exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 327 discussion

Actual exam question from Cisco's 350-701
Question #: 327
Topic #: 1
[All 350-701 Questions]

In which scenario is endpoint-based security the solution?

  • A. inspecting encrypted traffic
  • B. device profiling and authorization
  • C. performing signature-based application control
  • D. inspecting a password-protected archive
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bigblob
Highly Voted 2 years, 5 months ago
Selected Answer: D
A, B and C can be done at the network level. Only for password-protected (=encrypted?) archive, there is not enough information on the network level, so it needs to be done on the end point.
upvoted 6 times
davezz
2 years, 1 month ago
application control (C) can't be done at the network level
upvoted 2 times
...
...
west33637
Highly Voted 2 years, 3 months ago
Selected Answer: A
Im going with A. Endpoint protection cannot open a password protected archive. Endpoint protection does not do signature based application control. you can create application block lists and allow lists using file hashes, but no signature based application control that Im aware of. Inspecting encrypted files can be done at the network level, but it is not optimal. it consumes way too much firewall CPU and can be impractical. Also, some encrypted sites implement certificate pinning and client side validation and therefore network decryption will appear as a man in the middle and fail. Endpoint protection is the recommended solution for inspecting encrypted traffic.
upvoted 5 times
Joseph47
2 years, 2 months ago
what about when the user enters the password for the protected file? then AMP would ask for its hash, isn't? (Hope so)
upvoted 2 times
...
...
kloug
Most Recent 6 months, 1 week ago
Answer c
upvoted 1 times
...
Abu_Muhammad
10 months, 1 week ago
Selected Answer: D
Thanks DWizard Excellent illustration.
upvoted 1 times
...
4pelos
1 year, 2 months ago
Correct answer D. Checked in securitytut
upvoted 1 times
...
petestudies
1 year, 4 months ago
Selected Answer: C
I like C, application control the key I would for endpoint protection.
upvoted 1 times
...
fdl543
1 year, 9 months ago
Selected Answer: C
C Performing signature-based application control (executable hash used to block application). Inspect traffic is not endpoint. Devide profiling and authorization is ISE. Inspect a password-protected archive is not AMP funcion.
upvoted 1 times
...
DWizard
1 year, 9 months ago
Selected Answer: D
The answer is D. B is nonsense, A can be done at the network level (ETA, SSL decrytion) so you don't need an endpoint solution for that, and C can also be achieved by an IPS, so again, you don't need an endpoint solution, but if a malicious file is zipped and password-protected, it will bypass most of the security controls, only an endpoint protection solution will detect it and stop it at the moment of execution.
upvoted 4 times
...
jku2cya
1 year, 10 months ago
Selected Answer: D
Thought C initially, but agree with bigblob that it's actually D per their reasoning. Pretty sure there are always new IPS signature updates on FTD, and FTD is not an endpoint-based security solution.
upvoted 1 times
...
Bandito
1 year, 10 months ago
Selected Answer: A
Based on Cisco SCOR materials I choose A: Because HIPS is installed directly on the host that it is protecting, it can monitor processes and resources on the system. It can also analyze encrypted traffic after it has been decrypted, which is something a network-based IPS cannot do.
upvoted 1 times
...
dawlims
2 years ago
Selected Answer: C
https://blogs.cisco.com/security/endpoint-protection-platform-epp-vs-endpoint-detection-response-edr#:~:text=Cisco%20AMP%20for%20Endpoints%20goes,block%20malware%20in%20real%2Dtime.
upvoted 3 times
...
davezz
2 years, 1 month ago
Did some googling, it seems EDR and XDR can't inspect password protected files, so based on this D isn't correct as it's impossible to execute D.
upvoted 1 times
...
Martian89
2 years, 3 months ago
Selected Answer: C
Think its C in AMP saves the hash of the app You upload and can block
upvoted 2 times
...
Emlia1
2 years, 4 months ago
Selected Answer: C
C I prefer
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago