Download Implementing and Operating Cisco Security Core Technologies.350-701.DumpsBase.2021-05-10.102q.vcex

Vendor: Cisco
Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies
Date: May 10, 2021
File Size: 906 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which feature requires a network discovery policy on the Cisco Firepower Next Generation Intrusion Prevention System?
  1. security intelligence
  2. impact flags
  3. health monitoring
  4. URL filtering
Correct answer: A
Question 2
Refer to the exhibit. 
   
  
Which statement about the authentication protocol used in the configuration is true?
  1. The authentication request contains only a password
  2. The authentication request contains only a username
  3. The authentication and authorization requests are grouped in a single packet.
  4. There are separate authentication and authorization request packets.
Correct answer: C
Question 3
Which two preventive measures are used to control cross-site scripting? (Choose two.)
  1. Enable client-side scripts on a per-domain basis.
  2. Incorporate contextual output encoding/escaping.
  3. Disable cookie inspection in the HTML inspection engine.
  4. Run untrusted HTML input through an HTML sanitization engine.
  5. SameSite cookie attribute should not be used.
Correct answer: AB
Question 4
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
  1. correlation
  2. intrusion
  3. access control
  4. network discovery
Correct answer: D
Question 5
Refer to the exhibit. 
   
  
Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
  1. show authentication registrations
  2. show authentication method
  3. show dot1x all
  4. show authentication sessions
Correct answer: B
Question 6
An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address.  
Which list contains the allowed recipient addresses?
  1. SAT
  2. BAT
  3. HAT
  4. RAT
Correct answer: D
Question 7
Which two capabilities does TAXII support? (Choose two.)
  1. exchange
  2. pull messaging
  3. binding
  4. correlation
  5. mitigating
Correct answer: BC
Question 8
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
  1. group policy 
  2. access control policy
  3. device management policy
  4. platform service policy
Correct answer: D
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/platform_settings_policies_for_managed_devices.pdf
Reference: 
https://www.cisco.com/c/en/us/td/docs/security/firepower/622/configuration/guide/fpmc-config-guide-v622/platform_settings_policies_for_managed_devices.pdf
Question 9
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.  
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
  1. Cisco Identity Services Engine and AnyConnect Posture module
  2. Cisco Stealthwatch and Cisco Identity Services Engine integration
  3. Cisco ASA firewall with Dynamic Access Policies configured
  4. Cisco Identity Services Engine with PxGrid services enabled
Correct answer: A
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
Reference: 
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/configure-posture.html
Question 10
What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)
  1. data exfiltration
  2. command and control communication
  3. intelligent proxy
  4. snort
  5. URL categorization
Correct answer: AB
Explanation:
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf
Reference: 
https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!