exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 533 discussion

Actual exam question from Cisco's 350-701
Question #: 533
Topic #: 1
[All 350-701 Questions]

When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.)

  • A. signature-based endpoint protection on company endpoints
  • B. email integration to protect endpoints from malicious content that is located in email
  • C. real-time feeds from global threat intelligence centers
  • D. macro-based protection to keep connected endpoints safe
  • E. continuous monitoring of all files that are located on connected endpoints
Show Suggested Answer Hide Answer
Suggested Answer: CE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
NullNull88
2 months, 3 weeks ago
Selected Answer: CE
A is not Next-Gen feature so it does not fit the requirements. Threat Feeds/C and Monitoring Files in Real Time/E
upvoted 1 times
...
kloug
6 months, 1 week ago
Answer c,e
upvoted 1 times
...
Premium_Pils
8 months, 2 weeks ago
Selected Answer: AE
Now based on this, I should choose A and E: https://www.cisco.com/c/en/us/products/security/endpoint-security/index.html#~how-it-works Types of endpoint security Endpoint protection platform (EPP) The most common endpoint protection is a traditional antivirus (AV) solution. An AV solution encompasses antimalware capabilities, which are mainly designed to protect against signature-based attacks. When a file enters your network, the AV solution will scan the file to see if the signature matches any malicious threats in a threat intelligence database.
upvoted 1 times
Premium_Pils
8 months, 2 weeks ago
Endpoint detection and remediation (EDR) An EDR solution goes beyond simple point-in-time detection mechanisms. Instead, it continuously monitors all files and applications that enter a device.
upvoted 1 times
...
...
Premium_Pils
8 months, 2 weeks ago
I am trying to find some relevant information to confirm the answers (CE). I could only find a page about SIO. https://www.cisco.com/E-Learning/quickstart/security/cdc_bulk/Additional_Resources/resources/CSIO_At-a-Glance.pdf Cisco Security Intelligence Operations (SIO) is an advanced security infrastructure that provides threat identification, analysis, and mitigation to continuously provide the highest level of security for Cisco customers. Using a combination of threat telemetry, a team of global research engineers, and sophisticated security modeling, Cisco SIO enables fast and accurate protection, allowing customers to securely collaborate and embrace new technologies.
upvoted 1 times
Premium_Pils
8 months, 2 weeks ago
Comprehensive Threat Intelligence with Security Intelligence Operations The Cisco Threat Operations Center processes this global real-time threat intelligence and incorporates it into the security services available on Cisco security devices, for unrivaled protection. ... Threat Operations Center with SIO: Remote Management Services (RMS): Provides 24x7x365 remote monitoring and management of Cisco security devices that are deployed on your network
upvoted 1 times
...
...
reinaldopazsandoval
1 year, 2 months ago
Selected Answer: CE
An endpoint security solution includes continuous monitoring, rapid time to detection, and architectural integrations. With threats continually increasing in sophistication and frequency, it is more important than ever to deploy an effective endpoint protection solution. Endpoint security solutions take a cloud-based approach to instantly access the latest threat intelligence without requiring manual updates from security admins. This allows for faster and more automated responses. They continuously monitor all files and applications that enter your network and have the ability to scale and integrate into your existing environment. Cloud-based solutions offer scalability and flexibility and are easy to install, integrate, and manage. There is also less overhead since there is no infrastructure to maintain. https://www.cisco.com/c/en/us/products/security/endpoint-security/index.html
upvoted 2 times
...
ums008
1 year, 9 months ago
Selected Answer: CE
Answer is Correct
upvoted 2 times
...
jku2cya
1 year, 9 months ago
Selected Answer: AC
Thought A more than E, but who knows. Would have thought E would take a whole heap of processing power (RAM/CPU) on the machine.
upvoted 2 times
...
unclemonkeyboy
1 year, 11 months ago
Selected Answer: CE
Definitely C & E.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago