Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 25 out of 52 pages Questions 241-250 out of 515 questions
Question#241

What are two things to consider when using PAC files with the Cisco WSA? (Choose two.)

  • A. If the WSA host port is changed, the default port redirects web traffic to the correct port automatically.
  • B. PAC files use if-else statements to determine whether to use a proxy or a direct connection for traffic between the PC and the host.
  • C. The WSA hosts PAC files on port 9001 by default.
  • D. The WSA hosts PAC files on port 6001 by default.
  • E. By default, they direct traffic through a proxy when the PC and the host are on the same subnet.
Discover Answer Hide Answer

BC

Question#242

Which IETF attribute is supported for the RADIUS CoA feature?

  • A. 24 State
  • B. 30 Calling-Station-ID
  • C. 42 Acct-Session-ID
  • D. 81 Message-Authenticator
Discover Answer Hide Answer

A

Question#243

When a transparent authentication fails on the Web Security Appliance, which type of access does the end user get?

  • A. guest
  • B. limited Internet
  • C. blocked
  • D. full Internet
Discover Answer Hide Answer

C

Question#244

What are two ways that Cisco Container Platform provides value to customers who utilize cloud service providers? (Choose two.)

  • A. Allows developers to create code once and deploy to multiple clouds
  • B. helps maintain source code for cloud deployments
  • C. manages Docker containers
  • D. manages Kubernetes clusters
  • E. Creates complex tasks for managing code
Discover Answer Hide Answer

AE

Question#245

DRAG DROP -
Drag and drop the posture assessment flow actions from the left into a sequence on the right.
Select and Place:

Discover Answer Hide Answer


Question#246


Refer to the exhibit.
What does the API key do while working with https://api.amp.cisco.com/v1/computers?

  • A. displays client ID
  • B. HTTP authorization
  • C. Imports requests
  • D. HTTP authentication
Discover Answer Hide Answer

C

Question#247

Which statement describes a serverless application?

  • A. The application delivery controller in front of the server farm designates on which server the application runs each time.
  • B. The application runs from an ephemeral, event-triggered, and stateless container that is fully managed by a cloud provider.
  • C. The application is installed on network equipment and not on physical servers.
  • D. The application runs from a containerized environment that is managed by Kubernetes or Docker Swarm.
Discover Answer Hide Answer

B

Question#248

What is a description of microsegmentation?

  • A. Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery.
  • B. Environments apply a zero-trust model and specify how applications on different servers or containers can communicate.
  • C. Environments deploy centrally managed host-based firewall rules on each server or container.
  • D. Environments implement private VLAN segmentation to group servers with similar applications.
Discover Answer Hide Answer

B

Question#249

Which Cisco WSA feature supports access control using URL categories?

  • A. transparent user identification
  • B. SOCKS proxy services
  • C. web usage controls
  • D. user session restrictions
Discover Answer Hide Answer

A

Question#250

Which technology limits communication between nodes on the same network segment to individual applications?

  • A. serverless infrastructure
  • B. microsegmentation
  • C. SaaS deployment
  • D. machine-to-machine firewalling
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right