Free 350-701 Exam Braindumps (page: 47)

Page 47 of 153

A user has a device in the network that is receiving too many connection requests from multiple machines.

Which type of attack is the device undergoing?

  1. phishing
  2. slowloris
  3. pharming
  4. SYN flood

Answer(s): D



An organization is receiving SPAM emails from a known malicious domain.
What must be configured in order to prevent the session during the initial TCP communication?

  1. Configure the Cisco ESA to drop the malicious emails
  2. Configure policies to quarantine malicious emails
  3. Configure policies to stop and reject communication
  4. Configure the Cisco ESA to reset the TCP connection

Answer(s): D



A Cisco Firepower administrator needs to configure a rule to allow a new application that has never been seen on the network.
Which two actions should be selected to allow the traffic to pass without inspection? (Choose two)

  1. permit
  2. trust
  3. reset
  4. allow
  5. monitor

Answer(s): B,E

Explanation:

Each rule also has an action, which determines whether you monitor, trust, block, or allow matching traffic.
Note: With action "trust", Firepower does not do any more inspection on the traffic. There will be no intrusion protection and also no file-policy on this traffic.



An engineer needs behavioral analysis to detect malicious activity on the hosts, and is configuring the organization's public cloud to send telemetry using the cloud provider's mechanisms to a security device.
Which mechanism should the engineer configure to accomplish this goal?

  1. mirror port
  2. Flow
  3. NetFlow
  4. VPC flow logs

Answer(s): C



Page 47 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote