350-701 VOL2 Flashcards

1
Q

Which of the following are the two primary offerings for the Cisco Stealthwatch Cloud product?
(Select two)

A

A. Public Cloud Monitoring
D. Private Network Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three default guest account types in the Cisco Identity Services Engine (ISE)
solution? (Select three)

A

A. Contractor
C. Daily

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following Cisco products gathers telemetry data from network elements to create
a baseline of normal activity so that it can automatically detect unusual behavior and alert
network administrators to take action?

A

D. Stealthwath

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the Cisco Email Security Appliance (ESA) gateway, what SenderBase Reputation Score is used
for a source that is most like to be a source of SPAM?

A

C. -10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You want to centralize the authentication aspects of your network devices and need to determine
if RADIUS or TACACS+ is right for your network. Which of the following statements are true
regarding the difference between the two? (Select two)

A

B. RADIUS encrypts only the password in the access request message, while TACACS+
encrypts the entire message.
C. RADIUS combines the authorization and authentication components of AAA, while
TACACS+ separates all three.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would be the next 2 steps that you would prefer from the below 4 options.

A

B. Check the NAT statement on local firewall where the output is captured
D. Check for the reverse route on hosts & in between devices for the remote subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Cisco product offers actionable cyberintelligence in the form of app risk ratings fueled by
the CyberLab as well as Community Trust Ratings, the crowdsourced assessment of cloud app
risk?

A

C. Cloudlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

As an administrator, you are required to deploy Cisco Web Secuity Appliance (WSA) for your
Organization. What are the various ways that you can use to deploy Cisco WSA? (Choose all that
apply)

A

B. Hardware Appliance
C. Virtual Machine
E. Amazon Public Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On the basis of the output shown above, please confirm which statement is true.

A

B. The traffic is not getting encrypted on the host end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A company uses O365 as their mail platform and for past few week, a lot of users are complaining
about their accounts getting compromised. What solution would you recommend to the
company to avoid user accounts from getting hacked.

A

D. Cisco Duo MFA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A company is concerned about the security of the network as lot of users uses their personal
mobiles to connect to the corporate wifi and this not only gives them access to the internet but
also to the internal hosts and applications. What solution would you recommend from the below
options that will secure the internal network and will not hamper. their internet connectivity.

A

C. Apply separation of traffic to block guest users from accessing internal hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cisco has a security product that continuously analyses network activities and creates a baseline
of normal network behavior and then uses this baseline, along with advanced machine learning
algorithms, to detect anomalies. Which product is it?

A

A. Cisco Secure Network Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco offers a cloud compliance solution that can be deployed within 5 minutes without
impacting the end users. This service covers Microsoft O365, Salesforce, Dropbox, ServiceNow
etc to name a few. Which solution is it?

A

D. Cisco Cloudlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco Meraki offers different types of VPN connectivity. Please select the options that are
supported on the Meraki MX series higher models. (Choose all that are applicable)

A

A. Auto VPN
B. Anyconnect VPN
E. L2TP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are various flow data supported by the Cisco Stealthwatch? (Select two)

A

A. Netflow
B. IPFIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Select the IOS type used by Cisco devices that supports SDWAN solution.

A

B. IOS-XE

17
Q

From the options given below, what are the components of the Cisco SDWAN solution? (Select
two)

A

A. vManage
B. vEdge