350-701 Dumps

350-701 Free Practice Test

Cisco 350-701: Implementing and Operating Cisco Security Core Technologies

QUESTION 151

- (Exam Topic 1)
An engineer needs a solution for TACACS+ authentication and authorization for device administration. The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth. Which product meets all of these requirements?

Correct Answer: B

QUESTION 152

- (Exam Topic 1)
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?

Correct Answer: B

QUESTION 153

- (Exam Topic 2)
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?

Correct Answer: D

QUESTION 154

- (Exam Topic 1)
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)

Correct Answer: DE
Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputablesource. It is usually done through email. The goal is to steal sensitive data like credit card and login information,or to install malware on the victim’s machine.

QUESTION 155

- (Exam Topic 2)
Using Cisco Firepower’s Security Intelligence policies, upon which two criteria is Firepower block based? (Choose two)

Correct Answer: AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/623/configuration/guide/fpmc-configguide-v623/secu