nerdexam
CiscoCisco

350-701 · Question #329

350-701 Question #329: Real Exam Question with Answer & Explanation

The correct answer is B: Cisco Stealthwatch Cloud PNM. Private Network Monitoring (PNM) provides visibility and threat detection for the on-premises network, delivered from the cloud as a SaaS solution. It is the perfect solution for organizations who prefer SaaS products and desire better awareness and security in their on-premises

Submitted by kev92· Mar 30, 2026DOMAIN_LIST_NOT_PROVIDED

Question

An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?

Options

  • ACisco Umbrella Cloud
  • BCisco Stealthwatch Cloud PNM
  • CCisco Stealthwatch Cloud PCM
  • DCisco Umbrella On-Premises

Explanation

Private Network Monitoring (PNM) provides visibility and threat detection for the on-premises network, delivered from the cloud as a SaaS solution. It is the perfect solution for organizations who prefer SaaS products and desire better awareness and security in their on-premises environments while reducing capital expenditure and operational overhead. It works by deploying lightweight software in a virtual machine or server consume a variety of native sources of telemetry or extract metadata from network packet flow. It encrypts this metadata and sends it to the Stealthwatch Cloud analytics platform for analysis. Stealthwatch Cloud consumes metadata only. The packet payloads are never retained or transferred outside the network. This lab focuses on how to configure a Stealthwatch Cloud Private Network Monitoring (PNM) Sensor, in order to provide visibility and effectively identify active threats, and monitors user and device behavior within onpremises networks. The Stealthwatch Cloud PNM Sensor is an extremely flexible piece of technology, capable of being utilized in a number of different deployment scenarios. It can be deployed as a complete Ubuntu based virtual appliance on different hypervisors (e.g. –VMware, VirtualBox). It can be deployed on hardware running a number of different Linux-based operating systems.

Topics

#Network visibility#Threat identification#Packet metadata#Cisco Stealthwatch Cloud

Community Discussion

No community discussion yet for this question.

Full 350-701 PracticeBrowse All 350-701 Questions