Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 18 out of 52 pages Questions 171-180 out of 515 questions
Question#171

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

  • A. malware
  • B. denial-of-service attacks
  • C. ARP spoofing
  • D. exploits
  • E. eavesdropping
Discover Answer Hide Answer

AD

Question#172

Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?

  • A. It adds endpoints to identity groups dynamically
  • B. It allows the endpoint to authenticate with 802.1x or MAB
  • C. It allows CoA to be applied if the endpoint status is compliant
  • D. It verifies that the endpoint has the latest Microsoft security patches installed
Discover Answer Hide Answer

D

Question#173

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work?

  • A. SNMP
  • B. NMAP
  • C. DHCP
  • D. NetFlow
Discover Answer Hide Answer

C

Question#174

What is the benefit of installing Cisco AMP for Endpoints on a network?

  • A. It enables behavioral analysis to be used for the endpoints
  • B. It provides flow-based visibility for the endpoints' network connections.
  • C. It protects endpoint systems through application control and real-time scanning.
  • D. It provides operating system patches on the endpoints for security.
Discover Answer Hide Answer

C

Question#175

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

  • A. because defense-in-depth stops at the network
  • B. because human error or insider threats will still exist
  • C. to prevent theft of the endpoints
  • D. to expose the endpoint to more threats
Discover Answer Hide Answer

B

Question#176

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?

  • A. SNMP probe
  • B. CoA
  • C. external identity source
  • D. posture assessment
Discover Answer Hide Answer

B

Question#177

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

  • A. when there is a need to have more advanced detection capabilities
  • B. when there is no firewall on the network
  • C. when there is a need for traditional anti-malware detection
  • D. when there is no need to have the solution centrally managed
Discover Answer Hide Answer

A

Question#178

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)

  • A. RADIUS
  • B. TACACS+
  • C. DHCP
  • D. sFlow
  • E. SMTP
Discover Answer Hide Answer

AC
Reference:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_prof_pol.html

Question#179

What are two reasons for implementing a multifactor authentication solution such as Cisco Duo Security provide to an organization? (Choose two.)

  • A. single sign-on access to on-premises and cloud applications
  • B. identification and correction of application vulnerabilities before allowing access to resources
  • C. secure access to on-premises and cloud applications
  • D. integration with 802.1x security using native Microsoft Windows supplicant
  • E. flexibility of different methods of 2FA such as phone callbacks, SMS passcodes, and push notifications
Discover Answer Hide Answer

CE

Question#180

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

  • A. biometric factor
  • B. time factor
  • C. confidentiality factor
  • D. knowledge factor
  • E. encryption factor
Discover Answer Hide Answer

AD

chevron rightPrevious Nextchevron right