Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
How is data sent out to the attacker during a DNS tunneling attack?
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
Which feature must be configured before implementing NetFlow on a router?
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right.
A network engineer has been tasked with adding a new medical device to the network. Cisco ISE is being used as the NAC server, and the new device does not have a supplicant available. What must be done in order to securely connect this device to the network?
Which Cisco solution provides a comprehensive view of Internet domains. IP addresses, and autonomous systems to help pinpoint attackers and malicious infrastructures?
What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)
Which security solution protects users leveraging DNS-layer security?
Which Cisco security solution stops exfiltration using HTTPS?
Which VPN technology can support a multivendor environment and secure traffic between sites?
A Cisco ESA network administrator has been tasked to use a newly installed service to help create policy based on the reputation verdict. During testing, it is discovered that the Cisco ESA is not dropping files that have an undetermined verdict. What is causing this issue?
Where are individual sites specified to be blacklisted in Cisco Umbrella?
Which service allows a user to export application usage and performance statistics with Cisco Application Visibility and Control?