Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 8 out of 52 pages Questions 71-80 out of 515 questions
Question#71

Which deployment model is the most secure when considering risks to cloud adoption?

  • A. public cloud
  • B. hybrid cloud
  • C. community cloud
  • D. private cloud
Discover Answer Hide Answer

D

Question#72

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

  • A. It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
  • B. It discovers and controls cloud apps that are connected to a company's corporate environment.
  • C. It deletes any application that does not belong in the network.
  • D. It sends the application information to an administrator to act on.
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/products/security/cloudlock/index.html#~features

Question#73

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

  • A. DNS tunneling
  • B. DNSCrypt
  • C. DNS security
  • D. DNSSEC
Discover Answer Hide Answer

A
Reference:
https://learn-umbrella.cisco.com/cloud-security/dns-tunneling

Question#74

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

  • A. Cisco SDA
  • B. Cisco Firepower
  • C. Cisco HyperFlex
  • D. Cisco Cloudlock
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock-cloud-data-security-datasheet.pdf

Question#75

In which cloud services model is the tenant responsible for virtual machine OS patching?

  • A. IaaS
  • B. UCaaS
  • C. PaaS
  • D. SaaS
Discover Answer Hide Answer

A
Reference:
https://www.cmswire.com/cms/information-management/cloud-service-models-iaas-saas-paas-how-microsoft-office-365-azure-fit-in-021672.php

Question#76

What is the function of Cisco Cloudlock for data security?

  • A. data loss prevention
  • B. controls malicious cloud apps
  • C. detects anomalies
  • D. user and entity behavior analytics
Discover Answer Hide Answer

A
Reference:
https://umbrella.cisco.com/products/casb

Question#77

Which feature is supported when deploying Cisco ASAv within AWS public cloud?

  • A. multiple context mode
  • B. user deployment of Layer 3 networks
  • C. IPv6
  • D. clustering
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/asav/quick-start-book/asav-96-qsg/asav-aws.html

Question#78

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?

  • A. PaaS
  • B. XaaS
  • C. IaaS
  • D. SaaS
Discover Answer Hide Answer

A

Question#79

Which risk is created when using an Internet browser to access cloud-based service?

  • A. misconfiguration of Infra, which allows unauthorized access
  • B. intermittent connection to the cloud connectors
  • C. vulnerabilities within protocol
  • D. insecure implementation of API
Discover Answer Hide Answer

C

Question#80

What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

  • A. Cisco AppDynamics
  • B. Cisco Cloudlock
  • C. Cisco Umbrella
  • D. Cisco AMP
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right