Cisco 350-701 Practice Test - Questions Answers, Page 26
List of questions
Related questions
In which two ways does Easy Connect help control network access when used with Cisco TrustSec?
(Choose two)
It allows multiple security products to share information and work together to enhance security posture in the network.
It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
It integrates with third-party products to provide better visibility throughout the network.
It allows for managed endpoints that authenticate to AD to be mapped to Security Groups
(PassiveID).
What is the benefit of installing Cisco AMP for Endpoints on a network?
It provides operating system patches on the endpoints for security.
It provides flow-based visibility for the endpoints network connections.
It enables behavioral analysis to be used for the endpoints.
It protects endpoint systems through application control and real-time scanning
An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Set a trusted interface for the DHCP server
Set the DHCP snooping bit to 1
Add entries in the DHCP snooping database
Enable ARP inspection for the required VLAN
Refer to the exhibit.
What will happen when the Python script is executed?
The hostname will be translated to an IP address and printed.
The hostname will be printed for the client in the client ID field.
The script will pull all computer hostnames and print them.
The script will translate the IP address to FODN and print it
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?
Group Policy
Method
SAML Server
DHCP Servers
An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?
Cisco Umbrella
Cisco Cloud Email Security
Cisco NGFW
Cisco Cloudlock
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API. Which solution should be used to accomplish this goal?
SIEM
CASB
Adaptive MFA
Cisco Cloudlock
Why is it important to implement MFA inside of an organization?
To prevent man-the-middle attacks from being successful.
To prevent DoS attacks from being successful.
To prevent brute force attacks from being successful.
To prevent phishing attacks from being successful.
A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?
map SNMPv3 users to SNMP views
set the password to be used for SNMPv3 authentication
define the encryption algorithm to be used by SNMPv3
specify the UDP port used by SNMP
An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Cisco Defense Orchestrator
Cisco Secureworks
Cisco DNA Center
Cisco Configuration Professional
Question