Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 3 out of 52 pages Questions 21-30 out of 515 questions
Question#21

What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?

  • A. Cisco Umbrella
  • B. External Threat Feeds
  • C. Cisco Threat Grid
  • D. Cisco Stealthwatch
Discover Answer Hide Answer

B

Question#22

Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?

  • A. aaa server radius dynamic-author
  • B. auth-type all
  • C. aaa new-model
  • D. ip device-tracking
Discover Answer Hide Answer

A

Question#23

What is a characteristic of Firepower NGIPS inline deployment mode?

  • A. ASA with Firepower module cannot be deployed
  • B. It cannot take actions such as blocking traffic
  • C. It is out-of-band from traffic
  • D. It must have inline interface pairs configured
Discover Answer Hide Answer

D

Question#24

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

  • A. routed mode
  • B. multiple zone mode
  • C. multiple context mode
  • D. transparent mode
Discover Answer Hide Answer

C

Question#25

What is managed by Cisco Security Manager?

  • A. Cisco WLC
  • B. Cisco ESA
  • C. Cisco WSA
  • D. Cisco ASA
Discover Answer Hide Answer

D

Question#26

An organization is trying to improve their Defense in Depth by blocking malicious destinations prior to a connection being established. The solution must be able to block certain applications from being used within the network. Which product should be used to accomplish this goal?

  • A. Cisco Firepower
  • B. Cisco Umbrella
  • C. Cisco ISE
  • D. Cisco AMP
Discover Answer Hide Answer

A

Question#27

An engineer notices traffic interruptions on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?

  • A. Storm Control
  • B. embedded event monitoring
  • C. access control lists
  • D. Bridge Protocol Data Unit guard
Discover Answer Hide Answer

A

Question#28

What is a feature of Cisco NetFlow Secure Event Logging for Cisco ASAs?

  • A. Multiple NetFlow collectors are supported.
  • B. Advanced NetFlow v9 templates and legacy v5 formatting are supported.
  • C. Secure NetFlow connectors are optimized for Cisco Prime Infrastructure
  • D. Flow-create events are delayed.
Discover Answer Hide Answer

A

Question#29

What is a key difference between Cisco Firepower and Cisco ASA?

  • A. Cisco Firepower provides identity based access control while Cisco ASA does not.
  • B. Cisco AS provides access control while Cisco Firepower does not.
  • C. Cisco ASA provides SSL inspection while Cisco Firepower does not.
  • D. Cisco Firepower natively provides intrusion prevention capabilities while Cisco ASA does not.
Discover Answer Hide Answer

D

Question#30

DRAG DROP -
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right.
Select and Place:

Discover Answer Hide Answer


chevron rightPrevious Nextchevron right