Free 350-701 Exam Braindumps (page: 49)

Page 49 of 153

What is the purpose of the My Devices Portal in a Cisco ISE environment?

  1. to register new laptops and mobile devices
  2. to request a newly provisioned mobile device
  3. to provision userless and agentless systems
  4. to manage and deploy antivirus definitions and patches on systems owned by the end user

Answer(s): A

Explanation:

Depending on your company policy, you might be able to use your mobile phones, tablets, printers, Internet radios, and other network devices on your company's network. You can use the My Devices portal to register and manage these devices on your company's network.


Reference:

https://www.cisco.com/c/en/us/td/docs/security/ise/2- 4/mydevices/b_mydevices_2x.html



Refer to the exhibit.



An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained.
Which command should be configured on the switch interface in order to provide the user with network connectivity?

  1. ip dhcp snooping verify mac-address
  2. ip dhcp snooping limit 41
  3. ip dhcp snooping vlan 41
  4. ip dhcp snooping trust

Answer(s): D

Explanation:

To understand DHCP snooping we need to learn about DHCP spoofing attack first.

DHCP spoofing is a type of attack in that the attacker listens for DHCP Requests from clients and answers them with fake DHCP Response before the authorized DHCP Response comes to the clients. The fake DHCP Response often gives its IP address as the client default gateway -> all the traffic sent from the client will go through the attacker computer, the attacker becomes a "man-in-the-middle". The attacker can have some ways to make sure its fake DHCP Response arrives first. In fact, if the attacker is "closer" than the DHCP Server then he doesn't need to do anything. Or he can DoS the DHCP Server so that it can't send the DHCP Response.
DHCP snooping can prevent DHCP spoofing attacks. DHCP snooping is a Cisco Catalyst feature that determines which switch ports can respond to DHCP requests. Ports are identified as trusted and untrusted.

Only ports that connect to an authorized DHCP server are trusted, and allowed to send all types of DHCP
messages. All other ports on the switch are untrusted and can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down. The port connected to a DHCP server should be configured as trusted port with the "ip dhcp snooping trust" command. Other ports connecting to hosts are untrusted ports by default. In this question, we need to configure the uplink to "trust" (under interface Gi1/0/1) as shown below.



What is the purpose of the certificate signing request when adding a new certificate for a server?

  1. It is the password for the certificate that is needed to install it with.
  2. It provides the server information so a certificate can be created and signed
  3. It provides the certificate client information so the server can authenticate against it when installing
  4. It is the certificate that will be loaded onto the server

Answer(s): B

Explanation:

A certificate signing request (CSR) is one of the first steps towards getting your own SSL Certificate. Generated on the same server you plan to install the certificate on, the CSR contains information (e.g. common name, organization, country) that the Certificate Authority (CA) will use to create your certificate. It also contains the public key that will be included in your certificate and is signed with the corresponding private key



What is the Cisco API-based broker that helps reduce compromises, application risks, and data breaches in an environment that is not on-premise?

  1. Cisco Cloudlock
  2. Cisco Umbrella
  3. Cisco AMP
  4. Cisco App Dynamics

Answer(s): A

Explanation:

Cisco Cloudlock is a cloud-native cloud access security broker (CASB) that helps you move to the cloud safely.
It protects your cloud users, data, and apps. Cisco Cloudlock provides visibility and compliance checks,
protects data against misuse and exfiltration, and provides threat protections against malware like ransomware.



Page 49 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote