Cisco 350-701 Implementing and Operating Cisco Security Core Technologies SCOR Exam Practice Test

Page: 1 / 14
Total 633 questions
Question 1

Which term describes when the Cisco Secure Firewall downloads threat intelligence updates from Cisco Tables?

Answer : D

When the Cisco Secure Firewall downloads threat intelligence updates from Cisco Talos, it is engaged in 'consumption.' This term refers to the process of receiving and utilizing threat intelligence data to enhance security measures. Cisco Talos provides comprehensive threat intelligence that Cisco Secure Firewall consumes to update its threat detection and prevention capabilities.

Question 2

What is a functional difference between Cisco Secure Endpoint and Cisco Umbrella Roaming Client?

Answer : B

The functional difference between Cisco Secure Endpoint (formerly known as AMP for Endpoints) and Cisco Umbrella Roaming Client lies in their approach to security. Cisco Secure Endpoint is designed to prevent, detect, and respond to threats on the endpoint devices. It provides comprehensive protection by stopping and tracking malicious files and activities on hosts, utilizing continuous analysis and retrospective security to address threats at various stages of the attack continuum. On the other hand, Cisco Umbrella Roaming Client is focused on DNS and IP layer enforcement to prevent internet-based threats before a connection is established. It primarily tracks and blocks URL-based threats by enforcing security at the DNS layer, thus preventing access to malicious domains. Therefore, while Secure Endpoint provides broad endpoint protection against a variety of threats, the Umbrella Roaming Client specifically targets URL-based threats.

Question 3

An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

Question 4
Question 5

A network engineer must create an access control list on a Cisco Adaptive Security Appliance firewall. The access control list must permit HTTP traffic to the internet from the organization's inside network Which IOS command must oe used to create the access control list?





Answer : B

Question 6

An engineer must configure Cisco AMP for Endpoints so that it contains a list of files that should not be executed by users. These files must not be quarantined. Which action meets this configuration requirement?

Answer : C

Question 7

A security engineer must add destinations into a destination list in Cisco Umbrell

a. What describes the application of these changes?

Answer : A

Page:    1 / 14   
Total 633 questions