350-701 VOL2 Flashcards
Which of the following are the two primary offerings for the Cisco Stealthwatch Cloud product?
(Select two)
A. Public Cloud Monitoring
D. Private Network Monitoring
What are the three default guest account types in the Cisco Identity Services Engine (ISE)
solution? (Select three)
A. Contractor
C. Daily
Which of the following Cisco products gathers telemetry data from network elements to create
a baseline of normal activity so that it can automatically detect unusual behavior and alert
network administrators to take action?
D. Stealthwath
In the Cisco Email Security Appliance (ESA) gateway, what SenderBase Reputation Score is used
for a source that is most like to be a source of SPAM?
C. -10
You want to centralize the authentication aspects of your network devices and need to determine
if RADIUS or TACACS+ is right for your network. Which of the following statements are true
regarding the difference between the two? (Select two)
B. RADIUS encrypts only the password in the access request message, while TACACS+
encrypts the entire message.
C. RADIUS combines the authorization and authentication components of AAA, while
TACACS+ separates all three.
What would be the next 2 steps that you would prefer from the below 4 options.
B. Check the NAT statement on local firewall where the output is captured
D. Check for the reverse route on hosts & in between devices for the remote subnets.
Which Cisco product offers actionable cyberintelligence in the form of app risk ratings fueled by
the CyberLab as well as Community Trust Ratings, the crowdsourced assessment of cloud app
risk?
C. Cloudlock
As an administrator, you are required to deploy Cisco Web Secuity Appliance (WSA) for your
Organization. What are the various ways that you can use to deploy Cisco WSA? (Choose all that
apply)
B. Hardware Appliance
C. Virtual Machine
E. Amazon Public Cloud
On the basis of the output shown above, please confirm which statement is true.
B. The traffic is not getting encrypted on the host end.
A company uses O365 as their mail platform and for past few week, a lot of users are complaining
about their accounts getting compromised. What solution would you recommend to the
company to avoid user accounts from getting hacked.
D. Cisco Duo MFA
A company is concerned about the security of the network as lot of users uses their personal
mobiles to connect to the corporate wifi and this not only gives them access to the internet but
also to the internal hosts and applications. What solution would you recommend from the below
options that will secure the internal network and will not hamper. their internet connectivity.
C. Apply separation of traffic to block guest users from accessing internal hosts.
Cisco has a security product that continuously analyses network activities and creates a baseline
of normal network behavior and then uses this baseline, along with advanced machine learning
algorithms, to detect anomalies. Which product is it?
A. Cisco Secure Network Analytics
Cisco offers a cloud compliance solution that can be deployed within 5 minutes without
impacting the end users. This service covers Microsoft O365, Salesforce, Dropbox, ServiceNow
etc to name a few. Which solution is it?
D. Cisco Cloudlock
Cisco Meraki offers different types of VPN connectivity. Please select the options that are
supported on the Meraki MX series higher models. (Choose all that are applicable)
A. Auto VPN
B. Anyconnect VPN
E. L2TP
What are various flow data supported by the Cisco Stealthwatch? (Select two)
A. Netflow
B. IPFIX