Cisco 350-701 Practice Test - Questions Answers, Page 40
List of questions
Related questions
Which type of attack is MFA an effective deterrent for?
ping of death
phishing
teardrop
syn flood
Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?
Cisco AMP for Endpoints
Cisco AnyConnect
Cisco Umbrella
Cisco Duo
Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two.)
Assignments to endpoint groups are made dynamically, based on endpoint attributes.
Endpoint supplicant configuration is deployed.
A centralized management solution is deployed.
Patch management remediation is performed.
The latest antivirus updates are applied before access is allowed.
What is an advantage of the Cisco Umbrella roaming client?
the ability to see all traffic without requiring TLS decryption
visibility into IP-based threats by tunneling suspicious IP connections
the ability to dynamically categorize traffic to previously uncategorized sites
visibility into traffic that is destined to sites within the office environment
Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?
Cisco Advanced Malware Protection
Cisco Stealthwatch
Cisco Identity Services Engine
Cisco AnyConnect
Which two Cisco ISE components must be configured for BYOD? (Choose two.)
local WebAuth
central WebAuth
null WebAuth
guest
dual
Which system performs compliance checks and remote wiping?
MDM
ISE
AMP
OTP
An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?
single interface
multi-context
transparent
two-interface
A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)
RADIUS communication must be permitted between the ISE server and the domain controller.
The ISE account must be a domain administrator in Active Directory to perform JOIN operations.
Active Directory only supports user authentication by using MSCHAPv2.
LDAP communication must be permitted between the ISE server and the domain controller.
Active Directory supports user and machine authentication by using MSCHAPv2.
Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?
inter-EPG isolation
inter-VLAN security
intra-EPG isolation
placement in separate EPGs
Question