Free 350-701 Exam Braindumps (page: 68)

Page 68 of 153

An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users,
data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform.
What should be used to meet these requirements?

  1. Cisco Umbrella
  2. Cisco Cloud Email Security
  3. Cisco NGFW
  4. Cisco Cloudlock

Answer(s): D

Explanation:

Cisco Cloudlock: Secure your cloud users, data, and applications with the cloud-native Cloud Access Security Broker (CASB) and cloud cybersecurity platform.


Reference:

https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-web- security/at-a-glance-c45- 738565.pdf



An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API.
Which solution should be used to accomplish this goal?

  1. SIEM
  2. CASB
  3. Adaptive MFA
  4. Cisco Cloudlock

Answer(s): D

Explanation:

+ Cisco Cloudlock continuously monitors cloud environments with a cloud Data Loss Prevention (DLP) engine to identify sensitive information stored in cloud environments in violation of policy.
+ Cloudlock is API-based.
+ Incidents are a key resource in the Cisco Cloudlock application. They are triggered by the Cloudlock policy engine when a policy detection criteria result in a match in an object (document, field, folder, post, or file).


Reference:

https://docs.umbrella.com/cloudlock-documentation/docs/endpoints
Note:
+ Security information and event management (SIEM) platforms collect log and event data from security systems, networks and computers, and turn it into actionable security insights.
+ An incident is a record of the triggering of an alerting policy. Cloud Monitoring opens an incident when a condition of an alerting policy has been met.



Why is it important to implement MFA inside of an organization?

  1. To prevent man-the-middle attacks from being successful.
  2. To prevent DoS attacks from being successful.
  3. To prevent brute force attacks from being successful.
  4. To prevent phishing attacks from being successful.

Answer(s): C



A network administrator is configuring SNMPv3 on a new router. The users have already been created;
however, an additional configuration is needed to facilitate access to the SNMP views.
What must the administrator do to accomplish this?

  1. map SNMPv3 users to SNMP views
  2. set the password to be used for SNMPv3 authentication
  3. define the encryption algorithm to be used by SNMPv3
  4. specify the UDP port used by SNMP

Answer(s): B



Page 68 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote