Cisco 350-701 Practice Test - Questions Answers, Page 59
List of questions
Question 581

DRAG DROP
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
Question 582

Which DoS attack uses fragmented packets in an attempt to crash a target machine?
Question 583

An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
Question 584

What are two workload security models? (Choose two.)
Question 585

Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
Question 586

What does Cisco ISE use to collect endpoint attributes that are used in profiling?
Question 587

Which threat intelligence standard contains malware hashes?
Question 588

Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
Question 589

Which Cisco security solution secures public, private, hybrid, and community clouds?
Question 590

A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
Question