Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
Refer to the exhibit.
The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?
What is a characteristic of Firepower NGIPS inline deployment mode?
Which threat involves software being used to gain unauthorized access to a computer system?
A network administrator is configuring SNMPv3 on a new router. The users have already been created;
however, an additional configuration is needed to facilitate access to the SNMP views. What must the
administrator do to accomplish this?
Which two devices support WCCP for traffic redirection? (Choose two.)
Which feature within Cisco ISE verifies the compliance of an endpoint before providing access to the
network?
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
What are two DDoS attack categories? (Choose two)
Which Cisco Umbrella package supports selective proxy for Inspection of traffic from risky domains?
Which benefit does endpoint security provide the overall security posture of an organization?
What is a characteristic of an EDR solution and not of an EPP solution?
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services.
Refer to the exhibit.
When configuring a remote access VPN solution terminating on the Cisco ASA, an administrator would like to utilize an external token authentication mechanism in conjunction with AAA authentication using machine
certificates. Which configuration item must be modified to allow this?
Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?