Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 17 out of 52 pages Questions 161-170 out of 515 questions
Question#161

How is Cisco Umbrella configured to log only security events?

  • A. per policy
  • B. in the Reporting settings
  • C. in the Security Settings section
  • D. per network in the Deployments section
Discover Answer Hide Answer

A
Reference:
https://docs.umbrella.com/deployment-umbrella/docs/log-management

Question#162

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

  • A. Cisco AMP
  • B. Cisco AnyConnect
  • C. Cisco Dynamic DNS
  • D. Cisco Talos
Discover Answer Hide Answer

D

Question#163

What are two list types within Cisco AMP for Endpoints Outbreak Control? (Choose two.)

  • A. blocked ports
  • B. simple custom detections
  • C. command and control
  • D. allowed applications
  • E. URL
Discover Answer Hide Answer

BD
Reference:
https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter 2

Question#164

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

  • A. computer identity
  • B. Windows service
  • C. user identity
  • D. Windows firewall
  • E. default browser
Discover Answer Hide Answer

BD

Question#165

Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

  • A. NGFW
  • B. AMP
  • C. WSA
  • D. ESA
Discover Answer Hide Answer

B

Question#166

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

  • A. Patch for cross-site scripting.
  • B. Perform backups to the private cloud.
  • C. Protect against input validation and character escapes in the endpoint.
  • D. Install a spam and virus email filter.
  • E. Protect systems with an up-to-date antimalware program.
Discover Answer Hide Answer

DE

Question#167

An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware.
Which two solutions mitigate the risk of this ransomware infection? (Choose two.)

  • A. Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing access on the network.
  • B. Set up a profiling policy in Cisco Identity Services Engine to check an endpoint patch level before allowing access on the network.
  • C. Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met before allowing access on the network.
  • D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network.
  • E. Set up a well-defined endpoint patching strategy to ensure that endpoints have critical vulnerabilities patched in a timely fashion.
Discover Answer Hide Answer

AC

Question#168

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

  • A. EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
  • B. EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.
  • C. EPP focuses on network security, and EDR focuses on device security.
  • D. EDR focuses on network security, and EPP focuses on device security.
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html

Question#169

An engineer is configuring AMP for endpoints and wants to block certain files from executing.
Which outbreak control method is used to accomplish this task?

  • A. device flow correlation
  • B. simple detections
  • C. application blocking list
  • D. advanced custom detections
Discover Answer Hide Answer

C

Question#170

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from
ISE.
Which CoA type achieves this goal?

  • A. Port Bounce
  • B. CoA Terminate
  • C. CoA Reauth
  • D. CoA Session Query
Discover Answer Hide Answer

C

chevron rightPrevious Nextchevron right