Download Implementing and Operating Cisco Security Core Technologies.prepaway.350-701.2021-03-16.1e.107q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Implementing and Operating Cisco Security Core Technologies.prepaway.350-701.2021-03-16.1e.107q.vcex
Size 1.85 Mb
Posted March 16, 2021
Downloads 8

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1

Refer to the exhibit. Which statement about the authentication protocol used in the configuration is true?

  • A: The authentication request contains only a password
  • B: The authentication request contains only a username
  • C: The authentication and authorization requests are grouped in a single packet.
  • D: There are separate authentication and authorization request packets.

Question 2
Which two preventive measures are used to control cross-site scripting? (Choose two.)

  • A: Enable client-side scripts on a per-domain basis.
  • B: Incorporate contextual output encoding/escaping.
  • C: Disable cookie inspection in the HTML inspection engine.
  • D: Run untrusted HTML input through an HTML sanitization engine.
  • E: SameSite cookie attribute should not be used.

Question 3
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?

  • A: correlation
  • B: intrusion
  • C: access control
  • D: network discovery

Question 4

Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?

  • A: show authentication registrations
  • B: show authentication method
  • C: show dot1x all
  • D: show authentication sessions

Question 5
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address.  
Which list contains the allowed recipient addresses? 

  • A: SAT
  • B: BAT
  • C: HAT
  • D: RAT

Question 6
Which two capabilities does TAXII support? (Choose two.)

  • A: exchange
  • B: pull messaging
  • C: binding
  • D: correlation
  • E: mitigating

Question 7
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?

  • A: group policy
  • B: access control policy
  • C: device management policy
  • D: platform service policy

Question 8
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.  
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

  • A: Cisco Identity Services Engine and AnyConnect Posture module 
  • B: Cisco Stealthwatch and Cisco Identity Services Engine integration
  • C: Cisco ASA firewall with Dynamic Access Policies configured
  • D: Cisco Identity Services Engine with PxGrid services enabled

Question 9
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

  • A: data exfiltration
  • B: command and control communication
  • C: intelligent proxy
  • D: snort
  • E: URL categorization

Question 10
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A: smurf
  • B: distributed denial of service
  • C: cross-site scripting
  • D: rootkit exploit


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files