Topic 1: Exam Pool A
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
A. asset inventory management
B. allowed application management
C. Active Directory group policy management
D. network device management
E. critical device management
Explanation for Each Option:
A. asset inventory management (Correct):
Mobile Device Management (MDM) provides the ability to track and manage an organization’s device inventory, including details like device type, OS version, and ownership status. This enhances visibility and control over assets, making it a key advantage for device management. (Reference: Cisco Meraki MDM Asset Management.)
B. allowed application management (Correct):
MDM enables organizations to control which applications are allowed or blocked on devices, enforcing security policies and preventing unauthorized or malicious app usage. This capability ensures compliance and protects against threats, making it a significant advantage. (Reference: Cisco ISE MDM Application Control.)
C. Active Directory group policy management (Incorrect):
Active Directory (AD) group policy management is a feature of Windows Server, not MDM. While MDM can integrate with AD for user authentication, it does not directly manage AD group policies, rendering this option incorrect. (Reference: Cisco ISE AD Integration Guide.)
D. network device management (Incorrect):
MDM focuses on managing mobile devices (e.g., smartphones, tablets), not network devices like routers or switches. Network device management is handled by tools like Cisco DNA Center, not MDM, making this option irrelevant. (Reference: Cisco DNA Center Overview.)
E. critical device management (Incorrect):
"Critical device management" is not a standard MDM term. While MDM can prioritize certain devices, it does not specifically focus on "critical" devices as a distinct advantage; its benefits are broader, such as asset and app management, rendering this option incorrect. (Reference: Cisco MDM Best Practices.)
Additional Notes:
Leveraging MDM for device management is a key topic in the 350-701 SCOR exam under endpoint security. As of 12:35 PM PKT, October 03, 2025, asset and app control are core benefits.
Which two actions does the Cisco identity Services Engine posture module provide that
ensures endpoint security?(Choose two.)
A.
The latest antivirus updates are applied before access is allowed.
B.
Assignments to endpoint groups are made dynamically, based on endpoint attributes
C.
Patch management remediation is performed
D.
A centralized management solution is deployed
E.
Endpoint supplicant configuration is deployed
The latest antivirus updates are applied before access is allowed.
A centralized management solution is deployed
A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which command achieves this goal?
A. snmp-server host inside 10.255.255.1 version 3 myv7
B. snmp-server host inside 10.255.255.1 snmpv3 myv7
C. snmp-server host inside 10.255.255.1 version 3 asmith
D. snmp-server host inside 10.255.255.1 snmpv3 asmith
Explanation for Each Option:
A. snmp-server host inside 10.255.255.1 version 3 myv7 (Incorrect):
This command specifies the SNMP host at 10.255.255.1 with version 3 and uses "myv7" as the user or group, which does not match the configured SNMP user "asmith" with group "myv7." SNMPv3 requires the exact username (asmith) for authentication and privacy, making this option incorrect. (Reference: Cisco IOS SNMPv3 Configuration Guide, User Specification.)
B. snmp-server host inside 10.255.255.1 snmpv3 myv7 (Incorrect):
The syntax "snmpv3" is invalid; the correct keyword is "version 3." Additionally, "myv7" should be the group or context, not the username, and it does not align with the configured user "asmith." This misconfiguration prevents proper SNMP communication, rendering this option incorrect. (Reference: Cisco IOS Command Reference, SNMP Host Syntax.)
C. snmp-server host inside 10.255.255.1 version 3 asmith (Correct):
This command correctly specifies the SNMP host at 10.255.255.1 on the "inside" interface, uses version 3, and matches the configured SNMP user "asmith" (created with snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0xxxxxxxxx). This ensures the host receives SNMP traps or informs using the defined authentication and privacy settings, meeting the goal. (Reference: Cisco ASA SNMPv3 Host Configuration.)
D. snmp-server host inside 10.255.255.1 snmpv3 asmith (Incorrect):
Similar to option B, "snmpv3" is not the correct syntax; it should be "version 3." While "asmith" matches the username, the invalid keyword prevents the command from being recognized, failing to establish SNMP communication with the host, making this option incorrect. (Reference: Cisco IOS SNMP Command Syntax Guide.)
Additional Notes:
Configuring SNMPv3 for secure monitoring is a key topic in the 350-701 SCOR exam under network security. As of 11:30 AM PKT, October 03, 2025, proper user and host configuration is essential.
What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)
A. It is defined as a Transparent proxy deployment
B. In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.
C. The PAC file, which references the proxy, is deployed to the client web browser
D. It is defined as an Explicit proxy deployment
E. It is defined as a Bridge proxy deployment
Explanation
This question tests the understanding of how a Proxy Auto-Configuration (PAC) file is used with the Cisco Web Security Appliance (WSA).
C. The PAC file, which references the proxy, is deployed to the client web browser.
This is correct. The core function of a PAC file is to instruct the client's web browser on when and how to use a proxy server. The PAC file is a JavaScript file that contains logic (e.g., "For all URLs in my company's domain, connect directly; for all other URLs, use the proxy at proxy.company.com:8080"). This file must be distributed to and configured on each client web browser, either manually or, more commonly, through Group Policy.
D. It is defined as an Explicit proxy deployment.
This is correct. The use of a PAC file is a hallmark of an explicit (or explicit forward) proxy deployment. In this mode, the client is explicitly configured (either directly with the proxy's IP:port or via a PAC file) to be aware of the proxy and to send its HTTP/HTTPS traffic to it.
Why the other options are incorrect:
A. It is defined as a Transparent proxy deployment.
This is incorrect.A transparent proxy intercepts web traffic at the network level (e.g., using a WCCP or policy-based routing) without any configuration required on the client. The client is completely unaware of the proxy's existence. This is the direct opposite of a PAC file deployment, which requires explicit client configuration.
B. In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.
This is incorrect and misrepresents the function of a PAC file and a dual-NIC setup on the WSA. A dual-NIC configuration on the WSA (one internal, one external) is for network segmentation. The PAC file's only job is to tell the client the address of the proxy. It has no control over or knowledge of the internal network architecture of the proxy server itself.
E. It is defined as a Bridge proxy deployment.
This is incorrect."Bridge mode" is not a standard term for WSA proxy deployment. The primary deployment modes are Explicit (client-aware) and Transparent (client-unaware).
Reference
This distinction is fundamental in the Cisco WSA administration guide.
As per the Cisco Web Security Appliance Administration Guide, it clearly differentiates between deployment modes:
Explicit Forward Proxy: "The client is explicitly configured to use a proxy... This configuration can be done manually on the web browser or by using a Proxy Auto-Configuration (PAC) file."
Transparent Proxy: "The proxy is transparent to the client... No configuration is required on the client."
Therefore, the use of a PAC file is exclusively associated with an Explicit proxy deployment, and its purpose is to be deployed to the client browser.
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
A. multiple context mode
B. user deployment of Layer 3 networks
C. IPv6
D. clustering
Explanation
The Cisco Adaptive Security Virtual Appliance (ASAv) can be deployed in the AWS public cloud to provide stateful firewall capabilities and securely connect your Amazon Virtual Private Clouds (VPCs). The key to this question is understanding which features are supported in the specific context of a public cloud deployment like AWS.
B. user deployment of Layer 3 networks:
This is correct. A primary function of the ASAv in AWS is to route traffic between different subnets and VPCs, which is a Layer 3 function. Users can design and deploy network architectures where the ASAv acts as a gateway, inspecting and controlling traffic between different tiers (e.g., a public subnet and a private subnet) or even between different VPCs via VPC peering or Transit Gateway. This is a core supported use case.
Why the other options are incorrect:
A. multiple context mode:
This is not supported in a public cloud environment (AWS, Azure, GCP, etc.). Multiple context mode, which allows a single physical or virtual ASA to be partitioned into multiple, independent firewalls, is a feature restricted to on-premises deployments and is explicitly unsupported on the ASAv in cloud platforms.
C. IPv6:
This is not supported for the ASAv's own management interface or for traffic inspection within AWS. While AWS VPCs and many other services now support IPv6, the Cisco ASAv itself does not support IPv6 when deployed in any public cloud (AWS, Azure, or GCP). All configuration and traffic flow through the ASAv must be IPv4.
D. clustering:
This is not supported in a public cloud environment. Clustering, which combines multiple ASAv appliances into a single logical device for high availability and scalability, is an on-premises feature. In AWS, high availability for the ASAv is achieved using native cloud constructs like AWS Availability Zones (AZs) and Elastic Load Balancers, not through the ASA's native clustering technology.
Reference
This information is based on the official Cisco documentation for the ASAv. The "Cisco ASA Feature Licenses" table and the "ASAv Deployment Guide" for AWS explicitly list the supported and unsupported features.
Cisco ASA Series Feature Licenses (9.16):
This matrix clearly shows that "Multiple Context Mode" and "Clustering" are marked as "No" for the ASAv platform. It also typically notes the lack of IPv6 support in virtualized environments.
Cisco ASAv for AWS Deployment Guide:
This guide outlines the deployment models, which focus on Layer 3 routing and stateful inspection between subnets, confirming the supported feature of user-deployed Layer 3 networks.
In summary, when deploying an ASAv in AWS, you are using it as a virtual firewall/router to build and secure your cloud network, but you lose several advanced hardware-centric features like clustering and multiple contexts.
A Cisco ISE engineer configures Central Web Authentication (CWA) for wireless guest access and must have the guest endpoints redirect to the guest portal for authentication and authorization. While testing the policy, the engineer notices that the device is not redirected and instead gets full guest access. What must be done for the redirect to work?
A. Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.
B. Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit.
C. Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit.
D. Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit.]
Explanation for Each Option:
A. Tag the guest portal in the CWA part of the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit (Incorrect):
Tagging the guest portal in the CWA section of the authorization profile is not a valid configuration step in Cisco ISE for enabling redirection. The redirection is triggered by a Downloadable ACL (DACL) or specific ACL settings, not just a portal tag, making this option incorrect. (Reference: Cisco ISE CWA Deployment Guide, Authorization Profiles.)
B. Use the track movement option within the authorization profile for the authorization policy line that the unauthenticated devices hit (Incorrect):
The "track movement" option in ISE is used to monitor device mobility across network segments, not to enforce CWA redirection. It does not influence the guest portal redirect process, rendering this option irrelevant to the requirement. (Reference: Cisco ISE Device Tracking Configuration.)
C. Create an advanced attribute setting of Cisco:cisco-gateway-id=guest within the authorization profile for the authorization policy line that the unauthenticated devices hit (Incorrect):
The Cisco:cisco-gateway-id=guest attribute is used in some Cisco WLC configurations to identify a guest anchor controller, but it is not a standard ISE attribute for CWA redirection. Redirection requires a DACL or ACL to enforce the redirect, making this option incorrect. (Reference: Cisco WLC Guest Anchor Configuration.)
D. Add the DACL name for the Airespace ACL configured on the WLC in the Common Tasks section of the authorization profile for the authorization policy line that the unauthenticated devices hit (Correct):
For CWA with wireless guest access, ISE must send a Downloadable ACL (DACL) or reference an Airespace ACL configured on the Wireless LAN Controller (WLC) to redirect unauthenticated devices to the guest portal. Adding the DACL name in the authorization profile’s Common Tasks section ensures the WLC enforces the redirect, fixing the issue of full guest access without authentication. (Reference: Cisco ISE CWA with WLC Integration Guide, DACL Configuration.)
Additional Notes:
Configuring CWA for wireless guest access is a key topic in the 350-701 SCOR exam under endpoint security. As of 10:55 AM PKT, October 03, 2025, proper DACL setup is critical for redirection. For details, refer to the Cisco ISE Administration Guide (cisco.com) and the 350-701 Exam Blueprint (Section 2.0 Endpoint Security)
Which Cisco solution extends network visibility, threat detection, and analytics to public
cloud environments?
A.
Cisco Umbrella
B.
Cisco Stealthwatch Cloud
C.
Cisco Appdynamics
D.
Cisco CloudLock
Cisco Stealthwatch Cloud
An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?
A. Cisco Firepower
B. Cisco Umbrella
C. ISE
D. AMP
Explanation for Each Option:
A. Cisco Firepower (Incorrect):
Cisco Firepower, including its Next-Generation Firewall (NGFW) and Intrusion Prevention System (IPS), provides deep packet inspection and application control to block malicious destinations and applications after a connection is established. However, it does not primarily prevent connections before they are established, which is the focus of the Defense in Depth requirement, making this less suitable. (Reference: Cisco Firepower Configuration Guide.)
B. Cisco Umbrella (Correct):
Cisco Umbrella is a cloud-delivered security service that blocks malicious destinations at the DNS layer before a connection is established, enhancing Defense in Depth. It also supports application visibility and control, allowing the organization to block specific applications by restricting associated domains, aligning perfectly with the goal of preemptive blocking. (Reference: Cisco Umbrella Datasheet, DNS Security.)
C. ISE (Incorrect):
Cisco Identity Services Engine (ISE) focuses on network access control, authentication, and policy enforcement based on user and device identity. While it can enforce policies, it does not block malicious destinations prior to connection establishment or provide application blocking at the DNS level, making it unsuitable for this specific requirement. (Reference: Cisco ISE Overview.)
D. AMP (Incorrect):
Cisco Advanced Malware Protection (AMP), available for endpoints and networks, detects and blocks malware post-infection or post-connection using file analysis and behavioral monitoring. It does not prevent connections to malicious destinations before they are established, nor does it focus on application blocking at the network edge, rendering this option incorrect. (Reference: Cisco AMP for Endpoints Datasheet.)
Additional Notes:
Improving Defense in Depth with Cisco Umbrella is a key topic in the 350-701 SCOR exam under content security. As of 12:15 PM PKT, October 02, 2025, its DNS-based approach is ideal for preemptive blocking.
An engineer is implementing Cisco CES in an existing Microsoft Office 365 environment
and must route inbound email to Cisco CE.. record must be modified to accomplish this
task?
A.
CNAME
B.
MX
C.
SPF
D.
DKIM
MX
Which Cisco AMP file disposition valid?
A.
pristine
B.
malware
C.
dirty
D.
non malicious
malware
An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed through the Cisco Umbrella network. Which action tests the routing?
A.
Ensure that the client computers are pointing to the on-premises DNS servers.
B.
Enable the Intelligent Proxy to validate that traffic is being routed correctly.
C.
Add the public IP address that the client computers are behind to a Core Identity.
D.
Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
Browse to http://welcome.umbrella.com/ to validate that the new identity is working.
What is a difference between Cisco AMP for Endpoints and Cisco Umbrella?
A. Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.
B. Cisco AMP for Endpoints prevents connections to malicious destinations, and C malware.
C. Cisco AMP for Endpoints automatically researches indicators of compromise ..
D. Cisco AMP for Endpoints prevents, detects, and responds to attacks before and against Internet threats.
Explanation:
This option correctly captures the core function of AMP for Endpoints, which is endpoint protection. Let's break down the full comparison to understand the difference.
D) is CORRECT.
Cisco AMP for Endpoints is installed directly on endpoints (computers, servers). It provides:
Prevention: Blocks known malicious files and exploits.
Detection: Uses behavioral analysis and global threat intelligence to detect suspicious activity.
Response: Its key feature is retrospective security. It can go back in time to see every file and process, allowing it to detect and remediate a threat that initially evaded detection after it has been discovered.
Why the other options are incorrect:
A) Cisco AMP for Endpoints is a cloud-based service, and Cisco Umbrella is not.
This is INCORRECT. Both have a strong cloud component. AMP for Endpoints can be managed via a cloud console, and its intelligence is cloud-derived. Cisco Umbrella is a cloud-native service and is the definition of a Security as a Service (SaaS) offering.
B) Cisco AMP for Endpoints prevents connections to malicious destinations, and Cisco Umbrella blocks malware. This is BACKWARDS and INCORRECT.
Cisco Umbrella is a secure internet gateway that prevents connections to malicious destinations by blocking DNS resolutions of known-bad domains and IPs before a connection is even made.
Cisco AMP for Endpoints is an advanced antivirus/EDR solution that blocks malware from executing on the device and analyzes file behavior.
C) Cisco AMP for Endpoints automatically researches indicators of compromise.
This is INCORRECT. The automatic research of Indicators of Compromise (IoCs) on a global scale is the primary function of Cisco Talos, Cisco's threat intelligence organization. Talos provides the intelligence that powers both AMP and Umbrella, but the products themselves consume this intelligence; they are not the primary researchers.
Core Difference Summary:
Cisco Umbrella: Operates at the DNS and network layer. It's the first line of defense, blocking requests to malicious sites before malware is ever downloaded.
Cisco AMP for Endpoints: Operates at the endpoint layer. It's the last line of defense, analyzing and blocking files that have reached the device, and providing deep visibility and response capabilities.
Reference:
Cisco Security Portfolio Architecture: The official architecture positions Umbrella as the "first line of defense" in the network and AMP for Endpoints as the "last line of defense" on the endpoint.
| Page 21 out of 61 Pages |
| Previous |