Cisco 350-701 Practice Test - Questions Answers, Page 53
List of questions
Related questions
What is a characteristic of an EDR solution and not of an EPP solution?
stops all ransomware attacks
retrospective analysis
decrypts SSL traffic for better visibility
performs signature-based detection
Email security has become a high priority task for a security engineer at a large multi-national organization due to ongoing phishing campaigns. To help control this, the engineer has deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on the Cisco ESA Which action will the system perform to disable any links in messages that match the filter?
Defang
Quarantine
FilterAction
ScreenAction
What are two workloaded security models? (Choose two)
SaaS
IaaS
on-premises
off-premises
PaaS
Refer to the exhibit.
Refer to the exhibit. What function does the API key perform while working with https://api.amp.cisco.com/v1/computers?
imports requests
HTTP authorization
HTTP authentication
plays dent ID
What is a benefit of using GET VPN over FlexVPN within a VPN deployment?
GET VPN supports Remote Access VPNs
GET VPN natively supports MPLS and private IP networks
GET VPN uses multiple security associations for connections
GET VPN interoperates with non-Cisco devices
DRAG DROP
Drag and drop the features of Cisco ASA with Firepower from the left onto the benefits on the right.
DRAG DROP
Drag and drop the cryptographic algorithms for IPsec from the left onto the cryptographic processes on the right.
DRAG DROP
Drag and drop the security solutions from the left onto the benefits they provide on the right.
DoS attacks are categorized as what?
phishing attacks
flood attacks
virus attacks
trojan attacks
Which Cisco DNA Center RESTful PNP API adds and claims a device into a workflow?
api/v1/fie/config
api/v1/onboarding/pnp-device/import
api/v1/onboarding/pnp-device
api/v1/onboarding/workflow
Question