PrepAway - Latest Free Exam Questions & Answers

Category: 350-701

Which of the following is not an example of a knowledge factor in an MFA environment?

Which of the following is not an example of a knowledge factor in an MFA environment? A. your workstation’s location B. a PIN C. a password D. your mother’s maiden name Explanation: Your workstation’s location is an example of a location-based factor, not a knowledge factor, in a multifactor authentication (MFA) environment. Three authentication factors […]

You want to use an RSA SecureID identity store to access Cisco ISE administratively.

You want to use an RSA SecureID identity store to access Cisco ISE administratively. Which of the following will you configure? A. external authentication and internal authorization B. internal authentication and external authorization C. internal authentication and authorization D. external authentication and authorization Explanation: You will configure external authentication and internal authorization for Cisco Identity […]

Which of the following best describes interpacket variation data that is collected by Cisco Tetration Analytic

Which of the following best describes interpacket variation data that is collected by Cisco Tetration Analytics? A. It includes variation in buffer utilization and is derived outside the packet header. B. It contains information about endpoints, when a flow started, and the length of a flow. C. It provides application visibility and generates microsegmentation policy. […]

Which of the following is used to describe a method of transferring traffic by using legitimate communication

Which of the following is used to describe a method of transferring traffic by using legitimate communication channels? A. an open channel B. an overt channel C. a covert channel D. a back door channel Explanation: An overt channel is a method of sending traffic by using legitimate communication channels. An overt channel is a […]

Which of the following statements is accurate about the Optimized web proxy cache mode on a Cisco WSA?

Which of the following statements is accurate about the Optimized web proxy cache mode on a Cisco WSA? A. It caches negative responses. B. It performs the least caching of all the modes. C. It allows customization of caching parameters. D. It performs the most caching of all the modes. Explanation: The Optimized web proxy […]

Which of the following Cisco Cloudlock custom policy categories monitors content based on a regular expression

Which of the following Cisco Cloudlock custom policy categories monitors content based on a regular expression that is created by an administrator? A. Custom Regex B. Event Analysis C. Context-Only D. Salesforce Report Export Activity Explanation: Of the available choices, the Cisco Cloudlock Custom Regex custom policy category monitors content based on a regular expression […]

Which of the following is a cloud computing deployment model that shares infrastructure with multiple organiza

Which of the following is a cloud computing deployment model that shares infrastructure with multiple organizations that have common needs? A. private B. community C. hybrid D. public Explanation: Community is a cloud computing deployment model that shares infrastructure with multiple organizations that have common needs. Hybrid can use a mixture of public and private […]

Which solution integrates with Cisco Umbrella to provide file reputation services?

Which solution integrates with Cisco Umbrella to provide file reputation services? A. AnyConnect B. AMP C. SafeSearch D. OpenDNS E. Talos Explanation: Advanced Malware Protection (AMP) integrates with Cisco Umbrella to provide file reputation services as well as file sandboxing and retrospective file analysis. The file reputation service that is used by AMP attempts to […]


Page 5 of 6« First...23456