Cisco 350-701 Practice Test - Questions Answers, Page 18

List of questions
Question 171

What are the two types of managed Intercloud Fabric deployment models? (Choose two)
Question 172

What are two DDoS attack categories? (Choose two)
Question 173

Refer to the exhibit.
Which type of authentication is in use?
Question 174

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Question 175

Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Question 176

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
Question 177

After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Question 178

What is the function of SDN southbound API protocols?
Question 179

Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
Question 180

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
Question