Cisco 350-701 Practice Test - Questions Answers, Page 29
List of questions
Question 281
Which type of encryption uses a public key and private key?
Question 282
What are two features of NetFlow flow monitoring? (Choose two)
Question 283
A customer has various external HTTP resources available including Intranet Extranet and Internet,with aproxy configuration running in explicit mode. Which method allows the client desktop browsers to beconfiguredto select when to connect direct or when to use the proxy?
Question 284
Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
Question 285
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?
Question 286
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Question 287
What is a difference between an XSS attack and an SQL injection attack?
Question 288
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
Question 289
Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?
Question 290
Which attribute has the ability to change during the RADIUS CoA?
Question