How is Cisco Umbrella configured to log only security events?
Answer(s): A
The logging of your identities' activities is set per-policy when you first create a policy. By default, logging is on and set to log all requests an identity makes to reach destinations. At any time after you create a policy, you can change what level of identity activity Umbrella logs.From the Policy wizard, log settings are:Log All Requests--For full logging, whether for content, security or otherwise Log Only Security Events--For security logging only, which gives your users more privacy--a good setting for people with the roaming client installed on personal devices Don't Log Any Requests--Disables all logging. If you select this option, most reporting for identities with this policy will not be helpful as nothing is logged to report on.
https://docs.umbrella.com/deployment-umbrella/docs/log-management
How does Cisco Umbrella archive logs to an enterprise owned storage?
Answer(s): D
The Cisco Umbrella Multi-Org console has the ability to upload, store, and archive traffic activity logs from your organizations' Umbrella dashboards to the cloud through Amazon S3. CSV formatted Umbrella logs are compressed (gzip) and uploaded every ten minutes so that there's a minimum of delay between traffic from the organization's Umbrella dashboard being logged and then being available to download from an S3 bucket.By having your organizations' logs uploaded to an S3 bucket, you can then download logs automatically to keep in perpetuity in backup storage.
https://docs.umbrella.com/deployment-umbrella/docs/manage-logs
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
Answer(s): B
Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?
When Umbrella receives a DNS request, it uses intelligence to determine if the request is safe, malicious or risky -- meaning the domain contains both malicious and legitimate content. Safe and malicious requests are routed as usual or blocked, respectively. Risky requests are routed to our cloud-based proxy for deeper inspection. The Umbrella proxy uses Cisco Talos web reputation and other third-party feeds to determine if a URL is malicious.
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A commented on January 16, 2024 Good Colombia Anonymous upvote
Kim commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.