Free 350-701 Exam Braindumps (page: 77)

Page 77 of 153

A company discovered an attack propagating through their network via a file. A custom file policy was created in order to track this in the future and ensure no other endpoints execute the infected file. In addition, it was discovered during testing that the scans are not detecting the file as an indicator of compromise.
What must be done in order to ensure that the created is functioning as it should?

  1. Create an IP block list for the website from which the file was downloaded
  2. Block the application that the file was using to open
  3. Upload the hash for the file into the policy
  4. Send the file to Cisco Threat Grid for dynamic analysis

Answer(s): C



A network engineer is trying to figure out whether FlexVPN or DMVPN would fit better in their environment.
They have a requirement for more stringent security multiple security associations for the connections, more efficient VPN establishment as well consuming less bandwidth.
Which solution would be best for this and why?

  1. DMVPN because it supports IKEv2 and FlexVPN does not
  2. FlexVPN because it supports IKEv2 and DMVPN does not
  3. FlexVPN because it uses multiple SAs and DMVPN does not
  4. DMVPN because it uses multiple SAs and FlexVPN does not

Answer(s): C

Explanation:

FlexVPN supports IKEv2 -> Answer A is not correct.
DMVPN supports both IKEv1 & IKEv2 -> Answer B is not correct. FlexVPN support multiple SAs -> Answer D is not correct.



How does Cisco Workload Optimization Manager help mitigate application performance issues?

  1. It deploys an AWS Lambda system
  2. It automates resource resizing
  3. It optimizes a flow path
  4. It sets up a workload forensic score

Answer(s): B

Explanation:

Cisco Workload Optimization Manager provides specific real-time actions that ensure workloads get the resources they need when they need them, enabling continuous placement, resizing, and capacity decisions that can be automated, driving continuous health in the environment. You can automate the software's decisions according to your level of comfort: recommend (view only), manual (select and apply), or automated (executed in real time by software).


Reference:

https://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/one- enterprisesuite/solution-overview-c22-739078.pdf



An organization configures Cisco Umbrella to be used for its DNS services. The organization must be able to block traffic based on the subnet that the endpoint is on but it sees only the requests from its public IP address instead of each internal IP address.
What must be done to resolve this issue?

  1. Set up a Cisco Umbrella virtual appliance to internally field the requests and see the traffic of each IP address
  2. Use the tenant control features to identify each subnet being used and track the connections within the
    Cisco Umbrella dashboard
  3. Install the Microsoft Active Directory Connector to give IP address information stitched to the requests in the Cisco Umbrella dashboard
  4. Configure an internal domain within Cisco Umbrella to help identify each address and create policy from the domains

Answer(s): A



Page 77 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote