Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Which function is included when Cisco AMP is added to web security?
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
A network engineer must configure a Cisco Secure Email Gateway to prompt users to enter two forms of information before gaining access. The Secure Email Gateway must also join a cluster machine using preshared keys. What must be configured to meet these requirements?
Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?
A security administrator is designing an email protection solution for an onsite email server and must meet these requirements:
Remove malware from email before it reaches corporate premises
Drop emails with risky links automatically
Block access to newly infected sites with real-time URL analysis
Which solution must be used?
For a given policy in Cisco Umbrella, how should a customer block websites based on a custom list?
An engineer is configuring cloud logging using a company-managed Amazon S3 bucket for Cisco Umbrella logs. What benefit does this configuration provide for accessing log data?
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
Refer to the exhibit.
Which configuration item makes it possible to have the AAA session on the network?
What is a benefit of flexible NetFlow records?
What is a benefit of performing device compliance?
Refer to the exhibit. Consider that any feature of DNS requests, such as the length of the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?
An organization wants to improve its cybersecurity processes and to add intelligence to its data The organization wants to utilize the most current intelligence data for URL filtering, reputations, and vulnerability information that can be integrated with the Cisco FTD and Cisco WSA What must be done to accomplish these objectives?
Which IETF attribute is supported for the RADIUS CoA feature?
An administrator is trying to determine which applications are being used in the network but does not want the
network devices to send metadata to Cisco Firepower. Which feature should be used to accomplish this?