Cisco 350-701 Practice Test - Questions Answers, Page 59
List of questions
Related questions
DRAG DROP
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
teardrop
smurf
LAND
SYN flood
An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG GUI.
Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG CLI.
Enable two-factor authentication through a RADIUS server, and then join the cluster via the SEG CLI
Enable two-factor authentication through a TACACS+ server, and then join the cluster via the SEG GUI.
What are two workload security models? (Choose two.)
SaaS
PaaS
off-premises
on-premises
IaaS
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
Link Aggregation
Reverse ARP
private VLANs
Dynamic ARP Inspection
What does Cisco ISE use to collect endpoint attributes that are used in profiling?
probes
posture assessment
Cisco AnyConnect Secure Mobility Client
Cisco pxGrid
Which threat intelligence standard contains malware hashes?
advanced persistent threat
open command and control
structured threat information expression
trusted automated exchange of indicator information
Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
flow-export event-type
policy-map
access-list
flow-export template timeout-rate 15
access-group
Which Cisco security solution secures public, private, hybrid, and community clouds?
Cisco ISE
Cisco ASAv
Cisco Cloudlock
Cisco pxGrid
A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
file prevalence
file discovery
file conviction
file manager
Question