Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Page: 5 / 15
Total 726 questions

Which feature is leveraged by advanced antimalware capabilities to be an effective endpomt protection platform?

A.

big data

B.

storm centers

C.

sandboxing

D.

blocklisting

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)

A.

DDoS

B.

antispam

C.

antivirus

D.

encryption

E.

DLP

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

A.

Check integer, float, or Boolean string parameters to ensure accurate values.

B.

Use prepared statements and parameterized queries.

C.

Secure the connection between the web and the app tier.

D.

Write SQL code instead of using object-relational mapping libraries.

E.

Block SQL code execution in the web application database login.

Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

A.

Malware installation

B.

Command-and-control communication

C.

Network footprinting

D.

Data exfiltration

Which benefit does endpoint security provide the overall security posture of an organization?

A.

It streamlines the incident response process to automatically perform digital forensics on the endpoint.

B.

It allows the organization to mitigate web-based attacks as long as the user is active in the domain.

C.

It allows the organization to detect and respond to threats at the edge of the network.

D.

It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.

Which type of attack is MFA an effective deterrent for?

A.

ping of death

B.

phishing

C.

teardrop

D.

syn flood

Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?

A.

analysis

B.

sharing

C.

authoring

D.

consumption

A large organization wants to deploy a security appliance in the public cloud to form a site-to-site VPN

and link the public cloud environment to the private cloud in the headquarters data center. Which Cisco

security appliance meets these requirements?

A.

Cisco Cloud Orchestrator

B.

Cisco ASAV

C.

Cisco WSAV

D.

Cisco Stealthwatch Cloud

Drag and drop the posture assessment flow actions from the left into a sequence on the right.

Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)

A.

NTLMSSP

B.

Kerberos

C.

CHAP

D.

TACACS+

E.

RADIUS

What is the purpose of the My Devices Portal in a Cisco ISE environment?

A.

to register new laptops and mobile devices

B.

to request a newly provisioned mobile device

C.

to provision userless and agentless systems

D.

to manage and deploy antivirus definitions and patches on systems owned by the end user

Which open source tool does Cisco use to create graphical visualizations of network telemetry on Cisco IOS XE devices?

A.

InfluxDB

B.

Splunk

C.

SNMP

D.

Grafana

In which cloud services model is the tenant responsible for virtual machine OS patching?

A.

IaaS

B.

UCaaS

C.

PaaS

D.

SaaS

Which Cisco security solution gives the most complete view of the relationships and evolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructures and predict future threat?

A.

Cisco Secure Network Analytics

B.

Cisco Secure Cloud Analytics

C.

Cisco Umbrella Investigate

D.

Cisco pxGrid

An organization is implementing URL blocking using Cisco Umbrella. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?

A.

Client computers do not have the Cisco Umbrella Root CA certificate installed.

B.

IP-Layer Enforcement is not configured.

C.

Intelligent proxy and SSL decryption is disabled in the policy.

D.

Client computers do not have an SSL certificate deployed from an internal CA server.