ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 40

Question list
Search
Search

Which type of attack is MFA an effective deterrent for?

A.

ping of death

A.

ping of death

Answers
B.

phishing

B.

phishing

Answers
C.

teardrop

C.

teardrop

Answers
D.

syn flood

D.

syn flood

Answers
Suggested answer: B

Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?

A.

Cisco AMP for Endpoints

A.

Cisco AMP for Endpoints

Answers
B.

Cisco AnyConnect

B.

Cisco AnyConnect

Answers
C.

Cisco Umbrella

C.

Cisco Umbrella

Answers
D.

Cisco Duo

D.

Cisco Duo

Answers
Suggested answer: A

Which two actions does the Cisco Identity Services Engine posture module provide that ensures endpoint security? (Choose two.)

A.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

A.

Assignments to endpoint groups are made dynamically, based on endpoint attributes.

Answers
B.

Endpoint supplicant configuration is deployed.

B.

Endpoint supplicant configuration is deployed.

Answers
C.

A centralized management solution is deployed.

C.

A centralized management solution is deployed.

Answers
D.

Patch management remediation is performed.

D.

Patch management remediation is performed.

Answers
E.

The latest antivirus updates are applied before access is allowed.

E.

The latest antivirus updates are applied before access is allowed.

Answers
Suggested answer: A, D

What is an advantage of the Cisco Umbrella roaming client?

A.

the ability to see all traffic without requiring TLS decryption

A.

the ability to see all traffic without requiring TLS decryption

Answers
B.

visibility into IP-based threats by tunneling suspicious IP connections

B.

visibility into IP-based threats by tunneling suspicious IP connections

Answers
C.

the ability to dynamically categorize traffic to previously uncategorized sites

C.

the ability to dynamically categorize traffic to previously uncategorized sites

Answers
D.

visibility into traffic that is destined to sites within the office environment

D.

visibility into traffic that is destined to sites within the office environment

Answers
Suggested answer: C

Which Cisco platform provides an agentless solution to provide visibility across the network including encrypted traffic analytics to detect malware in encrypted traffic without the need for decryption?

A.

Cisco Advanced Malware Protection

A.

Cisco Advanced Malware Protection

Answers
B.

Cisco Stealthwatch

B.

Cisco Stealthwatch

Answers
C.

Cisco Identity Services Engine

C.

Cisco Identity Services Engine

Answers
D.

Cisco AnyConnect

D.

Cisco AnyConnect

Answers
Suggested answer: B

Which two Cisco ISE components must be configured for BYOD? (Choose two.)

A.

local WebAuth

A.

local WebAuth

Answers
B.

central WebAuth

B.

central WebAuth

Answers
C.

null WebAuth

C.

null WebAuth

Answers
D.

guest

D.

guest

Answers
E.

dual

E.

dual

Answers
Suggested answer: B, D

Which system performs compliance checks and remote wiping?

A.

MDM

A.

MDM

Answers
B.

ISE

B.

ISE

Answers
C.

AMP

C.

AMP

Answers
D.

OTP

D.

OTP

Answers
Suggested answer: A

An engineer is configuring Cisco WSA and needs to enable a separated email transfer flow from the Internet and from the LAN. Which deployment mode must be used to accomplish this goal?

A.

single interface

A.

single interface

Answers
B.

multi-context

B.

multi-context

Answers
C.

transparent

C.

transparent

Answers
D.

two-interface

D.

two-interface

Answers
Suggested answer: D

A network engineer is tasked with configuring a Cisco ISE server to implement external authentication against Active Directory. What must be considered about the authentication requirements? (Choose two.)

A.

RADIUS communication must be permitted between the ISE server and the domain controller.

A.

RADIUS communication must be permitted between the ISE server and the domain controller.

Answers
B.

The ISE account must be a domain administrator in Active Directory to perform JOIN operations.

B.

The ISE account must be a domain administrator in Active Directory to perform JOIN operations.

Answers
C.

Active Directory only supports user authentication by using MSCHAPv2.

C.

Active Directory only supports user authentication by using MSCHAPv2.

Answers
D.

LDAP communication must be permitted between the ISE server and the domain controller.

D.

LDAP communication must be permitted between the ISE server and the domain controller.

Answers
E.

Active Directory supports user and machine authentication by using MSCHAPv2.

E.

Active Directory supports user and machine authentication by using MSCHAPv2.

Answers
Suggested answer: B, C

Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?

A.

inter-EPG isolation

A.

inter-EPG isolation

Answers
B.

inter-VLAN security

B.

inter-VLAN security

Answers
C.

intra-EPG isolation

C.

intra-EPG isolation

Answers
D.

placement in separate EPGs

D.

placement in separate EPGs

Answers
Suggested answer: C

Explanation:


Total 631 questions
Go to page: of 64