Download Implementing and Operating Cisco Security Core Technologies.prepaway.350-701.2021-04-02.1e.136q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Implementing and Operating Cisco Security Core Technologies.prepaway.350-701.2021-04-02.1e.136q.vcex
Size 1.87 Mb
Posted April 02, 2021
Downloads 4
Download Implementing and Operating Cisco Security Core Technologies.prepaway.350-701.2021-04-02.1e.136q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%



 
 



Demo Questions

Question 1

Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

  • A: security intelligence
  • B: impact flags
  • C: health monitoring
  • D: URL filtering

Correct Answer: A




Question 2

    

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?

  • A: The authentication request contains only a password
  • B: The authentication request contains only a username
  • C: The authentication and authorization requests are grouped in a single packet.
  • D: There are separate authentication and authorization request packets.

Correct Answer: C




Question 3

Which two preventive measures are used to control cross-site scripting? (Choose two.)

  • A: Enable client-side scripts on a per-domain basis.
  • B: Incorporate contextual output encoding/escaping.
  • C: Disable cookie inspection in the HTML inspection engine.
  • D: Run untrusted HTML input through an HTML sanitization engine.
  • E: SameSite cookie attribute should not be used.

Correct Answer: AB




Question 4

Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

  • A: correlation
  • B: intrusion
  • C: access control
  • D: network discovery

Correct Answer: D




Question 5

    

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

  • A: show authentication registrations
  • B: show authentication method
  • C: show dot1x all
  • D: show authentication sessions

Correct Answer: B




Question 6

An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address.  
Which list contains the allowed recipient addresses? 

  • A: SAT
  • B: BAT
  • C: HAT
  • D: RAT

Correct Answer: D




Question 7

Which two capabilities does TAXII support? (Choose two.)

  • A: exchange
  • B: pull messaging
  • C: binding
  • D: correlation
  • E: mitigating

Correct Answer: BC




Question 8

Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

  • A: group policy
  • B: access control policy
  • C: device management policy
  • D: platform service policy

Correct Answer: D

Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/platform_settings_policies_for_managed_devices.pdf




Question 9

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.  
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

  • A: Cisco Identity Services Engine and AnyConnect Posture module 
  • B: Cisco Stealthwatch and Cisco Identity Services Engine integration
  • C: Cisco ASA firewall with Dynamic Access Policies configured
  • D: Cisco Identity Services Engine with PxGrid services enabled

Correct Answer: A

Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html




Question 10

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

  • A: data exfiltration
  • B: command and control communication
  • C: intelligent proxy
  • D: snort
  • E: URL categorization

Correct Answer: AB

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf










CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files