Cisco 350-701 Practice Test - Questions Answers, Page 7
Related questions
An engineer wants to generate NetFlow records on traffic traversing the Cisco ASA. Which Cisco ASA command must be used?
flow-export destination inside 1.1.1.1 2055
ip flow monitor input
ip flow-export destination 1.1.1.1 2055
flow exporter
How many interfaces per bridge group does an ASA bridge group deployment support?
up to 2
up to 4
up to 8
up to 16
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
packet decoder
SIP
modbus
inline normalization
SSL
Which two features of Cisco Email Security can protect your organization against email threats?
(Choose two)
Time-based one-time passwords
Data loss prevention
Heuristic-based filtering
Geolocation-based filtering
NetFlow
Why would a user choose an on-premises ESA versus the CES solution?
Sensitive data must remain onsite.
Demand is unpredictable.
The server team wants to outsource this service.
ESA is deployed inline.
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)
Sophos engine
white list
RAT
outbreak filters
DLP
What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?
It decrypts HTTPS application traffic for unauthenticated users.
It alerts users when the WSA decrypts their traffic.
It decrypts HTTPS application traffic for authenticated users.
It provides enhanced HTTPS application detection for AsyncOS.
Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)
It can handle explicit HTTP requests.
It requires a PAC file for the client web browser.
It requires a proxy for the client web browser.
WCCP v2-enabled devices can automatically redirect traffic destined to port 80.
Layer 4 switches can automatically redirect traffic destined to port 80.
Which action controls the amount of URI text that is stored in Cisco WSA logs files?
Configure the datasecurityconfig command
Configure the advancedproxyconfig command with the HTTPS subcommand
Configure a small log-entry size.
Configure a maximum packet size.
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?
SAT
BAT
HAT
RAT
Question