Master Cisco 350-701: Your Gateway to Cybersecurity Excellence
Client workstations are experiencing extremely poor response time. An engineer suspects that an attacker is eavesdropping and making independent connections while relaying messages between victims to make them think they are talking to each other over a private connection. Which feature must be enabled and configured to provide relief from this type of attack?
Correct : D
Start a Discussions
Which action must be taken in the AMP for Endpoints console to detect specific MD5 signatures on endpoints and then quarantine the files?
Correct : A
Start a Discussions
What is the target in a phishing attack?
Correct : D
Start a Discussions
Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)
Correct : A, D
Start a Discussions
What must be configured on Cisco Secure Endpoint to create a custom detection tile list to detect and quarantine future files?
Correct : C
In Cisco Secure Endpoint, to create a custom detection file list for detecting and quarantining future files, an advanced custom detection should be created, and the hash of each file to be detected and quarantined should be uploaded. This allows the system to uniquely identify and take action on files based on their hash values, providing a precise method for targeting specific malicious or unwanted files.
Start a Discussions
Total 633 questions