Cisco 350-701 Practice Test - Questions Answers, Page 52
Related questions
Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)
NTLMSSP
Kerberos
CHAP
TACACS+
RADIUS
Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?
lastSyncTime and pid
POST and name
userSudiSerialNos and devicelnfo
GET and serialNumber
What is a benefit of using Cisco Umbrella?
DNS queries are resolved faster.
Attacks can be mitigated before the application connection occurs.
Files are scanned for viruses before they are allowed to run.
It prevents malicious inbound traffic.
Which solution allows an administrator to provision, monitor, and secure mobile devices on Windows and Mac computers from a centralized dashboard?
Cisco Umbrella
Cisco AMP for Endpoints
Cisco ISE
Cisco Stealthwatch
What is the term for the concept of limiting communication between applications or containers on the same node?
container orchestration
software-defined access
microservicing
microsegmentation
Which Cisco platform onboards the endpoint and can issue a CA signed certificate while also automatically configuring endpoint network settings to use the signed endpoint certificate, allowing the endpoint to gain network access?
Cisco ISE
Cisco NAC
Cisco TACACS+
Cisco WSA
What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)
REST uses methods such as GET, PUT, POST, and DELETE.
REST codes can be compiled with any programming language.
REST is a Linux platform-based architecture.
The POST action replaces existing data at the URL path.
REST uses HTTP to send a request to a web service.
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
IaC
SaaS
IaaS
PaaS
Which characteristic is unique to a Cisco WSAv as compared to a physical appliance?
supports VMware vMotion on VMware ESXi
requires an additional license
performs transparent redirection
supports SSL decryption
An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)
Specify the NTP version
Configure the NTP stratum
Set the authentication key
Choose the interface for syncing to the NTP server
Set the NTP DNS hostname
Question