Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Which two authentication protocols are supported by the Cisco WSA? (Choose two.)
An organization has a Cisco ESA set up with policies and would like to customize the action assigned for
violations. The organization wants a copy of the message to be delivered with a message added to flag it as a
DLP violation. Which actions must be performed in order to provide this capability?
How is DNS tunneling used to exfiltrate data out of a corporate network?
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen
on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose
two)
What is a language format designed to exchange threat intelligence that can be transported over the TAXII
protocol?
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
What are two Trojan malware attacks? (Choose two)
What is the function of SDN southbound API protocols?
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
What are two features of NetFlow flow monitoring? (Choose two)
What is the difference between Cross-site Scripting and SQL Injection, attacks?
Which portion of the network do EPP solutions solely focus on and EDR solutions do not?
What is a key difference between Cisco Firepower and Cisco ASA?
Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?
How does Cisco Workload Optimization Manager help mitigate application performance issues?