Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 19 out of 126 Pages

Topic 1: Exam Pool A

Which two kinds of attacks are prevented by multifactor authentication? (Choose two)


A.

phishing


B.

brute force


C.

man-in-the-middle


D.

DDOS


E.

teardrop





B.
  

brute force



C.
  

man-in-the-middle



Drag and drop the steps from the left into the correct order on the right to enable
AppDynamics to monitor an EC2 instance in Amazon Web Services






 

Graphical user interface, text, application, email
Description automatically generated

Refer to the exhibit.

What will happen when this Python script is run?


A.

The compromised computers and malware trajectories will be received from Cisco AMP


B.

The list of computers and their current vulnerabilities will be received from Cisco AMP


C.

The compromised computers and what compromised them will be received from Cisco
AMP


D.

The list of computers, policies, and connector statuses will be received from Cisco AMP





D.
  

The list of computers, policies, and connector statuses will be received from Cisco AMP



An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?


A.

Port Bounce


B.

CoA Terminate


C.

CoA Reauth


D.

CoA Session Query





C.
  

CoA Reauth



An engineer has been tasked with implementing a solution that can be leveraged for securing the cloud users, data, and applications. There is a requirement to use the Cisco cloud native CASB and cloud cybersecurity platform. What should be used to meet these requirements?


A.

Cisco Umbrella


B.

Cisco Cloud Email Security


C.

Cisco NGFW


D.

Cisco Cloudlock





D.
  

Cisco Cloudlock




Page 19 out of 126 Pages
Previous