Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

350-701 Exam Dumps - Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Go to page:
Question # 73

Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)

A.

transparent mode

B.

routed mode

C.

inline mode

D.

active mode

E.

passive monitor-only mode

Full Access
Question # 74

Which cloud service offering allows customers to access a web application that is being hosted, managed, and maintained by a cloud service provider?

A.

IaC

B.

SaaS

C.

IaaS

D.

PaaS

Full Access
Question # 75

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key

establishment?

A.

RSA is an asymmetric key establishment algorithm intended to output symmetric keys

B.

RSA is a symmetric key establishment algorithm intended to output asymmetric keys

C.

DH is a symmetric key establishment algorithm intended to output asymmetric keys

D.

DH is an asymmetric key establishment algorithm intended to output symmetric keys

Full Access
Question # 76

How does DNS Tunneling exfiltrate data?

A.

An attacker registers a domain that a client connects to based on DNS records and sends malware throughthat connection.

B.

An attacker opens a reverse DNS shell to get into the client’s system and install malware on it.

C.

An attacker uses a non-standard DNS port to gain access to the organization’s DNS servers in order topoison the resolutions.

D.

An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a maliciousdomain.

Full Access
Question # 77

On which part of the IT environment does DevSecOps focus?

A.

application development

B.

wireless network

C.

data center

D.

perimeter network

Full Access
Question # 78

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which

probe must be enabled for this type of profiling to work?

A.

NetFlow

B.

NMAP

C.

SNMP

D.

DHCP

Full Access
Question # 79

Which key feature of Cisco ZFW is unique among other Cisco IOS firewall solutions?

A.

Security levels

B.

Stateless inspection

C.

Security zones

D.

SSL inspection

Full Access
Question # 80

Refer to the exhibit. An engineer is implementing a certificate-based VPN. What is the result of the existing configuration?

A.

The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER.

B.

The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy.

C.

Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully.

D.

The OU of the IKEv2 peer certificate is set to MANGLER.

Full Access
Go to page: