Free 350-701 Exam Braindumps (page: 65)

Page 65 of 153

An organization is trying to implement micro-segmentation on the network and wants to be able to gain visibility on the applications within the network. The solution must be able to maintain and force compliance.
Which product should be used to meet these requirements?

  1. Cisco Umbrella
  2. Cisco AMP
  3. Cisco Stealthwatch
  4. Cisco Tetration

Answer(s): D

Explanation:

Micro-segmentation secures applications by expressly allowing particular application traffic and, by default, denying all other traffic. Micro-segmentation is the foundation for implementing a zero-trust security model for application workloads in the data center and cloud.
Cisco Tetration is an application workload security platform designed to secure your compute instances across any infrastructure and any cloud. To achieve this, it uses behavior and attribute-driven microsegmentation policy generation and enforcement. It enables trusted access through automated, exhaustive context from various systems to automatically adapt security policies. To generate accurate microsegmentation policy, Cisco Tetration performs application dependency mapping to discover the relationships between different application tiers and infrastructure services. In addition, the platform supports "what-if" policy analysis using real-time data or historical data to assist in the validation and risk assessment of policy application pre-enforcement to ensure ongoing application availability. The normalized microsegmentation policy can be enforced through the application workload itself for a consistent approach to workload microsegmentation across any environment, including virtualized, bare-metal, and container workloads running in any public cloud or any data center. Once the microsegmentation policy is enforced, Cisco Tetration continues to monitor for compliance deviations, ensuring the segmentation policy is up to date as the application behavior change.


Reference:

https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/tetration- analytics/solutionoverview-c22-739268.pdf



Which factor must be considered when choosing the on-premise solution over the cloud-based one?

  1. With an on-premise solution, the provider is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the customer is responsible for it
  2. With a cloud-based solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
  3. With an on-premise solution, the provider is responsible for the installation, but the customer is responsible for the maintenance of the product.
  4. With an on-premise solution, the customer is responsible for the installation and maintenance of the product, whereas with a cloud-based solution, the provider is responsible for it.

Answer(s): D



Which term describes when the Cisco Firepower downloads threat intelligence updates from Cisco Talos?

  1. consumption
  2. sharing
  3. analysis
  4. authoring

Answer(s): A

Explanation:

... we will showcase Cisco Threat Intelligence Director (CTID) an exciting feature on Cisco's Firepower Management Center (FMC) product offering that automates the operationalization of threat intelligence. TID has the ability to consume threat intelligence via STIX over TAXII and allows uploads/downloads of STIX and simple blacklists.


Reference:

https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat- intelligencedirector



An organization has a Cisco Stealthwatch Cloud deployment in their environment. Cloud logging is working as expected, but logs are not being received from the on-premise network, what action will resolve this issue?

  1. Configure security appliances to send syslogs to Cisco Stealthwatch Cloud
  2. Configure security appliances to send NetFlow to Cisco Stealthwatch Cloud
  3. Deploy a Cisco FTD sensor to send events to Cisco Stealthwatch Cloud
  4. Deploy a Cisco Stealthwatch Cloud sensor on the network to send data to Cisco Stealthwatch Cloud

Answer(s): D

Explanation:

You can also monitor on-premises networks in your organizations using Cisco Stealthwatch Cloud. In order to do so, you need to deploy at least one Cisco Stealthwatch Cloud Sensor appliance (virtual or physical appliance).


Reference:

CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide



Page 65 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote