Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 16 out of 126 Pages

Topic 1: Exam Pool A

Why would a user choose an on-premises ESA versus the CES solution?


A.

Sensitive data must remain onsite


B.

Demand is unpredictable.


C.

The server team wants to outsource this service.


D.

ESA is deployed inline.





A.
  

Sensitive data must remain onsite



What are two list types within AMP for Endpoints Outbreak Control? (Choose two)


A.

blocked ports


B.

simple custom detections


C.

command and control


D.

allowed applications


E.

URL





B.
  

simple custom detections



D.
  

allowed applications



Advanced Malware Protection (AMP) for Endpoints offers a
variety of lists, referred to as Outbreak Control, that allow you to customize it to your needs.
The main lists are: Simple Custom Detections, Blocked Applications, Allowed Applications,
Advanced Custom Detections, and IP Blocked and Allowed Lists.A Simple Custom
Detection list is similar to a blocked list. These are files that you want to detect
andquarantine.Allowed applications lists are for files you never want to convict. Some
examples are a custom application that is detected by a generic engine or a standard
image that you use throughout the company Reference:
https://docs.amp.cisco.com/AMP-for-Endpoints-User-Guide.pdf

What are two Trojan malware attacks? (Choose two)


A.

Frontdoor


B.

Rootkit


C.

Smurf


D.

Backdoor


E.

Sync





B.
  

Rootkit



D.
  

Backdoor



An organization has two systems in their DMZ that have an unencrypted link between them
for communication.
The organization does not have a defined password policy and uses several default
accounts on the systems.
The application used on those systems also have not gone through stringent code reviews.
Which vulnerability
would help an attacker brute force their way into the systems?


A.

weak passwords


B.

lack of input validation


C.

missing encryption


D.

lack of file permission





C.
  

missing encryption



An administrator is trying to determine which applications are being used in the network but
does not want the
network devices to send metadata to Cisco Firepower. Which feature should be used to
accomplish this?


A.

NetFlow


B.

Packet Tracer


C.

Network Discovery


D.

Access Control





C.
  

Network Discovery




Page 16 out of 126 Pages
Previous