Cisco 350-701 Practice Test - Questions Answers, Page 26
List of questions
Question 251

In which two ways does Easy Connect help control network access when used with Cisco TrustSec?
(Choose two)
It allows multiple security products to share information and work together to enhance security posture in the network.
It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
It integrates with third-party products to provide better visibility throughout the network.
It allows for managed endpoints that authenticate to AD to be mapped to Security Groups
(PassiveID).
Easy Connect simplifies network access control and segmentation by allowing the assignment of Security Group Tags to endpoints without requiring 802.1X on those endpoints, whether using wired or wireless connectivity.
Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprisenetworks/trustsec/trustsec-witheasy-connect-configuration-guide.pdf
Question 252

What is the benefit of installing Cisco AMP for Endpoints on a network?
It provides operating system patches on the endpoints for security.
It provides flow-based visibility for the endpoints network connections.
It enables behavioral analysis to be used for the endpoints.
It protects endpoint systems through application control and real-time scanning
Question 253

An administrator is configuring a DHCP server to better secure their environment. They need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped. How would this be accomplished?
Set a trusted interface for the DHCP server
Set the DHCP snooping bit to 1
Add entries in the DHCP snooping database
Enable ARP inspection for the required VLAN
To understand DHCP snooping we need to learn about DHCP spoofing attack first.
DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers them with fake DHCP Response before the authorized DHCP Response comes to the clients.
The fake DHCP Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go through the attacker computer, the attacker becomes a "man-in-the-middle".
The attacker can have some ways to make sure its fake DHCP Response arrives first. In fact, if the attacker is "closer" than the DHCP Server then he doesn't need to do anything. Or he can DoS the DHCP Server so that it can't send the DHCP Response.
DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.
Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down.
Question 254

Refer to the exhibit.
What will happen when the Python script is executed?
The hostname will be translated to an IP address and printed.
The hostname will be printed for the client in the client ID field.
The script will pull all computer hostnames and print them.
The script will translate the IP address to FODN and print it
Question 255

Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine certificates. Which configuration item must be modified to allow this?
Group Policy
Method
SAML Server
DHCP Servers
In order to use AAA along with an external token authentication mechanism, set the "Method" as "Both" in the Authentication.
Question 256

An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?
Cisco Umbrella
Cisco Cloud Email Security
Cisco NGFW
Cisco Cloudlock
Cisco Cloudlock: Secure your cloud users, data, and applications with the cloud-native Cloud Access Security Broker (CASB) and cloud cybersecurity platform.
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloud-websecurity/at-a-glance-c45- 738565.pdf
Question 257

An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate with other cloud solutions via an API. Which solution should be used to accomplish this goal?
SIEM
CASB
Adaptive MFA
Cisco Cloudlock
+ Cisco Cloudlock continuously monitors cloud environments with a cloud Data Loss Prevention (DLP) engine to identify sensitive information stored in cloud environments in violation of policy.
+ Cloudlock is API-based.
+ Incidents are a key resource in the Cisco Cloudlock application. They are triggered by the Cloudlock policy engine when a policy detection criteria result in a match in an object (document, field, folder, post, or file).
Reference: https://docs.umbrella.com/cloudlock-documentation/docs/endpointsNote:
+ Security information and event management (SIEM) platforms collect log and event data from security systems, networks and computers, and turn it into actionable security insights.
+ An incident is a record of the triggering of an alerting policy. Cloud Monitoring opens an incident when a condition of an alerting policy has been met.
Question 258

Why is it important to implement MFA inside of an organization?
To prevent man-the-middle attacks from being successful.
To prevent DoS attacks from being successful.
To prevent brute force attacks from being successful.
To prevent phishing attacks from being successful.
Question 259

A network administrator is configuring SNMPv3 on a new router. The users have already been created; however, an additional configuration is needed to facilitate access to the SNMP views. What must the administrator do to accomplish this?
map SNMPv3 users to SNMP views
set the password to be used for SNMPv3 authentication
define the encryption algorithm to be used by SNMPv3
specify the UDP port used by SNMP
Question 260

An organization is using Cisco Firepower and Cisco Meraki MX for network security and needs to centrally manage cloud policies across these platforms. Which software should be used to accomplish this goal?
Cisco Defense Orchestrator
Cisco Secureworks
Cisco DNA Center
Cisco Configuration Professional
Cisco Defense Orchestrator is a cloud-based management solution that allows you to manage security policies and device configurations with ease across multiple Cisco and cloud-native security platforms.
Cisco Defense Orchestrator features:
….
Management of hybrid environments: Managing a mix of firewalls running the ASA, FTD, and Meraki MX software is now easy, with the ability to share policy elements across platforms.
Reference: https://www.cisco.com/c/en/us/products/collateral/security/defenseorchestrator/datasheet-c78-736847.html
Question