Download Cisco.350-701.NewDumps.2021-02-14.213q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Cisco.350-701.NewDumps.2021-02-14.213q.vcex
Size 6 MB
Posted Feb 14, 2021
Download Cisco.350-701.NewDumps.2021-02-14.213q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which two key and block sizes are valid for AES? (Choose two.)


  1. 64-bit block size, 112-bit key length
  2. 64-bit block size, 168-bit key length
  3. 128-bit block size, 192-bit key length
  4. 128-bit block size, 256-bit key length
  5. 192-bit block size, 256-bit key length
Correct answer: CD



Question 2

Refer to the exhibit. 
   
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?


  1. show authentication registrations
  2. show authentication method
  3. show dot1x all
  4. show authentication sessions
Correct answer: D



Question 3

Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?


  1. transparent
  2. redirection
  3. forward
  4. proxy gateway
Correct answer: A



Question 4

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?


  1. Platform Exchange Grid 
  2. Advanced Malware Protection
  3. Multifactor Platform Integration
  4. Firepower Threat Defense
Correct answer: A



Question 5

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?


  1. url
  2. profile
  3. terminal
  4. selfsigned
Correct answer: B



Question 6

What are two list types within AMP for Endpoints Outbreak Control? (Choose two.)


  1. blocked ports
  2. simple custom detections
  3. command and control
  4. allowed applications
  5. URL
Correct answer: BD



Question 7

An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network. What must be configured, based on a predefined threshold, to address this issue?


  1. Bridge Protocol Data Unit guard
  2. embedded event monitoring
  3. access control lists 
  4. Storm Control
Correct answer: D
Explanation:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr-e1.html
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/command/eem-cr-book/eem-cr-e1.html



Question 8

What is the purpose of the certificate signing request when adding a new certificate for a server?


  1. It is the password for the certificate that is needed to install it with.
  2. It provides the server information so a certificate can be created and signed
  3. It is the certificate that will be loaded onto the server
  4. It provides the certificate client information so the server can authenticate against it when installing
Correct answer: B
Explanation:
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_cert.html
https://www.cisco.com/en/US/docs/security/ise/1.0/user_guide/ise10_man_cert.html



Question 9

In which cloud services model is the tenant responsible for virtual machine OS patching?


  1. IaaS
  2. UCaaS
  3. PaaS
  4. SaaS
Correct answer: A



Question 10

What is the benefit of installing Cisco AMP for Endpoints on a network?


  1. It provides operating system patches on the endpoints for security.
  2. It provides flow-based visibility for the endpoints' network connections.
  3. It protects endpoint systems through application control and real-time scanning.
  4. It enables behavioral analysis to be used for the endpoints.
Correct answer: C
Explanation:
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/at-a-glance
https://www.cisco.com/c/en/us/solutions/collateral/enterprise-networks/advanced-malware-protection/at-a-glance









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files