350-701 Exam Questions

Total 626 Questions

Last Updated Exam : 27-Dec-2024

Topic 1: Exam Pool A

Which two kinds of attacks are prevented by multifactor authentication? (Choose two)


A.

phishing


B.

brute force


C.

man-in-the-middle


D.

DDOS


E.

teardrop





B.
  

brute force



C.
  

man-in-the-middle



Drag and drop the steps from the left into the correct order on the right to enable
AppDynamics to monitor an EC2 instance in Amazon Web Services






 

Graphical user interface, text, application, email
Description automatically generated

Refer to the exhibit.

What will happen when this Python script is run?


A.

The compromised computers and malware trajectories will be received from Cisco AMP


B.

The list of computers and their current vulnerabilities will be received from Cisco AMP


C.

The compromised computers and what compromised them will be received from Cisco
AMP


D.

The list of computers, policies, and connector statuses will be received from Cisco AMP





D.
  

The list of computers, policies, and connector statuses will be received from Cisco AMP



An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?


A.

Port Bounce


B.

CoA Terminate


C.

CoA Reauth


D.

CoA Session Query





C.
  

CoA Reauth



An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?


A.

Cisco Umbrella


B.

Cisco Cloud Email Security


C.

Cisco NGFW


D.

Cisco Cloudlock





D.
  

Cisco Cloudlock



Which two features of Cisco DNA Center are used in a Software Defined Network solution?
(Choose two)


A.

accounting


B.

assurance


C.

automation


D.

authentication


E.

encryption





B.
  

assurance



C.
  

automation



https://www.cisco.com/c/en/us/products/collateral/cloud-systemsmanagement/
dna-center/nb-06- cisco-dna-center-aag-cte-en.html

Drag and drop the descriptions from the left onto the correct protocol versions on the right.






What does Cisco AMP for Endpoints use to help an organization detect different families of
malware?


A.

Ethos Engine to perform fuzzy fingerprinting


B.

Tetra Engine to detect malware when me endpoint is connected to the cloud


C.

Clam AV Engine to perform email scanning


D.

Spero Engine with machine learning to perform dynamic analysis





A.
  

Ethos Engine to perform fuzzy fingerprinting



Which function is the primary function of Cisco AMP threat Grid?


A.

automated email encryption


B.

applying a real-time URI blacklist


C.

automated malware analysis


D.

monitoring network traffic





C.
  

automated malware analysis



What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?


A.

To protect the endpoint against malicious file transfers


B.

To ensure that assets are secure from malicious links on and off the corporate network


C.

To establish secure VPN connectivity to the corporate network


D.

To enforce posture compliance and mandatory software





B.
  

To ensure that assets are secure from malicious links on and off the corporate network



Umbrella Roaming is a cloud-delivered security service for
Cisco’s next-generation firewall. It protects your employees even when they are off the
VPN.


Page 10 out of 63 Pages
Previous