350-701 VOL1 Flashcards

1
Q

A malicious entity has targeted the CFO of a corporation in an attempt to trick that person into
divulging internal corporate financial information. What of the following best describes the type
of attack that is being executed?

A

B. whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following can be implemented to mitigate the risks associated with targeted
phishing attacks within a corporation? (Select three)

A

A. URL filtering
C. Regular user awareness training
E. implement an email and spam filtering appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Brute force, man-in-the middle, and dictionary-based attacks can all be mitigated by
implementing which of the following technologies?

A

E. Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements are true regarding IKE main mode and aggressive mode?

A

B. Main mode uses 6 packets to establish the first phase of IKE, aggressive mode uses 3
packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which VPN technology is used for mobile users to connect from anywhere to corporate resources
without the need any client application to be installed?

A

C. SSL VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Cisco based group researches and collects security related threats, published articles on
cybersecurity, and offers comprehensive threat intelligence?

A

A. Talos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In Software Defined Networking (SDN), what is used to describe the API communication
between the SDN controller and the network elements (routers and switches) that it manages?

A

A. Southbound API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You have configured a Cisco ASA device in multiple context modes. Which of the following are
true regarding multiple context implementations on an ASA? (Select two)

A

A. Only static routes are supported
D. The admin context is used to configure and administer the other contexts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which command was issued to generate this output?

A

C. show dot1x all summary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Netflow version 9 has been implemented on a Cisco ASA. What are the valid NetFlow Secure
Event Logging (NSEL) Event ID’s (Select three)

A

B. Flow was denied
C. Flow was created
D. Flow was deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are the responsibility of the customer in a cloud-based Platform as a
Service (PaaS) offering? (Choose two)

A

A. Application
B. Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are the responsibility of the customer in a cloud-based Software as a
Service (SaaS) offering?

A

D. None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following scenarios would most likely result in Company A choosing the deploy a
hybrid cloud model?

A

C. Company A is concerned about security, but understands that some data can leave their
network in order to increase efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are benefits of utilizing Application Programming Interfaces (APIs) in the
network? (Choose two)

A

A. Increased efficiency in network management through the use of automation.
B. Better integration with third party applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Cisco Stealthwatch Enterprise receive telemetry data from endpoints?

A

C. flow data, including NetFlow, IPFIX, and sFlow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A disgruntled employee has just left the company. Which of the following deployments is best
suited to secure the data within that employees BYOD device?

A

A. Mobile Device Management (MDM)

17
Q

How does Cisco Stealthwatch Cloud receive telemetry data from endpoints? (Select two)

A

B. VPC flow data from Amazaon We Services (AWS)
D. Flow data from Microsoft Azure

18
Q

What are two valid reasons for implementing retrospective security in a network? (Select two)

A

A. Find malware that was previously unidentified
D. Tracing the path that a file took over a period of time

19
Q

How does the Cisco Umbrella product offering determine the policy that should be applied for
inbound DNS requests?

A

D. Cisco Umbrella determines the policy based on the source IP address of the DNS request.

20
Q

Which of the following application layer preprocessor on the Cisco Firepower platform is
responsible for decoding and normalizing web-based requests sent using HTTP and the
associated responses received from web servers?

A

B. HTTP Inspect Preprocessor