Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 11 out of 126 Pages

Topic 2: Exam Pool B

Why is it important to have logical security controls on endpoints even though the users are
trained to spot security threats and the network devices already help prevent them?


A.

to prevent theft of the endpoints


B.

because defense-in-depth stops at the network


C.

to expose the endpoint to more threats


D.

because human error or insider threats will still exist





D.
  

because human error or insider threats will still exist



What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?


A.

Multiple NetFlow collectors are supported


B.

Advanced NetFlow v9 templates and legacy v5 formatting are supported


C.

Secure NetFlow connections are optimized for Cisco Prime Infrastructure


D.

Flow-create events are delayed





B.
  

Advanced NetFlow v9 templates and legacy v5 formatting are supported



What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?


A.

STIX


B.

XMPP


C.

pxGrid


D.

SMTP





A.
  

STIX



TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport

What is the purpose of the My Devices Portal in a Cisco ISE environment?


A.

to register new laptops and mobile devices


B.

to request a newly provisioned mobile device


C.

to provision userless and agentless systems


D.

to manage and deploy antivirus definitions and patches on systems owned by the end
user





A.
  

to register new laptops and mobile devices



An organization recently installed a Cisco WSA and would like to take advantage of the
AVC engine to allow the organization to create a policy to control application specific
activity. After enabling the AVC engine, what must be done to implement this?


A.

Use security services to configure the traffic monitor, .


B.

Use URL categorization to prevent the application traffic


C.

Use an access policy group to configure application control settings


D.

Use web security reporting to validate engine functionality





C.
  

Use an access policy group to configure application control settings



The Application Visibility and Control (AVC) engine
lets you create policies to control application activity on the network without having to fully
understand the underlying technology of each application. You can configure application
control settings in Access Policy groups. You can block or allow applications individually or
according to application type. You can also apply controls to particular application types.


Page 11 out of 126 Pages
Previous