Free 350-701 Exam Braindumps (page: 69)

Page 69 of 153

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms.
Which software should be used to accomplish this goal?

  1. Cisco Defense Orchestrator
  2. Cisco Secureworks
  3. Cisco DNA Center
  4. Cisco Configuration Professional

Answer(s): A

Explanation:

Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms.
Cisco Defense Orchestrator features:
....
Management of hybrid environments: Managing a mix of firewalls running the ASA, FTD, and Meraki MX software is now easy, with the ability to share policy elements across platforms.


Reference:

https://www.cisco.com/c/en/us/products/collateral/security/defense-orchestrator/datasheet-c78-
736847.html



What is a function of 3DES in reference to cryptography?

  1. It hashes files.
  2. It creates one-time use passwords.
  3. It encrypts traffic.
  4. It generates private keys.

Answer(s): C



Which risk is created when using an Internet browser to access cloud-based service?

  1. misconfiguration of infrastructure, which allows unauthorized access
  2. intermittent connection to the cloud connectors
  3. vulnerabilities within protocol
  4. insecure implementation of API

Answer(s): D



An organization has a Cisco ESA set up with policies and would like to customize the action assigned for violations. The organization wants a copy of the message to be delivered with a message added to flag it as a DLP violation.
Which actions must be performed in order to provide this capability?

  1. deliver and send copies to other recipients
  2. quarantine and send a DLP violation notification
  3. quarantine and alter the subject header with a DLP violation
  4. deliver and add disclaimer text

Answer(s): D

Explanation:

You specify primary and secondary actions that the appliance will take when it detects a possible DLP violation in an outgoing message. Different actions can be assigned for different violation types and severities.
Primary actions include:
­ Deliver
­ Drop
­ Quarantine
Secondary actions include:
­ Sending a copy to a policy quarantine if you choose to deliver the message. The copy is a perfect clone of the original, including the Message ID. Quarantining a copy allows you to test the DLP system before deployment in addition to providing another way to monitor DLP violations.
When you release the copy from the quarantine,
the appliance delivers the copy to the recipient, who will have already received the original message. ­ Encrypting messages. The appliance only encrypts the message body. It does not encrypt the message headers.
­ Altering the subject header of messages containing a DLP violation.
­ Adding disclaimer text to messages.
­ Sending messages to an alternate destination mailhost. ­ Sending copies (bcc) of messages to other recipients. (For example, you could copy messages with critical
DLP violations to a compliance officer's mailbox for examination.) ­ Sending a DLP violation notification message to the sender or other contacts, such as a manager or DLP
compliance officer.


Reference:

https://www.cisco.com/c/en/us/td/docs/security/esa/esa12-0/user_guide/ b_ESA_Admin_Guide_12_0/b_ESA_Admin_Guide_chapter_010001.html



Page 69 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote