Free 350-701 Exam Braindumps

Pass your Implementing and Operating Cisco Security Core Technologies exam with these free Questions and Answers

Page 6 of 122
QUESTION 21

- (Exam Topic 3)
What are two recommended approaches to stop DNS tunneling for data exfiltration and command and control call backs? (Choose two.)

  1. A. Use intrusion prevention system.
  2. B. Block all TXT DNS records.
  3. C. Enforce security over port 53.
  4. D. Use next generation firewalls.
  5. E. Use Cisco Umbrella.

Correct Answer: CE

QUESTION 22

- (Exam Topic 3)
How does Cisco Workload Optimization Manager help mitigate application performance issues?

  1. A. It deploys an AWS Lambda system
  2. B. It automates resource resizing
  3. C. It optimizes a flow path
  4. D. It sets up a workload forensic score

Correct Answer: B
Reference:
https://www.cisco.com/c/dam/en/us/solutions/collateral/data-center-virtualization/one-enterprisesuite/solution-o

QUESTION 23

- (Exam Topic 2)
Refer to the exhibit.
350-701 dumps exhibit
What will happen when this Python script is run?

  1. A. The compromised computers and malware trajectories will be received from Cisco AMP
  2. B. The list of computers and their current vulnerabilities will be received from Cisco AMP
  3. C. The compromised computers and what compromised them will be received from Cisco AMP
  4. D. The list of computers, policies, and connector statuses will be received from Cisco AMP

Correct Answer: D
Reference:
https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+/v1/computers&api_host=api.apjc.

QUESTION 24

- (Exam Topic 3)
Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

  1. A. Malware installation
  2. B. Command-and-control communication
  3. C. Network footprinting
  4. D. Data exfiltration

Correct Answer: D
Reference: https://www.netsurion.com/articles/5-types-of-dns-attacks-and-how-to-detect-them

QUESTION 25

- (Exam Topic 3)
A network engineer must configure a Cisco ESA to prompt users to enter two forms of information before gaining access The Cisco ESA must also join a cluster machine using preshared keys What must be configured to meet these requirements?

  1. A. Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA CLI.
  2. B. Enable two-factor authentication through a RADIUS server and then join the cluster by using the Cisco ESA GUI
  3. C. Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA GUI.
  4. D. Enable two-factor authentication through a TACACS+ server and then join the cluster by using the Cisco ESA CLI

Correct Answer: A

Page 6 of 122

Post your Comments and Discuss Cisco 350-701 exam with other Community members: