Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 19 out of 52 pages Questions 181-190 out of 515 questions
Question#181

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)

  • A. asset inventory management
  • B. allowed application management
  • C. AD group policy management
  • D. network device management
  • E. critical device management
Discover Answer Hide Answer

AB

Question#182

What is the purpose of the My Devices Portal in a Cisco ISE environment?

  • A. to register new laptops and mobile devices
  • B. to manage and deploy antivirus definitions and patches on systems owned by the end user
  • C. to provision userless and agentless systems
  • D. to request a newly provisioned mobile device
Discover Answer Hide Answer

A

Question#183

Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?

  • A. Cisco Prime Infrastructure
  • B. Cisco ESA
  • C. Cisco WiSM
  • D. Cisco ISE
Discover Answer Hide Answer

D

Question#184

In which two ways does Easy Connect help control network access when used with Cisco TrustSec? (Choose two.)

  • A. It integrates with third-party products to provide better visibility throughout the network.
  • B. It allows for the assignment of Security Group Tags and does not require 802.1x to be configured on the switch or the endpoint.
  • C. It creates a dashboard in Cisco ISE that provides full visibility of all connected endpoints.
  • D. It allows for managed endpoints that authenticate to AD to be mapped to Security Groups (PassiveID).
  • E. It allows multiple security products to share information and work together to enhance security posture in the network.
Discover Answer Hide Answer

BD
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/trustsec-with-easy-connect-configuration-guide.pdf

Question#185

What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

  • A. Tetra Engine to detect malware when the endpoint is connected to the cloud
  • B. ClamAV Engine to perform email scanning
  • C. Spero Engine with machine learning to perform dynamic analysis
  • D. Ethos Engine to perform fuzzy fingerprinting
Discover Answer Hide Answer

D
Reference:
https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2016/pdf/BRKSEC-2139.pdf

Question#186

What is a benefit of conducting device compliance checks?

  • A. It validates if anti-virus software is installed.
  • B. It scans endpoints to determine if malicious activity is taking place.
  • C. It indicates what type of operating system is connecting to the network.
  • D. It detects email phishing attacks.
Discover Answer Hide Answer

A

Question#187

A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?

  • A. Context Visibility
  • B. Accounting Reports
  • C. Adaptive Network Control Policy List
  • D. RADIUS Live Logs
Discover Answer Hide Answer

D

Question#188

What is the role of an endpoint in protecting a user from a phishing attack?

  • A. Ensure that antivirus and antimalware software is up-to-date.
  • B. Use machine learning models to help identify anomalies and determine expected sending behavior.
  • C. Use Cisco Stealthwatch and Cisco ISE Integration.
  • D. Utilize 802.1X network security to ensure unauthorized access to resources.
Discover Answer Hide Answer

A

Question#189

Why is it important to implement MFA inside of an organization?

  • A. To prevent brute force attacks from being successful.
  • B. To prevent phishing attacks from being successful.
  • C. To prevent DoS attacks from being successful.
  • D. To prevent man-in-the-middle attacks from being successful.
Discover Answer Hide Answer

A

Question#190

Which posture assessment requirement provides options to the client for remediation within a certain timeframe?

  • A. audit
  • B. mandatory
  • C. visibility
  • D. optional
Discover Answer Hide Answer

B
Reference:
https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/admin_guide/b_ise_admin_guide_22/b_ise_admin_guide_22_chapter_010111.html

chevron rightPrevious Nextchevron right