Cisco 350-701 Practice Test - Questions Answers, Page 13
List of questions
Related questions
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
RBAC
ETHOS detection engine
SPERO detection engine
TETRA detection engine
An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task?
device flow correlation
simple detections
application blocking list
advanced custom detections
Which function is the primary function of Cisco AMP threat Grid?
automated email encryption
applying a real-time URI blacklist
automated malware analysis
monitoring network traffic
What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
blocked ports
simple custom detections
command and control
allowed applications
URL
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Enable IP Layer enforcement.
Activate the Advanced Malware Protection license
Activate SSL decryption.
Enable Intelligent Proxy.
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
authentication server: Cisco Identity Service Engine
supplicant: Cisco AnyConnect ISE Posture module
authenticator: Cisco Catalyst switch
authenticator: Cisco Identity Services Engine
authentication server: Cisco Prime Infrastructure
Refer to the exhibit.
Which command was used to display this output?
show dot1x all
show dot1x
show dot1x all summary
show dot1x interface gi1/0/12
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
The authentication request contains only a password
The authentication request contains only a username
The authentication and authorization requests are grouped in a single packet
There are separate authentication and authorization request packets
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?
Cisco Prime Infrastructure
Cisco Identity Services Engine
Cisco Stealthwatch
Cisco AMP for Endpoints
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
aaa server radius dynamic-author
aaa new-model
auth-type all
ip device-tracking
Question