350-701 Dumps

350-701 Free Practice Test

Cisco 350-701: Implementing and Operating Cisco Security Core Technologies

QUESTION 86

- (Exam Topic 2)
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

Correct Answer: B

QUESTION 87

- (Exam Topic 2)
What is a benefit of conducting device compliance checks?

Correct Answer: B

QUESTION 88

- (Exam Topic 1)
What is a required prerequisite to enable malware file scanning for the Secure Internet Gateway?

Correct Answer: D

QUESTION 89

- (Exam Topic 2)
An organization recently installed a Cisco WSA and would like to take advantage of the AVC engine to allow the organization to create a policy to control application specific activity. After enabling the AVC engine, what must be done to implement this?

Correct Answer: C
The Application Visibility and Control (AVC) engine lets you create policies to control application activity on the network without having to fully understand the underlying technology of each application. You can configure application control settings in Access Policy groups. You can block or allow applications individually or according to application type. You can also apply controls to particular application types.

QUESTION 90

- (Exam Topic 3)
An organization wants to provide visibility and to identify active threats in its network using a VM. The organization wants to extract metadata from network packet flow while ensuring that payloads are not retained or transferred outside the network. Which solution meets these requirements?

Correct Answer: B
Reference:
https://www.ciscolive.com/c/dam/r/ciscolive/us/docs/2019/pdf/5eU6DfQV/LTRSEC-2240-LG2.pdf