Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 22 out of 52 pages Questions 211-220 out of 515 questions
Question#211

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

  • A. Platform Exchange Grid
  • B. Multifactor Platform Integration
  • C. Firepower Threat Defense
  • D. Advanced Malware Protection
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/products/security/pxgrid.html

Question#212

Which compliance status is shown when a configured posture policy requirement is not met?

  • A. authorized
  • B. compliant
  • C. unknown
  • D. noncompliant
Discover Answer Hide Answer

D

Question#213

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance. Which product should be used to meet these requirements?

  • A. Cisco Stealthwatch
  • B. Cisco Tetration
  • C. Cisco AMP
  • D. Cisco Umbrella
Discover Answer Hide Answer

B

Question#214

An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network. What action will resolve this issue?

  • A. Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud.
  • B. Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud.
  • C. Configure security appliances to send syslogs to Cisco Stealthwatch Cloud.
  • D. Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud.
Discover Answer Hide Answer

B

Question#215

A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?

  • A. Use 802.1X with posture assessment.
  • B. Use MAB with profiling.
  • C. Use 802.1X with profiling.
  • D. Use MAB with posture assessment.
Discover Answer Hide Answer

B

Question#216

Drag and drop the solutions from the left onto the solution's benefits on the right.
Select and Place:

Discover Answer Hide Answer


Question#217

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement, using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

  • A. Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud.
  • B. Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud.
  • C. Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud.
  • D. Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud.
Discover Answer Hide Answer

C

Question#218

An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?

  • A. Cisco Umbrella Cloud
  • B. Cisco Stealthwatch Cloud PNM
  • C. Cisco Stealthwatch Cloud PCM
  • D. Cisco Umbrella On-Premises
Discover Answer Hide Answer

B

Question#219

What is a benefit of performing device compliance?

  • A. providing multi-factor authentication
  • B. verification of the latest OS patches
  • C. providing attribute-driven policies
  • D. device classification and authorization
Discover Answer Hide Answer

B

Question#220

Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

  • A. malware installation
  • B. network footprinting
  • C. command-and-control communication
  • D. data exfiltration
Discover Answer Hide Answer

D

chevron rightPrevious Nextchevron right