Cisco 350-701 Practice Test - Questions Answers, Page 18
List of questions
Question 171
What are the two types of managed Intercloud Fabric deployment models? (Choose two)
Question 172
What are two DDoS attack categories? (Choose two)
Question 173
Refer to the exhibit.
Which type of authentication is in use?
Question 174
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Question 175
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Question 176
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
Question 177
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question 178
What is the function of SDN southbound API protocols?
Question 179
Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
Question 180
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Question