Cisco 350-701 Practice Test - Questions Answers, Page 14
List of questions
Related questions
An MDM provides which two advantages to an organization with regards to device management?
(Choose two)
asset inventory management
allowed application management
Active Directory group policy management
network device management
critical device management
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
NGFW
AMP
WSA
ESA
Which benefit does endpoint security provide the overall security posture of an organization?
It streamlines the incident response process to automatically perform digital forensics on the endpoint.
It allows the organization to mitigate web-based attacks as long as the user is active in the domain.
It allows the organization to detect and respond to threats at the edge of the network.
It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.
What are the two most commonly used authentication factors in multifactor authentication?
(Choose two)
biometric factor
time factor
confidentiality factor
knowledge factor
encryption factor
Which two kinds of attacks are prevented by multifactor authentication? (Choose two)
phishing
brute force
man-in-the-middle
DDOS
teardrop
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.
EPP focuses on network security, and EDR focuses on device security.
EDR focuses on network security, and EPP focuses on device security.
An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work?
NetFlow
NMAP
SNMP
DHCP
What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an organization? (Choose two)
flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notifications
single sign-on access to on-premises and cloud applications
integration with 802.1x security using native Microsoft Windows supplicant
secure access to on-premises and cloud applications
identification and correction of application vulnerabilities before allowing access to resources
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?
Ensure that the client computers are pointing to the on-premises DNS servers.
Enable the Intelligent Proxy to validate that traffic is being routed correctly.
Add the public IP address that the client computers are behind to a Core Identity.
Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
File Analysis
SafeSearch
SSL Decryption
Destination Lists
Question