Free 350-701 Exam Braindumps (page: 59)

Page 59 of 153

DRAG DROP (Drag and Drop is not supported)
Drag and drop the NetFlow export formats from the left onto the descriptions on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:




The Version 1 format was the initially released version. Do not use the Version 1 format unless you are using a legacy collection system that requires it. Use Version 9 or Version 5 export format. Version 5 export format is suitable only for the main cache; it cannot be expanded to support new features.
Version 8 export format is available only for aggregation caches; it cannot be expanded to support new features.


Reference:

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15- mt-book/cfgnflow-data-expt.html



DRAG DROP
Drag and drop the solutions from the left onto the solution's benefits on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



Cisco Stealthwatch - rapidly collects and analyzes netflow and telementy data to deliver in-depth visibility and understanding of network traffic
Cisco ISE ­ obtains contextual identity and profiles for all users and device Cisco TrustSec ­ software defined segmentation that uses SGTs Cisco Umbrella ­ secure internet gateway ion the cloud that provides a security solution



DRAG DROP (Drag and Drop is not supported)
Drag and drop the common security threats from the left onto the definitions on the right.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict.
What is causing this issue?

  1. The policy was created to send a message to quarantine instead of drop
  2. The file has a reputation score that is above the threshold
  3. The file has a reputation score that is below the threshold
  4. The policy was created to disable file analysis

Answer(s): D

Explanation:

Maybe the "newly installed service" in this Qmentions about Advanced Malware Protection (AMP) which can be used along with ESA. AMP allows superior protection across the attack continuum. + File Reputation ­ captures a fingerprint of each file as it traverses the ESA and sends it to AMP's cloudbased intelligence network for a reputation verdict. Given these results, you can automatically block malicious files and apply administrator-defined policy. + File Analysis ­ provides the ability to analyze unknown files that are traversing the ESA. A highly secure sandbox environment enables AMP to glean precise details about the file's behavior and to combine that data with detailed human and machine analysis to determine the file's threat level. This disposition is then fed into AMP cloud-based intelligence network and used to dynamically update and expand the AMP cloud data set for enhanced protection



Page 59 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote