Cisco 350-701 Exam
Implementing and Operating Cisco Security Core Technologies (Page 49 )

Updated On: 1-Feb-2026

Which threat involves software being used to gain unauthorized access to a computer system?

  1. virus
  2. NTP amplification
  3. ping of death
  4. HTTP flood

Answer(s): A



Which two key and block sizes are valid for AES? (Choose two)

  1. 64-bit block size, 112-bit key length
  2. 64-bit block size, 168-bit key length
  3. 128-bit block size, 192-bit key length
  4. 128-bit block size, 256-bit key length
  5. 192-bit block size, 256-bit key length

Answer(s): C,D

Explanation:

The AES encryption algorithm encrypts and decrypts data in blocks of 128 bits (block size). It can do this using 128-bit, 192-bit, or 256-bit keys



What is the primary benefit of deploying an ESA in hybrid mode?

  1. You can fine-tune its settings to provide the optimum balance between security and performance for your environment
  2. It provides the lowest total cost of ownership by reducing the need for physical appliances
  3. It provides maximum protection and control of outbound messages
  4. It provides email security while supporting the transition to the cloud

Answer(s): D

Explanation:

Cisco Hybrid Email Security is a unique service offering that facilitates the deployment of your email security infrastructure both on premises and in the cloud. You can change the number of on-premises versus cloud users at any time throughout the term of your contract, assuming the total number of users does not change.
This allows for deployment flexibility as your organization's needs change.



Refer to the exhibit.



What does the API do when connected to a Cisco security appliance?

  1. get the process and PID information from the computers in the network
  2. create an SNMP pull mechanism for managing AMP
  3. gather network telemetry information from AMP for endpoints
  4. gather the network interface information about the computers AMP sees

Answer(s): D

Explanation:

The call to API of "https://api.amp.cisco.com/v1/computers" allows us to fetch list of computers across your organization that Advanced Malware Protection (AMP) sees.


Reference:

https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%

2Fcomputers&api_host=api.apjc.amp.cisco.com&api_resource=Computer&api_version=v1



Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)

  1. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
  2. Cisco FTDv with one management interface and two traffic interfaces configured
  3. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
  4. Cisco FTDv with two management interfaces and one traffic interface configured
  5. Cisco FTDv configured in routed mode and IPv6 configured

Answer(s): A,C



Viewing page 49 of 123
Viewing questions 241 - 245 out of 727 questions



Post your Comments and Discuss Cisco 350-701 exam prep with other Community members:

Join the 350-701 Discussion