exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 178 discussion

Actual exam question from Cisco's 350-701
Question #: 178
Topic #: 1
[All 350-701 Questions]

An organization wants to secure data in a cloud environment. Its security model requires that all users be authenticated and authorized. Security configuration and posture must be continuously validated before access is granted or maintained to applications and data. There is also a need to allow certain application traffic and deny all other traffic by default. Which technology must be used to implement these requirements?

  • A. virtual routing and forwarding
  • B. access control policy
  • C. virtual LAN
  • D. microsegmentation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jaciro11
Highly Voted 3 years, 1 month ago
Selected Answer: B
Microsegmentation is NOT for posturing checking. All the requirements criteria is met by Access Control Policies where you can define in ISE, Authentication, Authorization (Assign SGT in this part, which is the microsegmentation), then use Access List to deny or allow traffic Answer is B
upvoted 19 times
Rododendron2
11 months, 3 weeks ago
I incline more to microsegmentation. Access control and Identity based access is without doubt necessary part of that, but the whole enforcement technology is microsegmentation.
upvoted 2 times
...
...
Smileebloke
Highly Voted 3 years ago
The key point is all users must be authenticated / authorised (RBAC), using identity based access control, so ISE. Micro segmentation is also part of the solution using SGT. Access policy brings these components together. Answer: B
upvoted 6 times
...
Happy_Shepherd26
Most Recent 5 months, 4 weeks ago
Selected Answer: D
Micro-segmentation secures applications by expressly allowing particular application traffic and, by default, denying all other traffic.
upvoted 1 times
...
kloug
6 months, 1 week ago
D correct
upvoted 1 times
...
luismg
7 months, 2 weeks ago
Selected Answer: B
In microsegmentation traffic doesn't need to be authenticated, for me is B.
upvoted 1 times
...
Premium_Pils
8 months, 2 weeks ago
Selected Answer: B
They meant the broader term, Access Control Policy.
upvoted 1 times
...
Tthurston1
10 months, 3 weeks ago
Selected Answer: D
Have to agree with the others who voted for Option D. The keywords that stood out to me were "...allowing certain application traffic and deny all other traffic by default." This is possible ONLY with microsegmentation. With ACL's - the opposite of that is true - traffic is allowed by default unless explicitly stated otherwise with rules denying certain traffic. https://www.cisco.com/c/en/us/products/security/what-is-microsegmentation.html
upvoted 2 times
...
gorequill
1 year, 3 months ago
https://www.theasciiconstruct.com/post/sda_security_2/ D
upvoted 1 times
...
Alizade
1 year, 6 months ago
Selected Answer: D
The answer is D. microsegmentation.
upvoted 1 times
...
Jessie45785
2 years ago
Selected Answer: B
they asking about the model, access control policy is not a model, microsegmentation is a security deployment model - I am going for B
upvoted 1 times
...
angry
2 years, 1 month ago
B is correct guys!
upvoted 2 times
...
Tuxzinator
2 years, 2 months ago
Selected Answer: B
Its security model requires that all users be authenticated and authorized. How does micro segmentation do this?
upvoted 3 times
...
psuoh
2 years, 3 months ago
Micro-segmentation software uses network virtualization technology to create increasingly granular secure zones in data centers and cloud deployments, which isolate each individual workload and secure it separately.
upvoted 1 times
...
Anonymous983475
2 years, 3 months ago
Selected Answer: D
I agree that it's D
upvoted 2 times
...
Emlia1
2 years, 4 months ago
Selected Answer: D
I prefer D
upvoted 2 times
...
4000000
2 years, 5 months ago
They r talking about and questioning technology..... Microsegmentation is the technology so D
upvoted 2 times
...
smartcarter
2 years, 5 months ago
Answer is Microsegmentation. Software defined access provides Microsegmentation capabilities and centralised administration of which the Cisco ISE is part, hence the user part of the question. https://www.ciscopress.com/articles/article.asp?p=3100056&seqNum=3
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago