Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 21 out of 52 pages Questions 201-210 out of 515 questions
Question#201

How does Cisco Stealthwatch Cloud provide security for cloud environments?

  • A. It delivers visibility and threat detection.
  • B. It prevents exfiltration of sensitive data.
  • C. It assigns Internet-based DNS protection for clients and servers.
  • D. It facilitates secure connectivity between public and private networks.
Discover Answer Hide Answer

A
Reference:
https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cisco/Cisco-091919-Simple-IT-Whitepaper.pdf

Question#202

Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?

  • A. Cisco Umbrella
  • B. Cisco Firepower NGIPS
  • C. Cisco Stealthwatch
  • D. Cisco Firepower
Discover Answer Hide Answer

A

Question#203

What must be used to share data between multiple security products?

  • A. Cisco Platform Exchange Grid
  • B. Cisco Rapid Threat Containment
  • C. Cisco Stealthwatch Cloud
  • D. Cisco Advanced Malware Protection
Discover Answer Hide Answer

A

Question#204

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two.)

  • A. Messenger applications cannot be segmented with standard network controls
  • B. Malware infects the messenger application on the user endpoint to send company data
  • C. Traffic is encrypted, which prevents visibility on firewalls and IPS systems
  • D. An exposed API for the messaging platform is used to send large amounts of data
  • E. Outgoing traffic is allowed so users can communicate with outside organizations
Discover Answer Hide Answer

AE

Question#205

Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?

  • A. Cisco Security Intelligence
  • B. Cisco Application Visibility and Control
  • C. Cisco Model Driven Telemetry
  • D. Cisco DNA Center
Discover Answer Hide Answer

B

Question#206

What provides visibility and awareness into what is currently occurring on the network?

  • A. CMX
  • B. WMI
  • C. Cisco Prime Infrastructure
  • D. Telemetry
Discover Answer Hide Answer

D

Question#207

How is ICMP used as an exfiltration technique?

  • A. by flooding the destination host with unreachable packets
  • B. by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
  • C. by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
  • D. by overwhelming a targeted host with ICMP echo-request packets
Discover Answer Hide Answer

C

Question#208


Refer to the exhibit. An engineer configured wired 802.1x on the network and is unable to get a laptop to authenticate. Which port configuration is missing?

  • A. dot1x reauthentication
  • B. cisp enable
  • C. dot1x pae authenticator
  • D. authentication open
Discover Answer Hide Answer

C

Question#209

An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?

  • A. UDP 1700
  • B. TCP 6514
  • C. UDP 1812
  • D. TCP 49
Discover Answer Hide Answer

A

Question#210

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

  • A. data exfiltration
  • B. command and control communication
  • C. intelligent proxy
  • D. snort
  • E. URL categorization
Discover Answer Hide Answer

AB
Reference:
https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf

chevron rightPrevious Nextchevron right