Cisco 350-701 Practice Test - Questions Answers, Page 9
List of questions
Question 81

In which cloud services model is the tenant responsible for virtual machine OS patching?
IaaS
UCaaS
PaaS
SaaS
Explanation:
Only in On-site (on-premises) and IaaS we (tenant) manage O/S (Operating System).
Question 82

Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
PaaS
XaaS
IaaS
SaaS
Explanation:
Cloud computing can be broken into the following three basic models:
+ Infrastructure as a Service (IaaS): IaaS describes a cloud solution where you are renting infrastructure. You purchase virtual power to execute your software as needed. This is much like running a virtual server on your own equipment, except you are now running a virtual server on a virtual disk. This model is similar to a utility company model because you pay for what you use.
+ Platform as a Service (PaaS): PaaS provides everything except applications. Services provided by this model include all phases of the system development life cycle (SDLC) and can use application programming interfaces (APIs), website portals, or gateway software. These solutions tend to be proprietary, which can cause problems if the customer moves away from the provider's platform.
+ Software as a Service (SaaS): SaaS is designed to provide a complete packaged solution. The software is rented out to the user. The service is usually provided through some type of front end or web portal. While the end user is free to use the service from anywhere, the company pays a peruse fee.
Reference: CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide
Question 83

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?
It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
It discovers and controls cloud apps that are connected to a company's corporate environment.
It deletes any application that does not belong in the network.
It sends the application information to an administrator to act on.
Question 84

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Nexus
Stealthwatch
Firepower
Tetration
Question 85

In a PaaS model, which layer is the tenant responsible for maintaining and patching?
hypervisor
virtual machine
network
application
Question 86

On which part of the IT environment does DevSecOps focus?
application development
wireless network
data center
perimeter network
Question 87

What is the function of Cisco Cloudlock for data security?
data loss prevention
controls malicious cloud apps
detects anomalies
user and entity behavior analytics
Question 88

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
Cisco Identity Services Engine and AnyConnect Posture module
Cisco Stealthwatch and Cisco Identity Services Engine integration
Cisco ASA firewall with Dynamic Access Policies configured
Cisco Identity Services Engine with PxGrid services enabled
Question 89

An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?
Port Bounce
CoA Terminate
CoA Reauth
CoA Session Query
Question 90

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two)
RADIUS
TACACS+
DHCP
sFlow
SMTP
Question