350-701 Dumps

350-701 Braindumps

350-701 Real Questions

350-701 Practice Test

350-701 Actual Questions


killexams.com


Cisco


350-701


Implementing and Operating Cisco Security Core Technologies (SCOR)


https://killexams.com/pass4sure/exam-detail/350-701

Question: 721


Which information is required when adding a device to Firepower Management Center?

  1. username and password

  2. encryption method

  3. device serial number

  4. registration key


Answer: D Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguide-v60/Device_Management_Basics.html#ID-2242-0000069d


Question: 722


Which technology is used to improve web traffic performance by proxy caching?

  1. WSA

  2. Firepower

  3. FireSIGHT

  4. ASA


Answer: A


Question: 723


What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)

  1. blocked ports

  2. simple custom detections

  3. command and control

  4. allowed applications

  5. URL


Answer: BD Explanation:

Reference: https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf chapter


Question: 724


DRAG DROP


Drag and drop the capabilities from the left onto the correct technologies on the right.


Answer:


Question: 725


How does Cisco Stealthwatch Cloud provide security for cloud environments?

  1. It delivers visibility and threat detection.

  2. It prevents exfiltration of sensitive data.

  3. It assigns Internet-based DNS protection for clients and servers.

  4. It facilitates secure connectivity between public and private networks.


Answer: A Explanation:

Reference: https://www.content.shi.com/SHIcom/ContentAttachmentImages/SharedResources/FBLP/Cisco/Cisco-091919-Simple-IT-Whitepaper.pdf


Question: 726


Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?

  1. To view bandwidth usage for NetFlow records, the QoS feature must be enabled.

  2. A sysopt command can be used to enable NSEL on a specific interface.

  3. NSEL can be used without a collector configured.

  4. A flow-export event type must be defined under a policy.


Answer: D


Question: 727


What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

  1. data exfiltration

  2. command and control communication

  3. intelligent proxy

  4. snort

  5. URL categorization


Answer: AB Explanation:

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-aglance-c45-736555.pdf


Question: 728


Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

  1. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.

  2. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

  3. The IPsec configuration that is set up on the active device must be duplicated on the standby device.

  4. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

  5. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.


Answer: BC Explanation:

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/secvpn-availability-15-mt-book/sec-state-fail-ipsec.html


Question: 729


Which two key and block sizes are valid for AES? (Choose two.)

  1. 64-bit block size, 112-bit key length

  2. 64-bit block size, 168-bit key length

  3. 128-bit block size, 192-bit key length

  4. 128-bit block size, 256-bit key length

  5. 192-bit block size, 256-bit key length


DRAG DROP


Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.



Answer:


Explanation:


Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/640/configuration/guide/fpmc-configguide-v64/detecting_specific_threats.html


Question: 731


An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.


What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

  1. Cisco Identity Services Engine and AnyConnect Posture module

  2. Cisco Stealthwatch and Cisco Identity Services Engine integration

  3. Cisco ASA firewall with Dynamic Access Policies configured

  4. Cisco Identity Services Engine with PxGrid services enabled


Which algorithm provides encryption and authentication for data plane communication?

  1. AES-GCM

  2. SHA-96

  3. AES-256

  4. SHA-384


Answer: A


Question: 733


Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

  1. phishing

  2. brute force

  3. man-in-the-middle

  4. DDOS

  5. tear drop


Answer: BC


Question: 734


Which deployment model is the most secure when considering risks to cloud adoption?

  1. public cloud

  2. hybrid cloud

  3. community cloud

  4. private cloud


Answer: D


Question: 735


Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

  1. security intelligence

  2. impact flags

  3. health monitoring

  4. URL filtering


Answer: A


Question: 736


Which technology reduces data loss by identifying sensitive information stored in public computing environments?

  1. Cisco SDA

  2. Cisco Firepower

  3. Cisco HyperFlex

  4. Cisco Cloudlock


Answer: D Explanation:

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlockcloud-data-security-datasheet.pdf


Question: 737


Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

  1. DNS tunneling

  2. DNSCrypt

  3. DNS security

  4. DNSSEC


Answer: A Explanation:

Reference: https://learn-umbrella.cisco.com/cloud-security/dns-tunneling


Question: 738


What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

  1. biometric factor

  2. time factor

  3. confidentiality factor

  4. knowledge factor

  5. encryption factor


Answer: AD


Question: 739


Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?

  1. File Analysis

  2. SafeSearch

  3. SSL Decryption

  4. Destination Lists


Answer: C