ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 17

Add to Whishlist

List of questions

Question 161

Report Export Collapse

What provides the ability to program and monitor networks from somewhere other than the DNAC GUI?

Become a Premium Member for full access
  Unlock Premium Member

Question 162

Report Export Collapse

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

Become a Premium Member for full access
  Unlock Premium Member

Question 163

Report Export Collapse

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 164

Report Export Collapse

A company is experiencing exfiltration of credit card numbers that are not being stored on-premise.

The company needs to be able to protect sensitive data throughout the full environment. Which tool should be used to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 165

Report Export Collapse

An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.

However, the connection is failing. Which action should be taken to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 166

Report Export Collapse


A network administrator is using the Cisco ESA with AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 167

Report Export Collapse

Which type of algorithm provides the highest level of protection against brute-force attacks?

Become a Premium Member for full access
  Unlock Premium Member

Question 168

Report Export Collapse

What must be configured in Cisco ISE to enforce reauthentication of an endpoint session when an endpoint is deleted from an identity group?

Become a Premium Member for full access
  Unlock Premium Member

Question 169

Report Export Collapse

A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category. Which reputation score should be selected to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 170

Report Export Collapse

Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

Become a Premium Member for full access
  Unlock Premium Member
Total 631 questions
Go to page: of 64
Search

Related questions