Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 12 out of 126 Pages

Topic 1: Exam Pool A

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)


A.

DDoS


B.

antispam


C.

antivirus


D.

encryption


E.

DLP





D.
  

encryption



E.
  

DLP



Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the
correct definitions on the right.

 






Which Cisco product is open, scalable, and built on IETF standards to allow multiple
security products from
Cisco and other vendors to share data and interoperate with each other?


A.

Advanced Malware Protection


B.

Platform Exchange Grid


C.

Multifactor Platform Integration


D.

Firepower Threat Defense





B.
  

Platform Exchange Grid



With Cisco pxGrid (Platform Exchange Grid), your multiple
security products can now share data and work together. This open, scalable, and IETF
standards-driven platform helps you automate security to get answers and contain threats
faster.

A network administrator needs to find out what assets currently exist on the network. Thirdparty
systems need to be able to feed host data into Cisco Firepower. What must be
configured to accomplish this?


A.

a Network Discovery policy to receive data from the host


B.

a Threat Intelligence policy to download the data from the host


C.

a File Analysis policy to send file data into Cisco Firepower


D.

a Network Analysis policy to receive NetFlow data from the host





A.
  

a Network Discovery policy to receive data from the host



You can configure discovery rules to tailor the discovery of host
and application data to your needs.The Firepower System can use data from NetFlow
exporters to generate connection and discovery events, and to add host and application
data to the network map.A network analysis policy governs how traffic is decoded and
preprocessed so it can be further evaluated, especially for anomalous traffic that might
signal an intrusion attempt -> Answer D is not correct.

Drag and drop the capabilities from the left onto the correct technologies on the right.

 






Text, chat or text message

Description automatically generated


Page 12 out of 126 Pages
Previous