ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based?

(Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

What are two benefits of Flexible NetFlow records? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

How does DNS Tunneling exfiltrate data?

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

A user has a device in the network that is receiving too many connection requests from multiple machines.

Which type of attack is the device undergoing?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse


An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

Become a Premium Member for full access
  Unlock Premium Member
Total 631 questions
Go to page: of 64
Search

Related questions