350-701 Flashcards
(160 cards)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)
simple custom detections
allowed applications
Which command enables 802.1X globally on a Cisco switch?
dot1x system-auth-control
What is the function of Cisco Cloudlock for data security?
data loss prevention
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)
Windows service
Windows firewall
What is a characteristic of Dynamic ARP Inspection?
DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the
DHCP snooping binding database.
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
AMP
Where are individual sites specified to be blacklisted in Cisco Umbrella?
destination lists
Which statement about IOS zone-based firewalls is true?
An interface can be assigned only to one zone.
Which two activities can be done using Cisco DNA Center? (Choose two.)
design
provision
Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?
Active Directory
Which VPN technology can support a multivendor environment and secure traffic between sites?
FlexVPN
Which SNMPv3 configuration must be used to support the strongest security possible?
asa-host(config)#snmp-server group myv3 v3 priv
asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX
asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Cisco Application Visibility and Control
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)
Install a spam and virus email filter.
Protect systems with an up-to-date antimalware program.
An engineer used a posture check on a Microsoft Windows endpoint and discovered that the MS17-010 patch was not installed, which left the endpoint vulnerable to WannaCry ransomware. Which two solutions mitigate the risk of this ransomware infection? (Choose two.)
Configure a posture policy in Cisco Identity Services Engine to install the MS17-010 patch before allowing access on the network.
Configure a posture policy in Cisco Identity Services Engine to check that an endpoint patch level is met before allowing access on the network.D. Configure endpoint firewall policies to stop the exploit traffic from being allowed to run and replicate throughout the network.
Why would a user choose an on-premises ESA versus the CES solution?
Sensitive data must remain onsite.
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
GET VPN
Which cloud service model offers an environment for cloud consumers to develop and deploy applications
without needing to manage or maintain the underlying cloud infrastructure?
PaaS
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?
Enable Intelligent Proxy.
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses andmalware? (Choose two.)
Sophos engine
outbreak filters
How is Cisco Umbrella configured to log only security events?
per policy
What is the primary difference between an Endpoint Protection Platform and an Endpoint Detection and Response?
EPP focuses on prevention, and EDR focuses on advanced threats that evade perimeter defenses.
On which part of the IT environment does DevSecOps focus?
application development
Which functions of an SDN architecture require southbound APIs to enable communication?
SDN controller and the network elements