Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 20 out of 52 pages Questions 191-200 out of 515 questions
Question#191

An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on, but sees only the requests from its public IP addresses instead of each internal IP address. What must be done to resolve this issue?

  • A. Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard.
  • B. Use the tenant control features to identify each subnet being used and track the connections within the Cisco Umbrella dashboard.
  • C. Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains.
  • D. Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address.
Discover Answer Hide Answer

D
Reference:
https://docs.umbrella.com/deployment-umbrella/docs/internal-networks-setup-guide

Question#192

An engineer adds a custom detection policy to a Cisco AMP deployment and encounters issues with the configuration. The simple detection mechanism is configured, but the dashboard indicates that the hash is not 64 characters and is non-zero. What is the issue?

  • A. The hash being uploaded is part of a set in an incorrect format.
  • B. The engineer is attempting to upload a file instead of a hash.
  • C. The file being uploaded is incompatible with simple detections and must use advanced detections.
  • D. The engineer is attempting to upload a hash created using MD5 instead of SHA-256.
Discover Answer Hide Answer

D

Question#193

What is the benefit of integrating Cisco ISE with a MDM solution?

  • A. It provides compliance checks for access to the network.
  • B. It provides the ability to update other applications on the mobile device.
  • C. It provides the ability to add applications to the mobile device through Cisco ISE.
  • D. It provides network device administration access.
Discover Answer Hide Answer

A

Question#194

Which feature is leveraged by advanced antimalware capabilities to be an effective endpoint protection platform?

  • A. blocklisting
  • B. storm centers
  • C. big data
  • D. sandboxing
Discover Answer Hide Answer

D

Question#195

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures. The configuration is created in the simple detection policy section, but it does not work. What is the reason for this failure?

  • A. The administrator must upload the file instead of the hash for Cisco AMP to use.
  • B. The APK must be uploaded for the application that the detection is intended.
  • C. The MD5 hash uploaded to the simple detection policy is in the incorrect format.
  • D. Detections for MD5 signatures must be configured in the advanced custom detection policies.
Discover Answer Hide Answer

A

Question#196

An administrator is adding a new Cisco ISE node to an existing deployment. What must be done to ensure that the addition of the node will be successful when inputting the FQDN?

  • A. Change the IP address of the new Cisco ISE node to the same network as the others.
  • B. Make the new Cisco ISE node a secondary PAN before registering it with the primary.
  • C. Open port 8905 on the firewall between the Cisco ISE nodes.
  • D. Add the DNS entry for the new Cisco ISE node into the DNS server.
Discover Answer Hide Answer

A

Question#197

Which portion of the network do EPP solutions solely focus on and EDR solutions do not?

  • A. East-West gateways
  • B. server farm
  • C. core
  • D. perimeter
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/products/security/endpoint-security/what-is-endpoint-detection-response-edr.html

Question#198

Which benefit does endpoint security provide the overall security posture of an organization?

  • A. It streamlines the incident response process to automatically perform digital forensics on the endpoint.
  • B. It allows the organization to mitigate web-based attacks as long as the user is active in the domain.
  • C. It allows the organization to detect and respond to threats at the edge of the network.
  • D. It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.
Discover Answer Hide Answer

D

Question#199

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

  • A. Nexus
  • B. Stealthwatch
  • C. Firepower
  • D. Tetration
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products

Question#200

An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth.
Which product meets all of these requirements?

  • A. Cisco Prime Infrastructure
  • B. Cisco Identity Services Engine
  • C. Cisco Stealthwatch
  • D. Cisco AMP for Endpoints
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right