exam questions

Exam 400-007 All Questions

View all questions & answers for the 400-007 exam

Exam 400-007 topic 1 question 209 discussion

Actual exam question from Cisco's 400-007
Question #: 209
Topic #: 1
[All 400-007 Questions]

A network security team observes phishing attacks on a user machine from a remote location. The organization has a policy of saving confidential data on two different systems using different types of authentication. What is the next step to control such events after the security team verifies all users in Zero Trust modeling?

  • A. Assess real-time security health of devices
  • B. Enforce risk-based and adaptive access policies
  • C. Ensure trustworthiness of devices
  • D. Apply a context-based network access control policy for users
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ITgeeek
Highly Voted 1 year, 10 months ago
C is right, see 2 sources below: https://www.certcommunity.org/forum/uploads/monthly_2023_01/image.thumb.png.d4e8b833fd17ea0bb64e774a5cc84a58.png https://www.cisco.com/c/dam/global/en_ca/assets/pdfs/zero-trust-cisco-connect-vancouver-2020.pdf
upvoted 17 times
...
kalulosu
Most Recent 3 months, 4 weeks ago
Selected Answer: B
I think correct ans is B. After validating all users using zero-trust modeling, risk-based and adaptive access policies can be enforced to dynamically adjust access rights based on user behavior and device status. This allows you to manage potential threats in real time and mitigate phishing attacks and other security risks
upvoted 1 times
...
famov66542
6 months, 1 week ago
Selected Answer: D
By applying a context-based network access control policy, the organization can enforce its data storage policy and ensure that users can only access confidential data when the appropriate context (e.g., device, location, authentication method) is met. https://www.ibm.com/blog/towards-zero-trust-with-context-based-restrictions/
upvoted 1 times
...
yasglobal
1 year ago
Selected Answer: B
B is right
upvoted 1 times
...
cciesuperhero
1 year, 1 month ago
Selected Answer: C
C is right, see 2 sources below: https://www.certcommunity.org/forum/uploads/monthly_2023_01/image.thumb.png.d4e8b833fd17ea0bb64e774a5cc84a58.png https://www.cisco.com/c/dam/global/en_ca/assets/pdfs/zero-trust-cisco-connect-vancouver-2020.pdf
upvoted 2 times
...
ivanovsky
1 year, 1 month ago
Selected Answer: C
the answer is C, see "User and Device Security" https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-ag.html
upvoted 2 times
...
gcpengineer
1 year, 8 months ago
Selected Answer: B
By enforcing risk-based and adaptive access policies, the organization can ensure that users are granted access to only the resources they need based on their roles and responsibilities, and the context of their access request. This can help prevent unauthorized access to confidential data, even if a user's credentials have been compromised.
upvoted 2 times
biddid2
1 year, 8 months ago
Hi Bros, thanks for running the dump together. Please try to find website to proof your thinking, just copy words from the question or answers to google. This can help your troubleshooting and more powerful to show you are correct.
upvoted 2 times
...
xz_sky
7 months, 2 weeks ago
Yeah, B seems right. https://www.cisco.com/c/en/us/solutions/collateral/enterprise/design-zone-security/zt-ag.html
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago