Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Page: 9 / 15
Total 726 questions

Which feature must be configured before implementing NetFlow on a router?

A.

SNMPv3

B.

syslog

C.

VRF

D.

IP routing

Which statement about IOS zone-based firewalls is true?

A.

An unassigned interface can communicate with assigned interfaces

B.

Only one interface can be assigned to a zone.

C.

An interface can be assigned to multiple zones.

D.

An interface can be assigned only to one zone.

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

A.

It decrypts HTTPS application traffic for unauthenticated users.

B.

It alerts users when the WSA decrypts their traffic.

C.

It decrypts HTTPS application traffic for authenticated users.

D.

It provides enhanced HTTPS application detection for AsyncOS.

An organization wants to provide visibility and to identify active threats in its network using a VM. The

organization wants to extract metadata from network packet flow while ensuring that payloads are not retained

or transferred outside the network. Which solution meets these requirements?

A.

Cisco Umbrella Cloud

B.

Cisco Stealthwatch Cloud PNM

C.

Cisco Stealthwatch Cloud PCM

D.

Cisco Umbrella On-Premises

Which encryption algorithm provides highly secure VPN communications?

A.

3DES

B.

AES 256

C.

AES 128

D.

DES

What is a capability of Cisco ASA Netflow?

A.

It filters NSEL events based on traffic

B.

It generates NSEL events even if the MPF is not configured

C.

It logs all event types only to the same collector

D.

It sends NetFlow data records from active and standby ASAs in an active standby failover pair

An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

A.

Use security services to configure the traffic monitor, .

B.

Use URL categorization to prevent the application traffic.

C.

Use an access policy group to configure application control settings.

D.

Use web security reporting to validate engine functionality

Refer to the exhibit.

What does the API key do while working with https://api.amp.cisco.com/v1/computers?

A.

displays client ID

B.

HTTP authorization

C.

Imports requests

D.

HTTP authentication

What are two facts about WSA HTTP proxy configuration with a PAC file? (Choose two.)

A.

It is defined as a Transparent proxy deployment.

B.

In a dual-NIC configuration, the PAC file directs traffic through the two NICs to the proxy.

C.

The PAC file, which references the proxy, is deployed to the client web browser.

D.

It is defined as an Explicit proxy deployment.

E.

It is defined as a Bridge proxy deployment.

Which technology provides the benefit of Layer 3 through Layer 7 innovative deep packet inspection,

enabling the platform to identify and output various applications within the network traffic flows?

A.

Cisco NBAR2

B.

Cisco ASAV

C.

Account on Resolution

D.

Cisco Prime Infrastructure

Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?

A.

AAA attributes

B.

CoA request

C.

AV pair

D.

carrier-grade NAT

What is a benefit of using Cisco Tetration?

A.

It collects telemetry data from servers and then uses software sensors to analyze flowinformation.

B.

It collects policy compliance data and process details.

C.

It collects enforcement data from servers and collects interpacket variation.

D.

It collects near-real time data from servers and inventories the software packages that exist onservers.

When network telemetry is implemented, what is important to be enabled across all network infrastructure devices to correlate different sources?

A.

CDP

B.

NTP

C.

syslog

D.

DNS

On which part of the IT environment does DevSecOps focus?

A.

application development

B.

wireless network

C.

data center

D.

perimeter network

Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)

A.

ADC

B.

ERSPAN

C.

Cisco ASA

D.

NetFlow

E.

Cisco Secure Workload