exam questions

Exam 350-401 All Questions

View all questions & answers for the 350-401 exam

Exam 350-401 topic 1 question 877 discussion

Actual exam question from Cisco's 350-401
Question #: 877
Topic #: 1
[All 350-401 Questions]

Which characteristic applies to the endpoint security aspect of the Cisco Threat Defense architecture?

  • A. detect and block ransomware in email attachments
  • B. outbound URL analysis and data transfer controls
  • C. user context analysis
  • D. blocking of fileless malware in real time
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Horsefeathers
Highly Voted 1 year, 4 months ago
Selected Answer: D
A. detect and block ransomware in email attachments - ESA B. outbound URL analysis and data transfer controls - FirePOWER & FireSIGHT C. user context analysis - NetFlow & StealthWatch D. blocking of fileless malware in real time - AMP for Endpoints (one of the features of AMP - "The exploit prevention feature will defend endpoints from exploit-based, memory injection attacks." - where fileless malware is malicious code that works directly within a computer's memory. https://www.cisco.com/c/dam/en/us/td/docs/security/network_security/ctd/ctd2-0/design_guides/ctd_2-0_cvd_guide_jul15.pdf https://www.cisco.com/c/en/us/products/collateral/security/fireamp-endpoints/datasheet-c78-733181.html
upvoted 16 times
...
chiacche
Most Recent 7 months, 2 weeks ago
Selected Answer: D
Cisco Threat Defense architecture emphasizes endpoint security → Fileless malware & Real-time blocking (Cisco AMP for Endpoints)
upvoted 2 times
...
[Removed]
10 months, 4 weeks ago
Selected Answer: D
D is correct
upvoted 1 times
...
[Removed]
11 months, 2 weeks ago
D is correct
upvoted 1 times
...
supershysherlock
1 year, 1 month ago
Selected Answer: D
D is the correct answer.
upvoted 2 times
...
teems5uk
1 year, 3 months ago
Selected Answer: D
Given answer is correct
upvoted 3 times
...
Fanny1493
1 year, 5 months ago
Selected Answer: C
I think correct is C https://www.cisco.com/c/dam/en/us/td/docs/security/network_security/ctd/ctd2-0/design_guides/ctd_2-0_cvd_guide_jul15.pdf
upvoted 2 times
...
Calinserban
1 year, 5 months ago
Cisco AMP for Endpoints provides file-matching analysis to identify suspicious files when they are transferred onto an endpoint. AMP can provide automated blocking of suspicious files as well as the ability to track the spread of a file throughout the network using a feature known as File Trajectory
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago