Cisco 350-701 Practice Test - Questions Answers, Page 59
 Add to Whishlist
 
                            Add to Whishlist
                        List of questions
Question 581
 
                            
                            
                                DRAG DROP
A network engineer is configuring NetFlow top talkers on a Cisco router Drag and drop the steps in the process from the left into the sequence on the right
Question 582
 
                            
                            
                                Which DoS attack uses fragmented packets in an attempt to crash a target machine?
Question 583
 
                            
                            
                                An engineer needs to configure a Cisco Secure Email Gateway (SEG) to prompt users to enter multiple forms of identification before gaining access to the SEG. The SEG must also join a cluster using the preshared key of cisc421555367. What steps must be taken to support this?
Question 584
 
                            
                            
                                What are two workload security models? (Choose two.)
Question 585
 
                            
                            
                                Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
Question 586
 
                            
                            
                                What does Cisco ISE use to collect endpoint attributes that are used in profiling?
Question 587
 
                            
                            
                                Which threat intelligence standard contains malware hashes?
Question 588
 
                            
                            
                                Which two commands are required when configuring a flow-export action on a Cisco ASA? (Choose two.)
Question 589
 
                            
                            
                                Which Cisco security solution secures public, private, hybrid, and community clouds?
Question 590
 
                            
                            
                                A university policy must allow open access to resources on the Internet for research, but internal workstations are exposed to malware. Which Cisco AMP feature allows the engineering team to determine whether a file is installed on a selected few workstations?
 
         Unlock Premium Member
  Unlock Premium Member
                                    


 
  
                                            
Question