350-701 Dumps

350-701 Free Practice Test

Cisco 350-701: Implementing and Operating Cisco Security Core Technologies

QUESTION 126

- (Exam Topic 1)
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?

Correct Answer: A
Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Aug2013/CVDWebSecurityUsingCiscoWSADesign

QUESTION 127

- (Exam Topic 1)
Refer to the exhibit.
350-701 dumps exhibit
What does the number 15 represent in this configuration?

Correct Answer: B
The syntax of this command is shown below:snmp-server group [group-name {v1 | v2c | v3 [auth | noauth | priv]}] [read read-view] [write write-view] [notify notify-view] [access access-list]The command above restricts which IP source addresses are allowed to access SNMP functions on the router. You could restrict SNMP access by simply applying an interface ACL to block incoming SNMP packets that don’t come from trusted servers. However, this would not be as effective as using the global SNMP commands shown in this recipe. Because you can apply this method once for the whole router, it is much simpler than applying ACLs to block SNMP on all interfaces separately. Also, using interface ACLs would block not only SNMP packets intended for this router, but also may stop SNMP packets that just happened to be passing through on their way to some other destination device.

QUESTION 128

- (Exam Topic 3)
An engineer recently completed the system setup on a Cisco WSA Which URL information does the system send to SensorBase Network servers?

Correct Answer: B

QUESTION 129

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

Correct Answer: BD
Reference: https://en.wikipedia.org/wiki/Ping_of_death

QUESTION 130

Which technology reduces data loss by identifying sensitive information stored in public computing environments?

Correct Answer: D
Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cloudlock/cisco-cloudlock-cloud-data-security-datasheet.pdf