exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 289 discussion

Actual exam question from Cisco's 350-701
Question #: 289
Topic #: 1
[All 350-701 Questions]

What is a benefit of performing device compliance?

  • A. providing multi-factor authentication
  • B. verification of the latest OS patches
  • C. providing attribute-driven policies
  • D. device classification and authorization
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ums008
1 year ago
Selected Answer: B
I believe B is Correct: Performing device compliance checks offers the benefit of verifying the latest operating system (OS) patches on devices. Device compliance ensures that devices within an organization's network adhere to the required security standards and policies, including patch management. By checking the compliance status of devices, organizations can identify if the devices have the latest OS patches installed. This is crucial for maintaining a secure network environment, as OS patches often address known vulnerabilities and security weaknesses. Regularly verifying the latest patches helps mitigate the risk of exploitation and potential security breaches. Option C, providing attribute-driven policies, refers to the capability of tailoring security policies based on specific attributes of the devices or users, but it is not a specific benefit of device compliance.
upvoted 4 times
...
Cokamaniako
1 year ago
Selected Answer: C
amswer C ovides a rule-based, ATTRIBUTE-DRIVEN POLICY model for flexible and business-relevant access control policies. https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html
upvoted 1 times
...
DWizard
1 year ago
Selected Answer: C
Already explained, the right one is C
upvoted 1 times
...
SegaMasterSystemAdmin
1 year, 1 month ago
Selected Answer: B
B is the answer
upvoted 2 times
...
Jessie45785
1 year, 3 months ago
Selected Answer: C
I work with ISE on daily basis and @NikoNiko gots a point here, most important feture of ISE is: Provides a rule-based, ATTRIBUTE-DRIVEN POLICY model for flexible and business-relevant access control policies. https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html
upvoted 2 times
...
ddev3737
1 year, 5 months ago
I agree after all with NikoNiko
upvoted 1 times
...
4000000
1 year, 8 months ago
B & d both near correct but B is the answer as why to do compliance check ??? It is only b
upvoted 1 times
...
sis_net_sec
1 year, 9 months ago
Selected Answer: A
https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html
upvoted 1 times
...
NikoNiko
2 years ago
ISE is performing device compliance checks and one of ISE main features according to datasheet is: Rich contextual identity and business-policy, which means: ● Provides a rule-based, ATTRIBUTE-DRIVEN POLICY model for flexible and business-relevant access control policies. ● Includes attributes such as user and endpoint identity, posture validation, authentication protocols, device identity, and other external attributes. These attributes can be created dynamically and saved for later use. https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html So Attribute-driven policy is the correct answer.
upvoted 3 times
fguzalf
1 year, 3 months ago
● Performs posture assessments to endpoints connected to the network. ● Enforces the appropriate compliance policies for endpoints through a persistent client-based agent, a temporal agent, or a query to an external MDM/EMM. ● Provides the ability to create powerful policies that include, but are not limited to, checks for the latest OS patch, antivirus and antispyware packages with current definition file variables (version, date, etc.), antimalware packages, registry settings (key, value, etc.), patch management, disk encryption, mobile PIN-lock, rooted or jailbroken status, application presence, and USB-attached media. https://www.cisco.com/c/en/us/products/collateral/security/identity-services-engine/data_sheet_c78-656174.html Answer: B
upvoted 1 times
...
Allfreen
1 year, 12 months ago
question is about the benefit of performing, So i belive B is correct
upvoted 2 times
...
...
MoII
2 years, 7 months ago
Voting for B here
upvoted 2 times
...
jaciro11
2 years, 7 months ago
Compliance its not only OS verification: I think is Classification like: Compliant not-compliant unknow. Also after that permit or not the Authorization to access to the network.
upvoted 3 times
...
ic0deem
2 years, 8 months ago
B and D sound both good to me..
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...