Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
An engineer is deploying a Cisco Secure Email Gateway and must ensure it reaches the Cisco update servers to retrieve new rules. The engineer must now manually configure the Outbreak Filter rules on an AsyncOS for Cisco Secure Email Gateway. Only outdated rules must be replaced. Up-to-date rules must be retained. Which action must the engineer take next to complete the configuration?
A network administrator needs to find out what assets currently exist on the network. Third-party systems need to be able to feed host data into Cisco Firepower. What must be configured to accomplish this?
An organization wants to provide visibility and to identify active threats in its network using a VM. The
organization wants to extract metadata from network packet flow while ensuring that payloads are not retained
or transferred outside the network. Which solution meets these requirements?
Which two activities can be done using Cisco DNA Center? (Choose two)
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the
organization’s public cloud to send telemetry using the cloud provider’s mechanisms to a security device. Which
mechanism should the engineer configure to accomplish this goal?
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
What does endpoint isolation in Cisco AMP for Endpoints security protect from?
Which threat intelligence standard contains malware hashes?
Refer to the exhibit.
What are two indications of the Cisco Firepower Services Module configuration?
(Choose two.)
An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Which configuration component must be used to accomplish this goal?
What is the process of performing automated static and dynamic analysis of files against preloaded
behavioral indicators for threat analysis?
An organization is using DNS services for their network and want to help improve the security of the DNS infrastructure. Which action accomplishes this task?
What is a functional difference between Cisco AMP for Endpoints and Cisco Umbrella Roaming Client?
What is the purpose of the Cisco Endpoint IoC feature?