350-701 VOL1 Flashcards
A malicious entity has targeted the CFO of a corporation in an attempt to trick that person into
divulging internal corporate financial information. What of the following best describes the type
of attack that is being executed?
B. whaling
Which of the following can be implemented to mitigate the risks associated with targeted
phishing attacks within a corporation? (Select three)
A. URL filtering
C. Regular user awareness training
E. implement an email and spam filtering appliance
Brute force, man-in-the middle, and dictionary-based attacks can all be mitigated by
implementing which of the following technologies?
E. Multifactor authentication
Which of the following statements are true regarding IKE main mode and aggressive mode?
B. Main mode uses 6 packets to establish the first phase of IKE, aggressive mode uses 3
packets.
Which VPN technology is used for mobile users to connect from anywhere to corporate resources
without the need any client application to be installed?
C. SSL VPN
Which Cisco based group researches and collects security related threats, published articles on
cybersecurity, and offers comprehensive threat intelligence?
A. Talos
In Software Defined Networking (SDN), what is used to describe the API communication
between the SDN controller and the network elements (routers and switches) that it manages?
A. Southbound API
You have configured a Cisco ASA device in multiple context modes. Which of the following are
true regarding multiple context implementations on an ASA? (Select two)
A. Only static routes are supported
D. The admin context is used to configure and administer the other contexts
Which command was issued to generate this output?
C. show dot1x all summary
Netflow version 9 has been implemented on a Cisco ASA. What are the valid NetFlow Secure
Event Logging (NSEL) Event ID’s (Select three)
B. Flow was denied
C. Flow was created
D. Flow was deleted
Which of the following are the responsibility of the customer in a cloud-based Platform as a
Service (PaaS) offering? (Choose two)
A. Application
B. Data
Which of the following are the responsibility of the customer in a cloud-based Software as a
Service (SaaS) offering?
D. None of the above
Which of the following scenarios would most likely result in Company A choosing the deploy a
hybrid cloud model?
C. Company A is concerned about security, but understands that some data can leave their
network in order to increase efficiency.
Which of the following are benefits of utilizing Application Programming Interfaces (APIs) in the
network? (Choose two)
A. Increased efficiency in network management through the use of automation.
B. Better integration with third party applications.
How does Cisco Stealthwatch Enterprise receive telemetry data from endpoints?
C. flow data, including NetFlow, IPFIX, and sFlow