A network administrator is configuring a rule in an access control policy to block certain URLs and selects the "Chat and Instant Messaging" category.Which reputation score should be selected to accomplish this goal?
Answer(s): D
We choose "Chat and Instant Messaging" category in "URL Category":To block certain URLs we need to choose URL Reputation from 6 to 10.
Which group within Cisco writes and publishes a weekly newsletter to help cybersecurity professionals remain aware of the ongoing and most prevalent threats?
Answer(s): B
Talos Threat Source is a regular intelligence update from Cisco Talos, highlighting the biggest threats each week and other security news.
https://talosintelligence.com/newsletters
What are the two types of managed Intercloud Fabric deployment models? (Choose two.)
Answer(s): B,C
Many enterprises prefer to deploy development workloads in the public cloud, primarily for convenience and faster deployment. This approach can cause concern for IT administrators, who must control the flow of ITtraffic and spending and help ensure the security of data and intellectual property. Without the proper controls,data and intellectual property can escape this oversight. The Cisco Intercloud Fabric solution helps control this shadow IT, discovering resources deployed in the public cloud outside IT control and placing these resources under Cisco Intercloud Fabric control.Cisco Intercloud Fabric addresses the cloud deployment requirements appropriate for two hybrid cloud deployment models: Enterprise Managed (an enterprise manages its own cloud environments) and ServiceProvider Managed (the service provider administers and controls all cloud resources).
https://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric.pdf The Cisco Intercloud Fabric architecture provides two product configurations to address the following two consumption models:+ Cisco Intercloud Fabric for Business+ Cisco Intercloud Fabric for Providershttps://www.cisco.com/c/en/us/td/docs/solutions/Hybrid_Cloud/Intercloud/Intercloud_Fabric/ Intercloud_Fabric_2.html
What are two DDoS attack categories? (Choose two)
Answer(s): B,D
There are three basic categories of attack:+ volume-based attacks, which use high traffic to inundate the network bandwidth + protocol attacks, which focus on exploiting server resources + application attacks, which focus on web applications and are considered the most sophisticated and serious type of attacks
https://www.esecurityplanet.com/networks/types-of-ddos- attacks/
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A commented on January 16, 2024 Good Colombia Anonymous upvote
Kim commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.