Cisco 350-701 Practice Test - Questions Answers, Page 21
List of questions
Related questions
An organization is implementing URL blocking using Cisco Umbrell a. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?
Client computers do not have the Cisco Umbrella Root CA certificate installed.
IP-Layer Enforcement is not configured.
Client computers do not have an SSL certificate deployed from an internal CA server.
Intelligent proxy and SSL decryption is disabled in the policy
Which two aspects of the cloud PaaS model are managed by the customer but not the provider?
(Choose two)
virtualization
middleware
operating systems
applications
data
What is an attribute of the DevSecOps process?
mandated security controls and check lists
security scanning and theoretical vulnerabilities
development security
isolated security team
An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?
Bridge Protocol Data Unit guard
embedded event monitoring
storm control
access control lists
Which two cryptographic algorithms are used with IPsec? (Choose two)
AES-BAC
AES-ABC
HMAC-SHA1/SHA2
Triple AMC-CBC
AES-CBC
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
LDAP injection
man-in-the-middle
cross-site scripting
insecure API
Which Dos attack uses fragmented packets to crash a target machine?
smurf
MITM
teardrop
LAND
Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?
to prevent theft of the endpoints
because defense-in-depth stops at the network
to expose the endpoint to more threats
because human error or insider threats will still exist
Which type of API is being used when a security application notifies a controller within a softwaredefined network architecture about a specific security threat?
westbound AP
southbound API
northbound API
eastbound API
When planning a VPN deployment, for which reason does an engineer opt for an active/active FlexVPN configuration as opposed to DMVPN?
Multiple routers or VRFs are required.
Traffic is distributed statically by default.
Floating static routes are required.
HSRP is used for faliover.
Question