Free 350-701 Exam Braindumps

Pass your Implementing and Operating Cisco Security Core Technologies exam with these free Questions and Answers

Page 8 of 122
QUESTION 31

- (Exam Topic 1)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two)

  1. A. biometric factor
  2. B. time factor
  3. C. confidentiality factor
  4. D. knowledge factor
  5. E. encryption factor

Correct Answer: AD
Reference: https://www.cisco.com/c/en/us/products/security/what-is-multi-factor-authentication.htmlThe two most popular authentication factors are knowledge and inherent (including biometrics like fingerprint,face, and retina scans. Biometrics is used commonly in mobile devices).

QUESTION 32

- (Exam Topic 3)
What is a description of microsegmentation?

  1. A. Environments apply a zero-trust model and specify how applications on different servers or containers can communicate
  2. B. Environments deploy a container orchestration platform, such as Kubernetes, to manage the application delivery
  3. C. Environments implement private VLAN segmentation to group servers with similar applications.
  4. D. Environments deploy centrally managed host-based firewall rules on each server or container

Correct Answer: A

QUESTION 33

- (Exam Topic 3)
An engineer is adding a Cisco DUO solution to the current TACACS+ deployment using Cisco ISE. The engineer wants to authenticate users using their account when they log into network devices. Which action accomplishes this task?

  1. A. Configure Cisco DUO with the external Active Directory connector and tie it to the policy set within Cisco ISE.
  2. B. Install and configure the Cisco DUO Authentication Proxy and configure the identity source sequence within Cisco ISE
  3. C. Create an identity policy within Cisco ISE to send all authentication requests to Cisco DUO.
  4. D. Modify the current policy with the condition MFASourceSequence DUO=true in the authorization conditions within Cisco ISE

Correct Answer: B

QUESTION 34

- (Exam Topic 3)
Which two parameters are used for device compliance checks? (Choose two.)

  1. A. endpoint protection software version
  2. B. Windows registry values
  3. C. DHCP snooping checks
  4. D. DNS integrity checks
  5. E. device operating system version

Correct Answer: CE

QUESTION 35

- (Exam Topic 2)
Drag and drop the descriptions from the left onto the correct protocol versions on the right.
350-701 dumps exhibit
Solution:
Graphical user interface Description automatically generated with low confidence

Does this meet the goal?

  1. A. Yes
  2. B. No

Correct Answer: A

Page 8 of 122

Post your Comments and Discuss Cisco 350-701 exam with other Community members: