Cisco 350-701 Practice Test - Questions Answers, Page 19
List of questions
Related questions
Using Cisco Firepower's Security Intelligence policies, upon which two criteria is Firepower block based?
(Choose two)
URLs
protocol IDs
IP addresses
MAC addresses
port numbers
Which Cisco platform ensures that machines that connect to organizational networks have the recommended antivirus definitions and patches to help prevent an organizational malware outbreak?
Cisco WiSM
Cisco ESA
Cisco ISE
Cisco Prime Infrastructure
What are two benefits of Flexible NetFlow records? (Choose two)
They allow the user to configure flow information to perform customized traffic identification
They provide attack prevention by dropping the traffic
They provide accounting and billing enhancements
They converge multiple accounting technologies into one accounting mechanism
They provide monitoring of a wider range of IP packet information from Layer 2 to 4
How does DNS Tunneling exfiltrate data?
An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
A user has a device in the network that is receiving too many connection requests from multiple machines.
Which type of attack is the device undergoing?
phishing
slowloris
pharming
SYN flood
An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?
Configure the Cisco ESA to drop the malicious emails
Configure policies to quarantine malicious emails
Configure policies to stop and reject communication
Configure the Cisco ESA to reset the TCP connection
A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network. Which two actions should be selected to allow the traffic to pass without inspection? (Choose two)
permit
trust
reset
allow
monitor
An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device. Which mechanism should the engineer configure to accomplish this goal?
mirror port
Flow
NetFlow
VPC flow logs
An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?
Configure incoming content filters
Use Bounce Verification
Configure Directory Harvest Attack Prevention
Bypass LDAP access queries in the recipient access table
What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?
Multiple NetFlow collectors are supported
Advanced NetFlow v9 templates and legacy v5 formatting are supported
Secure NetFlow connections are optimized for Cisco Prime Infrastructure
Flow-create events are delayed
Question