Free 350-201 Exam Braindumps (page: 4)

Page 3 of 35

Refer to the exhibit. How must these advisories be prioritized for handling?

  1. The highest priority for handling depends on the type of institution deploying the devices
  2. Vulnerability #2 is the highest priority for every type of institution
  3. Vulnerability #1 and vulnerability #2 have the same priority
  4. Vulnerability #1 is the highest priority for every type of institution

Answer(s): D



Refer to the exhibit. Which two steps mitigate attacks on the webserver from the Internet? (Choose two.)

  1. Create an ACL on the firewall to allow only TLS 1.3
  2. Implement a proxy server in the DMZ network
  3. Create an ACL on the firewall to allow only external connections
  4. Move the webserver to the internal network
  5. Move the webserver to the external network

Answer(s): B,D



Drag and drop the phases to evaluate the security posture of an asset from the left onto the activity that happens during the phases on the right.

Select and Place:

Exhibit A:



Exhibit B:

  1. Please refer to Exhibit B for the answer.

Answer(s): A



According to GDPR, what should be done with data to ensure its confidentiality, integrity, and availability?

  1. Perform a vulnerability assessment
  2. Conduct a data protection impact assessment
  3. Conduct penetration testing
  4. Perform awareness testing

Answer(s): B


Reference:

https://apdcat.gencat.cat/web/.content/03-documentacio/Reglament_general_de_proteccio_de_dades/documents/DPIA-Guide.pdf






Post your Comments and Discuss Cisco® 350-201 exam with other Community members:

350-201 Discussions & Posts