Download Implementing and Operating Cisco Security Core Technologies.VCEplus.350-701.2020-03-05.1e.98q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Implementing and Operating Cisco Security Core Technologies.VCEplus.350-701.2020-03-05.1e.98q.vcex
Size 780 Kb
Posted March 05, 2020
Downloads 66

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?

  • A: security intelligence
  • B: impact flags
  • C: health monitoring
  • D: URL filtering

Question 2

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?

  • A: The authentication request contains only a password
  • B: The authentication request contains only a username
  • C: The authentication and authorization requests are grouped in a single packet.
  • D: There are separate authentication and authorization request packets.

Question 3
Which two preventive measures are used to control cross-site scripting? (Choose two.)

  • A: Enable client-side scripts on a per-domain basis.
  • B: Incorporate contextual output encoding/escaping.
  • C: Disable cookie inspection in the HTML inspection engine.
  • D: Run untrusted HTML input through an HTML sanitization engine.
  • E: SameSite cookie attribute should not be used.

Question 4
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System? 

  • A: correlation
  • B: intrusion
  • C: access control
  • D: network discovery

Question 5

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

  • A: show authentication registrations
  • B: show authentication method
  • C: show dot1x all
  • D: show authentication sessions

Question 6
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address. Which list contains the allowed recipient addresses?

  • A: SAT
  • B: BAT
  • C: HAT
  • D: RAT

Question 7
Which two capabilities does TAXII support? (Choose two.)

  • A: exchange
  • B: pull messaging
  • C: binding
  • D: correlation
  • E: mitigating

Question 8
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

  • A: group policy
  • B: access control policy
  • C: device management policy
  • D: platform service policy

Question 9
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10. What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

  • A: Cisco Identity Services Engine and AnyConnect Posture module
  • B: Cisco Stealthwatch and Cisco Identity Services Engine integration
  • C: Cisco ASA firewall with Dynamic Access Policies configured
  • D: Cisco Identity Services Engine with PxGrid services enabled

Question 10
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

  • A: data exfiltration
  • B: command and control communication 
  • C: intelligent proxy
  • D: snort
  • E: URL categorization


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files