option
My Daypo

CISCO SCOR 350-701 Drag and Drop

COMMENTS STADISTICS RECORDS
TAKE THE TEST
Title of test:
CISCO SCOR 350-701 Drag and Drop

Description:
Cisco CCNP Security 305-701 SCOR Drag and Drop Only

Author:
AVATAR

Creation Date:
07/09/2021

Category:
Computers

Number of questions: 13
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
Drag and drop the capabilities from the left onto the correct technologies on the right. 1 to 1. detection, blocking, tracking, analysis and remediation to protect against targeted persistent malware attacks superior threat prevention and mitigation for know and unknown threats application-layer control and ability to enforce usage and tailor detection policies based on custom applications and URLs combined integrated solution of strong defense and web protection, visibility and controlling solutions.
Drag and drop the Firepower Next Generation Intrustion Prevention System detectors from the left onto the correct definitions on the right. 1 to 1. PortScan Detection Port Sweep Decoy PortScan Distributed PortScan.
Drag and drop the steps from the left into the correct order on the right to enable AppDynamics to monitor an EC2 instance in Amazon Web Services. 1 to 1. Install monitoring extension for AWS EC2 Restart the Machine Engine Update config.yaml Configure a Machine Agent or SIM Agent.
Drag and drop the descriptions from the left onto the correct protocol versions on the right. 2 -> IKEv1 3 -> IKEv2 standard includes NAT-T uses six packets in main mode to stablish phase 1 uses four packets to stablish phase 1 and phase 2 uses three packets in aggressive mode to stablish phase 1 uses EAP for authenticating remote access clients.
Drag and drop the capabilities of Cisco Firepower versus Cisco AMP from the left into the appropriate category on the right. 3 -> Cisco Firepower 3 -> Cisco AMP provides detection, blocking, tracking, analysis and remediation to protect against targeted persistent malware attacks provides superior threat prevention and mitigation for known and unknown threats provides outbreak control through custom detections provides the root cause of a threat based on the indicators of compromise seen provides the ability to perform network discovery provides intrusion prevention before malware compromises the host.
Drag and drop the descriptions from the left onto the encryption algorithms on the right. 2 -> Asymmetric 2 -> Symmetric requires secret keys requieres more time Diffie-Hellman exchange 3DES.
Drag and drop the suspicious patterns for the Cisco Tetration platform from the left onto the correct definitions on the right. 1 to 1. privilege scalation user login suspicious behavior interesting file access file access from a different user.
Drag and drop the common security threats from the left onto the definitions on the right. 1 to 1. phishing botnet spam worm.
Drag and drop the VPN functions from the left onto the description on the right. 1 to 1. RSA AES SHA-1 ISAKMP.
Drag and drop the solutions from the left onto the solution's benefits on the right. 1 to 1. Cisco Stealthwatch Cisco ISE Cisco TrustSec Cisco Umbrella.
Drag and drop the threats from the left onto examples of that threat on the right 1 to 1. DoS/DDoS Insecure APIs data breach compromised credentials.
Drag and drop the cloud security assessment components from the left onto the definitions on the right. 1 to 1. user entity behavior assesment cloud data protection assesment cloud security strategy workshop cloud security architecture assesment.
Drag and drop the NetFlow export formats from the left onto the descriptions on the right. 1 to 1. Version 1 Version 5 Version 8 Version 9.
Report abuse Terms of use
HOME
CREATE TEST
COMMENTS
STADISTICS
RECORDS
Author's Tests