Vcehome > Cisco > CCNP Security > 350-701 > 350-701 Online Practice Questions and Answers

350-701 Online Practice Questions and Answers

Questions 4

An engineer needs a solution for TACACS+ authentication and authorization for device administration.

The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?

A. Cisco Prime Infrastructure

B. Cisco Identity Services Engine

C. Cisco Stealthwatch

D. Cisco AMP for Endpoints

Browse 655 Q&As
Questions 5

Refer to the exhibit.

Which command was used to display this output?

A. show dot1x all

B. show dot1x

C. show dot1x all summary

D. show dot1x interface gi1/0/12

Browse 655 Q&As
Questions 6

What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

A. biometric factor

B. time factor

C. confidentiality factor

D. knowledge factor

E. encryption factor

Browse 655 Q&As
Questions 7

Which ID store requires that a shadow user be created on Cisco ISE for the admin login to work?

A. RSA SecureID

B. Internal Database

C. Active Directory

D. LDAP

Browse 655 Q&As
Questions 8

How many interfaces per bridge group does an ASA bridge group deployment support?

A. up to 2

B. up to 4

C. up to 8

D. up to 16

Browse 655 Q&As
Questions 9

Which technology limits communication between nodes on the same network segment to individual applications?

A. serverless infrastructure

B. microsegmentation

C. SaaS deployment

D. machine-to-machine firewalling

Browse 655 Q&As
Questions 10

What do tools like Jenkins, Octopus Deploy, and Azure DevOps provide in terms of application and infrastructure automation?

A. continuous integration and continuous deployment

B. cloud application security broker

C. compile-time instrumentation

D. container orchestration

Browse 655 Q&As
Questions 11

Why is it important to have a patching strategy for endpoints?

A. to take advantage of new features released with patches

B. so that functionality is increased on a faster scale when it is used

C. so that known vulnerabilities are targeted and having a regular patch cycle reduces risks

D. so that patching strategies can assist with disabling nonsecure protocols in applications

Browse 655 Q&As
Questions 12

What does Cisco AMP for Endpoints use to help an organization detect different families of malware?

A. Ethos Engine to perform fuzzy fingerprinting

B. Tetra Engine to detect malware when me endpoint is connected to the cloud

C. Clam AV Engine to perform email scanning

D. Spero Engine with machine learning to perform dynamic analysis

Browse 655 Q&As
Questions 13

What is an attribute of the DevSecOps process?

A. mandated security controls and check lists

B. security scanning and theoretical vulnerabilities

C. development security

D. isolated security team

Browse 655 Q&As
Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
Last Update: May 04, 2024
Questions: 655 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99