ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 52

Question list
Search
Search

Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)

A.

NTLMSSP

A.

NTLMSSP

Answers
B.

Kerberos

B.

Kerberos

Answers
C.

CHAP

C.

CHAP

Answers
D.

TACACS+

D.

TACACS+

Answers
E.

RADIUS

E.

RADIUS

Answers
Suggested answer: A, B

Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?

A.

lastSyncTime and pid

A.

lastSyncTime and pid

Answers
B.

POST and name

B.

POST and name

Answers
C.

userSudiSerialNos and devicelnfo

C.

userSudiSerialNos and devicelnfo

Answers
D.

GET and serialNumber

D.

GET and serialNumber

Answers
Suggested answer: D

What is a benefit of using Cisco Umbrella?

A.

DNS queries are resolved faster.

A.

DNS queries are resolved faster.

Answers
B.

Attacks can be mitigated before the application connection occurs.

B.

Attacks can be mitigated before the application connection occurs.

Answers
C.

Files are scanned for viruses before they are allowed to run.

C.

Files are scanned for viruses before they are allowed to run.

Answers
D.

It prevents malicious inbound traffic.

D.

It prevents malicious inbound traffic.

Answers
Suggested answer: B

Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?

A.

Cisco Umbrella

A.

Cisco Umbrella

Answers
B.

Cisco AMP for Endpoints

B.

Cisco AMP for Endpoints

Answers
C.

Cisco ISE

C.

Cisco ISE

Answers
D.

Cisco Stealthwatch

D.

Cisco Stealthwatch

Answers
Suggested answer: C

What is the term for the concept of limiting communication between applications or containers on the same node?

A.

container orchestration

A.

container orchestration

Answers
B.

software-defined access

B.

software-defined access

Answers
C.

microservicing

C.

microservicing

Answers
D.

microsegmentation

D.

microsegmentation

Answers
Suggested answer: D

Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?

A.

Cisco ISE

A.

Cisco ISE

Answers
B.

Cisco NAC

B.

Cisco NAC

Answers
C.

Cisco TACACS+

C.

Cisco TACACS+

Answers
D.

Cisco WSA

D.

Cisco WSA

Answers
Suggested answer: A

What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)

A.

REST uses methods such as GET, PUT, POST, and DELETE.

A.

REST uses methods such as GET, PUT, POST, and DELETE.

Answers
B.

REST codes can be compiled with any programming language.

B.

REST codes can be compiled with any programming language.

Answers
C.

REST is a Linux platform-based architecture.

C.

REST is a Linux platform-based architecture.

Answers
D.

The POST action replaces existing data at the URL path.

D.

The POST action replaces existing data at the URL path.

Answers
E.

REST uses HTTP to send a request to a web service.

E.

REST uses HTTP to send a request to a web service.

Answers
Suggested answer: A, E

Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?

A.

IaC

A.

IaC

Answers
B.

SaaS

B.

SaaS

Answers
C.

IaaS

C.

IaaS

Answers
D.

PaaS

D.

PaaS

Answers
Suggested answer: B

Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?

A.

supports VMware vMotion on VMware ESXi

A.

supports VMware vMotion on VMware ESXi

Answers
B.

requires an additional license

B.

requires an additional license

Answers
C.

performs transparent redirection

C.

performs transparent redirection

Answers
D.

supports SSL decryption

D.

supports SSL decryption

Answers
Suggested answer: A

An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)

A.

Specify the NTP version

A.

Specify the NTP version

Answers
B.

Configure the NTP stratum

B.

Configure the NTP stratum

Answers
C.

Set the authentication key

C.

Set the authentication key

Answers
D.

Choose the interface for syncing to the NTP server

D.

Choose the interface for syncing to the NTP server

Answers
E.

Set the NTP DNS hostname

E.

Set the NTP DNS hostname

Answers
Suggested answer: C, D
Total 631 questions
Go to page: of 64