HI, Can someone confirm, are these questions exists in the exam 350-701:
Which two technologies do attackers use to evade detection by border firewalls and security appliances?
a) JWT
b) S/MIME
c) SHA-256
d) TLS
Which 5-tuple element is missing from the NetFlow output beloow?
Source IP: 40.112.167.90
Source port: 21441
Destination IP: 72.163.4.185
Destination port: 443
a) interface
b) Application
c) Receive time
d) protocol
Which two are elements of Cisco AMP's EDR capabilities? (Choose two.)
a) Containment
b) Patching
c) Full disk encryption
d) File timeline
Which ISE component is used to apply DACLs?
a) user Dictionaries
b) Smart Conditions
c) Posture Policy
d) Authorization Profile