Cisco Implementing and Operating Cisco Security Core Technologies - 350-701 Exam Practice Test

Which Dos attack uses fragmented packets to crash a target machine?
Correct Answer: B
What must be used to share data between multiple security products?
Correct Answer: B
An engineer wants to automatically assign endpoints that have a specific OUl into a new endpoint group. Which probe must be enabled for this type of profiling to work?
Correct Answer: C
Refer to the exhibit.

What is a result of the configuration?
Correct Answer: A
Which two descriptions of AES encryption are true? (Choose two.)
Correct Answer: C,D
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Correct Answer: D,E
Which cloud service model offers an environment for cloud consumers to develop and deploy applications without needing to manage or maintain the underlying cloud infrastructure?
Correct Answer: A
What are two list types within Cisco AMP for Endpoints Outbreak Control? (Choose two.)
Correct Answer: A,D
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?
Correct Answer: D
Explanation: (Only visible to PassTestking members)
Which Cisco AMP file disposition valid?
Correct Answer: A
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Correct Answer: C
Explanation: (Only visible to PassTestking members)
Which attack type attempts to shut down a machine or network so that users are not able to access it?
Correct Answer: C
What is a difference between FlexVPN and DMVPN?
Correct Answer: C
What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?
Correct Answer: A
A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?
Correct Answer: B
Which two features of Cisco Email Security can protect your organization against email threats? (choose two)
Correct Answer: C,D
An MDM provides which two advantages to an organization with regards to device management? (Choose two.)
Correct Answer: C,D
With Which components does a southbound API within a software-defined network architecture communicate?
Correct Answer: C
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)
Correct Answer: A,E
What is the difference between deceptive phishing and spear phishing?
Correct Answer: B
Which algorithm provides encryption and authentication for data plane communication?
Correct Answer: C
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
Correct Answer: D
Explanation: (Only visible to PassTestking members)
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
Correct Answer: D
Explanation: (Only visible to PassTestking members)
An administrator configures a Cisco WSA to receive redirected traffic over ports 80 and 443 The organization requires that a network device with specific WSA integration capabilities be configured to send the traffic to the WSA to proxy the requests and increase visibility, while making this invisible to the users What must be done on the Cisco WSA to support these requirements?
Correct Answer: D