exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 357 discussion

Actual exam question from Cisco's 350-701
Question #: 357
Topic #: 1
[All 350-701 Questions]

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Which process uses STIX and allows uploads and downloads of block lists?

  • A. editing
  • B. sharing
  • C. authoring
  • D. consumption
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Demon_Queen_Velverosa
7 months, 3 weeks ago
Selected Answer: D
The Demon Queen would like to provide a dumbed downed explanation as why it is D. The "uploads" part of the question can easily throw you off as it seems like it is sharing Threat intelligence will other orgs. However that is not the case as the term "upload" refers to the TIDirector pushing out processed threat intelligence data to sensors on the network to look out for in this case block listed items. How it works? Threat Intelligence Directory first consumes threat intelligence data and processes it before uploading (pushing or sending) it out to sensors on the network to detect the newly uploaded info.
upvoted 1 times
...
bfd04b6
9 months ago
Selected Answer: D
D is correct! --Consume is the keyword! Cisco Threat Intelligence Director (TID) is a system that operationalizes threat intelligence information. The system consumes and normalizes heterogeneous third-party cyber threat intelligence, publishes the intelligence to detection technologies, and correlates the observations from the detection technologies. https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html
upvoted 2 times
...
bfd04b6
9 months ago
D is correct! --Consume is the keyword! Cisco Threat Intelligence Director (TID) is a system that operationalizes threat intelligence information. The system consumes and normalizes heterogeneous third-party cyber threat intelligence, publishes the intelligence to detection technologies, and correlates the observations from the detection technologies. https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html
upvoted 1 times
...
c946f3e
1 year, 8 months ago
Selected Answer: B
There are two new terms: STIX (Structured Threat Intelligence eXpression) is a standard for sharing and using threat intelligence information. There are three key functional elements: Indicators, Observables, and Incidents TAXII (Trusted Automated eXchange of Indicator Information) is a transport mechanism for threat information
upvoted 1 times
...
nep1019
1 year, 9 months ago
Selected Answer: D
https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html Search consume
upvoted 3 times
...
ums008
1 year, 10 months ago
Selected Answer: D
Again someone needs to Update these answers, Consumption is the correct Answer
upvoted 3 times
...
Jessie45785
1 year, 11 months ago
Selected Answer: B
UPLOAD / DOWNLOAD is a keyword - it is B
upvoted 2 times
MPoels
1 year, 2 months ago
"...ALLOWS uploads and downloads..." Upload/download is therefore NOT part of the requested process. Answer: D
upvoted 2 times
...
...
ezpzls
1 year, 12 months ago
Selected Answer: D
check out the diagram in figure 2 https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-config-guide-v623/cisco_threat_intelligence_director__tid_.html
upvoted 3 times
...
alischajan
2 years, 1 month ago
Selected Answer: B
B looks correct. The question says: "allows uploads and downloads of block lists", which is the method of sharing. Consumption always means downloading the block list.
upvoted 2 times
...
Totosos1
2 years, 1 month ago
Selected Answer: D
I've looked at multiple sources for this one, it's definitely 'D' - Consumption: "TID has the ability to 'consume' threat intelligence via STIX over TAXII and allows uploads/downloads of STIX and simple blacklists.
upvoted 2 times
...
dawlims
2 years, 1 month ago
Selected Answer: D
https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligence-director
upvoted 3 times
...
achille5
2 years, 2 months ago
Selected Answer: C
Editing, is not the correct answer because editing refers to the process of modifying existing STIX-compliant threat intelligence data, rather than creating new data or sharing it with other security platforms. Sharing, is also not the correct answer because while sharing is an important aspect of the STIX format, it does not specifically refer to the process of using STIX to create or update block lists. Consumption, is not the correct answer because consumption refers to the process of using STIX threat intelligence data to inform security policies or other security-related decisions, rather than the process of creating or updating block lists based on STIX data.
upvoted 2 times
achille5
2 years, 2 months ago
B Sharing
upvoted 1 times
...
...
Anonymous983475
2 years, 4 months ago
Selected Answer: D
It is Consumption. --- https://www.cisco.com/c/en/us/support/docs/storage-networking/security/214859-configure-and-troubleshoot-cisco-threat.html --- Cisco Threat Intelligence Director (TID) is a system that operationalizes threat intelligence information. The system consumes and normalizes heterogeneous third-party cyber threat intelligence, publishes the intelligence to detection technologies and correlates the observations from the detection technologies.
upvoted 3 times
...
CCNP21
2 years, 4 months ago
Selected Answer: D
I believe it is consumption.
upvoted 2 times
...
Emlia1
2 years, 5 months ago
prefer A
upvoted 1 times
...
Emlia1
2 years, 5 months ago
A or D
upvoted 1 times
...
edu_web
2 years, 5 months ago
Isn't D - Consumption? The answer is consumption (B) - https://blogs.cisco.com/developer/automate-threat-intelligence-using-cisco-threat-intelligence-director "TID has the ability to consume threat intelligence via STIX over TAXII and allows uploads/downloads of STIX and simple blacklists"
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...