Cisco 350-701 Practice Test - Questions Answers, Page 29

List of questions
Question 281

Which type of encryption uses a public key and private key?
Question 282

What are two features of NetFlow flow monitoring? (Choose two)
Question 283

A customer has various external HTTP resources available including Intranet Extranet and Internet,with aproxy configuration running in explicit mode. Which method allows the client desktop browsers to beconfiguredto select when to connect direct or when to use the proxy?
Question 284

Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
Question 285

An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?
Question 286

An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
Question 287

What is a difference between an XSS attack and an SQL injection attack?
Question 288

An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
Question 289

Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?
Question 290

Which attribute has the ability to change during the RADIUS CoA?
Question