Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 13 out of 52 pages Questions 121-130 out of 515 questions
Question#121

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?

  • A. IP Block List Center
  • B. File Reputation Center
  • C. AMP Reputation Center
  • D. IP and Domain Reputation Center
Discover Answer Hide Answer

D

Question#122

What is the primary role of the Cisco Email Security Appliance?

  • A. Mail Submission Agent
  • B. Mail Transfer Agent
  • C. Mail Delivery Agent
  • D. Mail User Agent
Discover Answer Hide Answer

B

Question#123

Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)

  • A. DDoS
  • B. antispam
  • C. antivirus
  • D. encryption
  • E. DLP
Discover Answer Hide Answer

DE
Reference:
https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf

Question#124

An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to prevent the session during the initial TCP communication?

  • A. Configure the Cisco ESA to reset the TCP connection.
  • B. Configure policies to stop and reject communication.
  • C. Configure the Cisco ESA to drop the malicious emails.
  • D. Configure policies to quarantine malicious emails.
Discover Answer Hide Answer

B

Question#125


Refer to the exhibit. What is a result of the configuration?

  • A. Traffic from the DMZ network is redirected.
  • B. Traffic from the inside network is redirected.
  • C. All TCP traffic is redirected.
  • D. Traffic from the inside and DMZ networks is redirected.
Discover Answer Hide Answer

D

Question#126

An organization received a large amount of SPAM messages over a short time period. In order to take action on the messages, it must be determined how harmful the messages are and this needs to happen dynamically. What must be configured to accomplish this?

  • A. Configure the Cisco WSA to modify policies based on the traffic seen.
  • B. Configure the Cisco ESA to modify policies based on the traffic seen.
  • C. Configure the Cisco WSA to receive real-time updates from Cisco Talos.
  • D. Configure the Cisco ESA to receive real-time updates from Cisco Talos.
Discover Answer Hide Answer

D

Question#127

What are two differences between a Cisco WSA that is running in transparent mode and one running in explicit mode? (Choose two.)

  • A. The Cisco WSA responds with its own IP address only if it is running in explicit mode.
  • B. The Cisco WSA is configured in a web browser only if it is running in transparent mode.
  • C. The Cisco WSA responds with its own IP address only if it is running in transparent mode.
  • D. The Cisco WSA uses a Layer 3 device to redirect traffic only if it is running in transparent mode.
  • E. When the Cisco WSA is running in transparent mode, it uses the WSA's own IP address as the HTTP request destination.
Discover Answer Hide Answer

AD

Question#128

Which technology is used to improve web traffic performance by proxy caching?

  • A. WSA
  • B. Firepower
  • C. FireSIGHT
  • D. ASA
Discover Answer Hide Answer

A

Question#129

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

  • A. transparent
  • B. redirection
  • C. forward
  • D. proxy gateway
Discover Answer Hide Answer

A
Reference:
https://www.cisco.com/c/en/us/support/docs/security/web-security-appliance/117940-qa-wsa-00.html

Question#130

What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

  • A. It decrypts HTTPS application traffic for unauthenticated users.
  • B. It alerts users when the WSA decrypts their traffic.
  • C. It decrypts HTTPS application traffic for authenticated users.
  • D. It provides enhanced HTTPS application detection for AsyncOS.
Discover Answer Hide Answer

D
Reference:
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7/b_WSA_UserGuide_11_7_chapter_01011.html

chevron rightPrevious Nextchevron right