ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 14

Question list
Search
Search

An MDM provides which two advantages to an organization with regards to device management?

(Choose two)

A.

asset inventory management

A.

asset inventory management

Answers
B.

allowed application management

B.

allowed application management

Answers
C.

Active Directory group policy management

C.

Active Directory group policy management

Answers
D.

network device management

D.

network device management

Answers
E.

critical device management

E.

critical device management

Answers
Suggested answer: A, B

Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

A.

NGFW

A.

NGFW

Answers
B.

AMP

B.

AMP

Answers
C.

WSA

C.

WSA

Answers
D.

ESA

D.

ESA

Answers
Suggested answer: B

Which benefit does endpoint security provide the overall security posture of an organization?

A.

It streamlines the incident response process to automatically perform digital forensics on the endpoint.

A.

It streamlines the incident response process to automatically perform digital forensics on the endpoint.

Answers
B.

It allows the organization to mitigate web-based attacks as long as the user is active in the domain.

B.

It allows the organization to mitigate web-based attacks as long as the user is active in the domain.

Answers
C.

It allows the organization to detect and respond to threats at the edge of the network.

C.

It allows the organization to detect and respond to threats at the edge of the network.

Answers
D.

It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.

D.

It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.

Answers
Suggested answer: D

What are the two most commonly used authentication factors in multifactor authentication?

(Choose two)

A.

biometric factor

A.

biometric factor

Answers
B.

time factor

B.

time factor

Answers
C.

confidentiality factor

C.

confidentiality factor

Answers
D.

knowledge factor

D.

knowledge factor

Answers
E.

encryption factor

E.

encryption factor

Answers
Suggested answer: A, D

Explanation:

Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource. MFA requires means of verification that unauthorized users won't have.

Proper multi-factor authentication uses factors from at least two different categories.

MFA methods:

+ Knowledge – usually a password – is the most commonly used tool in MFA solutions. However, despite their simplicity, passwords have become a security problem and slow down productivity.

+ Physical factors – also called possession factors–use tokens, such as a USB dongle or a portable device, that generate a temporary QR (quick response) code. Mobile phones are commonly used, as they have the advantage of being readily available in most situations.

+ Inherent – This category includes biometrics like fingerprint, face, and retina scans. As technology advances, it may also include voice ID or other behavioral inputs like keystroke metrics. Because inherent factors are reliably unique, always present, and secure, this category shows promise.

+ Location-based and time-based – Authentication systems can use GPS coordinates, network parameters, and metadata for the network in use, and device recognition for MFA. Adaptive authentication combines these data points with historical or contextual user data.

A time factor in conjunction with a location factor could detect an attacker attempting to authenticate in Europe when the user was last authenticated in California an hour prior, for example.

+ Time-based one-time password (TOTP) – This is generally used in 2FA but could apply to any MFA method where a second step is introduced dynamically at login upon completing a first step. The wait for a second step–in which temporary passcodes are sent by SMS or email–is usually brief, and the process is easy to use for a wide range of users and devices. This method is currently widely used.

+ Social media – In this case a user grants permission for a website to use their social media username and password for login. This provide an easy login process, and one generally available to all users.

+ Risk-based authentication – Sometimes called adaptive multi-factor authentication, this method combines adaptive authentication and algorithms that calculate risk and observe the context of specific login requests.

The goal of this method is to reduce redundant logins and provide a more user-friendly workflow.

+ Push-based 2FA – Push-based 2FA improves on SMS and TOTP 2FA by adding additional layers of security while improving ease of use. It confirms a user's identity with multiple factors of authentication that other methods cannot.

Because push-based 2FA sends notifications through data networks like cellular or Wi-Fi, users must have data access on their mobile devices to use the 2FA functionality.

Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factorauthentication.htmlThe two most popular authentication factors are knowledge and inherent (including biometrics likefingerprint,face, and retina scans.

Biometrics is used commonly in mobile devices).

Which two kinds of attacks are prevented by multifactor authentication? (Choose two)

A.

phishing

A.

phishing

Answers
B.

brute force

B.

brute force

Answers
C.

man-in-the-middle

C.

man-in-the-middle

Answers
D.

DDOS

D.

DDOS

Answers
E.

teardrop

E.

teardrop

Answers
Suggested answer: B, C

What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?

A.

EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.

A.

EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.

Answers
B.

EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.

B.

EDR focuses on prevention, and EPP focuses on advanced threats that evade perimeter defenses.

Answers
C.

EPP focuses on network security, and EDR focuses on device security.

C.

EPP focuses on network security, and EDR focuses on device security.

Answers
D.

EDR focuses on network security, and EPP focuses on device security.

D.

EDR focuses on network security, and EPP focuses on device security.

Answers
Suggested answer: A

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work?

A.

NetFlow

A.

NetFlow

Answers
B.

NMAP

B.

NMAP

Answers
C.

SNMP

C.

SNMP

Answers
D.

DHCP

D.

DHCP

Answers
Suggested answer: B

Explanation:

Cisco ISE can determine the type of device or endpoint connecting to the network by performing "profiling." Profiling is done by using DHCP, SNMP, Span, NetFlow, HTTP, RADIUS, DNS, or NMAP scans to collect as much metadata as possible to learn the device fingerprint.

NMAP ("Network Mapper") is a popular network scanner which provides a lot of features. One of them is the OUI (Organizationally Unique Identifier) information. OUI is the first 24 bit or 6 hexadecimal value of the MAC address.

Note: DHCP probe cannot collect OUIs of endpoints. NMAP scan probe can collect these endpoint attributes:

+ EndPointPolicy

+ LastNmapScanCount

+ NmapScanCount

+ OUI

+ Operating-system

Reference: http://www.network-node.com/blog/2016/1/2/ise-20-profiling

What are two reasons for implementing a multifactor authentication solution such as Duo Security provide to an organization? (Choose two)

A.

flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notifications

A.

flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notifications

Answers
B.

single sign-on access to on-premises and cloud applications

B.

single sign-on access to on-premises and cloud applications

Answers
C.

integration with 802.1x security using native Microsoft Windows supplicant

C.

integration with 802.1x security using native Microsoft Windows supplicant

Answers
D.

secure access to on-premises and cloud applications

D.

secure access to on-premises and cloud applications

Answers
E.

identification and correction of application vulnerabilities before allowing access to resources

E.

identification and correction of application vulnerabilities before allowing access to resources

Answers
Suggested answer: A, D

Explanation:

Two-factor authentication adds a second layer of security to your online accounts. Verifying your identity using a second factor (like your phone or other mobile device) prevents anyone but you from logging in, even if they know your password.

Note: Single sign-on (SSO) is a property of identity and access management that enables users to securely authenticate with multiple applications and websites by logging in only once with just one set of credentials (username and password). With SSO, the application or website that the user is trying to access relies on a trusted third party to verify that users are who they say they are.

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?

A.

Ensure that the client computers are pointing to the on-premises DNS servers.

A.

Ensure that the client computers are pointing to the on-premises DNS servers.

Answers
B.

Enable the Intelligent Proxy to validate that traffic is being routed correctly.

B.

Enable the Intelligent Proxy to validate that traffic is being routed correctly.

Answers
C.

Add the public IP address that the client computers are behind to a Core Identity.

C.

Add the public IP address that the client computers are behind to a Core Identity.

Answers
D.

Browse to http://welcome.umbrella.com/ to validate that the new identity is working.

D.

Browse to http://welcome.umbrella.com/ to validate that the new identity is working.

Answers
Suggested answer: B

Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

A.

File Analysis

A.

File Analysis

Answers
B.

SafeSearch

B.

SafeSearch

Answers
C.

SSL Decryption

C.

SSL Decryption

Answers
D.

Destination Lists

D.

Destination Lists

Answers
Suggested answer: C

Explanation:

SSL Decryption is an important part of the Umbrella Intelligent Proxy. he feature allows the Intelligent Proxy to go beyond simply inspecting normal URLs and actually proxy and inspect traffic that's sent over HTTPS. The SSL Decryption feature does require the root certificate be installed.

Reference: https://support.umbrella.com/hc/en-us/articles/115004564126-SSL-Decryption-in-the-IntelligentProxy

Total 631 questions
Go to page: of 64