questions

Question 387

Report
Export
Collapse

An engineer enabled SSL decryption for Cisco Umbrella intelligent proxy and needs to ensure that traffic is inspected without alerting end-users. Which action accomplishes this goal?

Restrict access to only websites with trusted third-party signed certificates.

Restrict access to only websites with trusted third-party signed certificates.

Modify the user's browser settings to suppress errors from Cisco Umbrella.

Modify the user's browser settings to suppress errors from Cisco Umbrella.

Upload the organization root CA to Cisco Umbrella.

Upload the organization root CA to Cisco Umbrella.

Install the Cisco Umbrella root CA onto the user's device.

Install the Cisco Umbrella root CA onto the user's device.

Suggested answer: D
asked 10/10/2024
Saran Lertrat
29 questions

Question 388

Report
Export
Collapse

What is the purpose of joining Cisco WSAs to an appliance group?

All WSAs in the group can view file analysis results.

All WSAs in the group can view file analysis results.

The group supports improved redundancy

The group supports improved redundancy

It supports cluster operations to expedite the malware analysis process.

It supports cluster operations to expedite the malware analysis process.

It simplifies the task of patching multiple appliances.

It simplifies the task of patching multiple appliances.

Suggested answer: A
asked 10/10/2024
Kaung Zaw Tun
35 questions

Question 389

Report
Export
Collapse

Why should organizations migrate to an MFA strategy for authentication?

Single methods of authentication can be compromised more easily than MFA.

Single methods of authentication can be compromised more easily than MFA.

Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.

Biometrics authentication leads to the need for MFA due to its ability to be hacked easily.

MFA methods of authentication are never compromised.

MFA methods of authentication are never compromised.

MFA does not require any piece of evidence for an authentication mechanism.

MFA does not require any piece of evidence for an authentication mechanism.

Suggested answer: A
asked 10/10/2024
Abdulilah Alhousainy
39 questions

Question 390

Report
Export
Collapse

Which technology should be used to help prevent an attacker from stealing usernames and passwords of users within an organization?

RADIUS-based REAP

RADIUS-based REAP

fingerprinting

fingerprinting

Dynamic ARP Inspection

Dynamic ARP Inspection

multifactor authentication

multifactor authentication

Suggested answer: D
asked 10/10/2024
Inkisar Malik
36 questions
Total 631 questions
Go to page: of 64

Related questions