Free 350-701 Exam Braindumps (page: 43)

Page 43 of 153

A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category.
Which reputation score should be selected to accomplish this goal?

  1. 1
  2. 3
  3. 5
  4. 10

Answer(s): D

Explanation:

We choose "Chat and Instant Messaging" category in "URL Category":



To block certain URLs we need to choose URL Reputation from 6 to 10.



Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?

  1. PSIRT
  2. Talos
  3. CSIRT
  4. DEVNET

Answer(s): B

Explanation:

Talos Threat Source is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.


Reference:

https://talosintelligence.com/newsletters



What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

  1. Public managed
  2. Service Provider managed
  3. Enterprise managed
  4. User managed
  5. Hybrid managed

Answer(s): B,C

Explanation:

Many enterprises prefer to deploy development workloads in the public cloud, primarily for convenience and faster deployment. This approach can cause concern for IT administrators, who must control the flow of IT
traffic and spending and help ensure the security of data and intellectual property. Without the proper controls,
data and intellectual property can escape this oversight. The Cisco Intercloud Fabric solution helps control this shadow IT, discovering resources deployed in the public cloud outside IT control and placing these resources under Cisco Intercloud Fabric control.
Cisco Intercloud Fabric addresses the cloud deployment requirements appropriate for two hybrid cloud deployment models: Enterprise Managed (an enterprise manages its own cloud environments) and Service
Provider Managed (the service provider administers and controls all cloud resources).


Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric.pdf The Cisco Intercloud Fabric architecture provides two product configurations to address the following two consumption models:
+ Cisco Intercloud Fabric for Business
+ Cisco Intercloud Fabric for Providers


https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric/ Intercloud_Fabric_2.html



What are two DDoS attack categories? (Choose two)

  1. sequential
  2. protocol
  3. database
  4. volume-based
  5. screen-based

Answer(s): B,D

Explanation:

There are three basic categories of attack:
+ volume-based attacks, which use high traffic to inundate the network bandwidth + protocol attacks, which focus on exploiting server resources + application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks


Reference:

https://www.esecurityplanet.com/networks/types-of-ddos- attacks/



Page 43 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote