exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 574 discussion

Actual exam question from Cisco's 350-701
Question #: 574
Topic #: 1
[All 350-701 Questions]

An organization wants to reduce their attack surface for cloud applications. They want to understand application communications, detect abnormal application behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

  • A. Configure Cisco Tetration to detect anomalies and vulnerabilities.
  • B. Modify the Cisco Duo configuration to restrict access between applications.
  • C. Use Cisco ISE to provide application visibility and restrict access to them.
  • D. Implement Cisco Umbrella to control the access each application is granted.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Mocix
1 week ago
Selected Answer: A
Cisco Tetration is designed to provide comprehensive visibility into applications, including their communications and behavior. It can detect anomalies and vulnerabilities within the applications, making it the best fit for the requirements of understanding application communications, detecting abnormal application behavior, and detecting vulnerabilities. Cisco Duo primarily focuses on multi-factor authentication and ensuring secure access to applications, but it doesn't provide the detailed visibility into application communications and behavior that Tetration offers. Cisco ISE (Identity Services Engine) is mainly used for network access control and policy enforcement. Cisco Umbrella is a cloud security platform that provides DNS-layer security and can control access to websites and applications.
upvoted 2 times
...
IETF1
6 months ago
Cisco Secure Workload (formerly Tetration) seamlessly delivers zero trust microsegmentation across any workload, environment, or location from a single console. With comprehensive visibility into every workload interaction and powerful AI/ML driven automation, Secure Workload reduces the attack surface by preventing lateral movement, identifies workload behavior anomalies, helps rapidly remediate threats, and continuously monitors compliance.
upvoted 2 times
...
IETF1
6 months ago
Cisco Secure Workload formerly Tetration
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago