Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
What is the most commonly used protocol for network telemetry?
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
Which method of attack is used by a hacker to send malicious code through a web application to an unsuspecting user to request that the victim's web browser executes the code?
What is a function of 3DES in reference to cryptography?
A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The
company needs to be able to protect sensitive data throughout the full environment. Which tool should be used
to accomplish this goal?
What is an advantage of the Cisco Umbrella roaming client?
Which role is a default guest type in Cisco ISE?
What must be used to share data between multiple security products?
Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?
What provides visibility and awareness into what is currently occurring on the network?
A company has 5000 Windows users on its campus. Which two precautions should IT take to prevent WannaCry ransomware from spreading to all clients? (Choose two.)
What are two list types within AMP for Endpoints Outbreak Control? (Choose two)
Which Cisco ASA deployment model is used to filter traffic between hosts in the same IP subnet using higher-level protocols without readdressing the network?