Limited Time Discount Offer 20% Off - Ends in 0d 00h 00m 00s - Coupon code: 20good

350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Questions and Answers

Questions 4

What does the Cloudlock Apps Firewall do to mitigate security concerns from an application perspective?

Options:

A. It allows the administrator to quarantine malicious files so that the application can function, just not maliciously.
B. It discovers and controls cloud apps that are connected to a company’s corporate environment.
C. It deletes any application that does not belong in the network.
D. It sends the application information to an administrator to act on.
Questions 5

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

Options:

A. DNS tunneling
B. DNSCrypt
C. DNS security
D. DNSSEC
Buy Now
Questions 6

Which algorithm provides encryption and authentication for data plane communication?

Options:

A. AES-GCM
B. SHA-96
C. AES-256
D. SHA-384
Buy Now
Questions 7

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Options:

A. Cisco SDA
B. Cisco Firepower
C. Cisco HyperFlex
D. Cisco Cloudlock
Questions 8

Refer to the exhibit.

represent in this configuration

What does the number 15 represent in this configuration?

Options:

A. privilege level for an authorized user to this router
B. access list that identifies the SNMP devices that can access the router
C. interval in seconds between SNMPv3 authentication attempts
D. number of possible failed attempts until the SNMPv3 user is locked out
Buy Now
Questions 9

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?

Options:

A. SNMP
B. SMTP
C. syslog
D. model-driven telemetry
Questions 10

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

Options:

A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Questions 11

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services Engine? (Choose two.)

Options:

A. RADIUS
B. TACACS+
C. DHCP
D. sFlow
E. SMTP
Questions 12

Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right.

Options:

Drag and drop the Firepower Next
Questions 13

Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?

Options:

A. Nexus
B. Stealthwatch
C. Firepower
D. Tetration
Buy Now
Questions 14

Refer to the exhibit.

used to display this output

Which command was used to display this output?

Options:

A. show dot1x all
B. show dot1x
C. show dot1x all summary
D. show dot1x interface gi1/0/12
Questions 15

Refer to the exhibit.

result of the configuration

What is a result of the configuration?

Options:

A. Traffic from the DMZ network is redirected.
B. Traffic from the inside network is redirected.
C. All TCP traffic is redirected.
D. Traffic from the inside and DMZ networks is redirected.
Buy Now
Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
Last Update: May 28, 2020
Questions: 102

PDF + Testing Engine

$109.59  $136.99

Testing Engine

$79.99  $99.99

PDF (Q&A)

$72  $90