An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms.Which software should be used to accomplish this goal?
Answer(s): A
Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms.Cisco Defense Orchestrator features:....Management of hybrid environments: Managing a mix of firewalls running the ASA, FTD, and Meraki MX software is now easy, with the ability to share policy elements across platforms.
https://www.cisco.com/c/en/us/products/collateral/security/defense-orchestrator/datasheet-c78-736847.html
What is a function of 3DES in reference to cryptography?
Answer(s): C
Which risk is created when using an Internet browser to access cloud-based service?
Answer(s): D
An organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation.Which actions must be performed in order to provide this capability?
You specify primary and secondary actions that the appliance will take when it detects a possible DLP violation in an outgoing message. Different actions can be assigned for different violation types and severities.Primary actions include: Deliver Drop QuarantineSecondary actions include: Sending a copy to a policy quarantine if you choose to deliver the message. The copy is a perfect clone of the original, including the Message ID. Quarantining a copy allows you to test the DLP system before deployment in addition to providing another way to monitor DLP violations.When you release the copy from the quarantine,the appliance delivers the copy to the recipient, who will have already received the original message. Encrypting messages. The appliance only encrypts the message body. It does not encrypt the message headers. Altering the subject header of messages containing a DLP violation. Adding disclaimer text to messages. Sending messages to an alternate destination mailhost. Sending copies (bcc) of messages to other recipients. (For example, you could copy messages with criticalDLP violations to a compliance officer's mailbox for examination.) Sending a DLP violation notification message to the sender or other contacts, such as a manager or DLPcompliance officer.
https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/ b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_chapter_010001.html
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A commented on January 16, 2024 Good Colombia Anonymous upvote
Kim commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.