Cisco 350-701 Practice Test - Questions Answers, Page 18
Related questions
What are the two types of managed Intercloud Fabric deployment models? (Choose two)
Service Provider managed
Public managed
Hybrid managed
User managed
Enterprise managed
What are two DDoS attack categories? (Choose two)
sequential
protocol
database
volume-based
screen-based
Refer to the exhibit.
Which type of authentication is in use?
LDAP authentication for Microsoft Outlook
POP3 authentication
SMTP relay server authentication
external user and relay mail authentication
An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically.
What must be configured to accomplish this?
Configure the Cisco WSA to modify policies based on the traffic seen
Configure the Cisco ESA to receive real-time updates from Talos
Configure the Cisco WSA to receive real-time updates from Talos
Configure the Cisco ESA to modify policies based on the traffic seen
Which product allows Cisco FMC to push security intelligence observable to its sensors from other products?
Encrypted Traffic Analytics
Threat Intelligence Director
Cognitive Threat Analytics
Cisco Talos Intelligence
What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two)
When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.
The Cisco WSA responds with its own IP address only if it is running in explicit mode.
The Cisco WSA is configured in a web browser only if it is running in transparent mode.
The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
The Cisco WSA responds with its own IP address only if it is running in transparent mode.
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Modify an access policy
Modify identification profiles
Modify outbound malware scanning policies
Modify web proxy settings
What is the function of SDN southbound API protocols?
to allow for the dynamic configuration of control plane applications
to enable the controller to make changes
to enable the controller to use REST
to allow for the static configuration of control plane applications
Refer to the exhibit.
Traffic is not passing through IPsec site-to-site VPN on the Firepower Threat Defense appliance. What is causing this issue?
No split-tunnel policy is defined on the Firepower Threat Defense appliance.
The access control policy is not allowing VPN traffic in.
Site-to-site VPN peers are using different encryption algorithms.
Site-to-site VPN preshared keys are mismatched.
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
weak passwords for authentication
unencrypted links for traffic
software bugs on applications
improper file security
Question