Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

350-701 Exam Questions Tutorials

Page: 40 / 52
Total 688 questions

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) Questions and Answers

Question 157

An administrator is adding a new switch onto the network and has configured AAA for network access control. When testing the configuration, the RADIUS authenticates to Cisco ISE but is being rejected. Why is the ip radius source-interface command needed for this configuration?

Options:

A.

Only requests that originate from a configured NAS IP are accepted by a RADIUS server

B.

The RADIUS authentication key is transmitted only from the defined RADIUS source interface

C.

RADIUS requests are generated only by a router if a RADIUS source interface is defined.

D.

Encrypted RADIUS authentication requires the RADIUS source interface be defined

Question 158

How does Cisco Workload Optimization Manager help mitigate application performance issues?

Options:

A.

It deploys an AWS Lambda system

B.

It automates resource resizing

C.

It optimizes a flow path

D.

It sets up a workload forensic score

Question 159

Which two kinds of attacks are prevented by multifactor authentication? (Choose two)

Options:

A.

phishing

B.

brute force

C.

man-in-the-middle

D.

DDOS

E.

teardrop

Question 160

An engineer is configuring Cisco Secure Endpoint to enhance security by preventing the execution of certain files by users. The engineer needs to ensure that the specific executable file name Cisco_Software_0505446151.exe is blocked from running while never being quarantined. What must the engineer configure to meet the requirement?

Options:

A.

Create advanced custom detection list.

B.

Configure application control blocked applications list.

C.

Implement simple custom detection list.

D.

Enable scheduled scans to detect and block the executable files.

Page: 40 / 52
Total 688 questions