Jump to content

certuser1109

Members
  • Posts

    1
  • Joined

  • Last visited

certuser1109's Achievements

Apprentice

Apprentice (3/14)

  • First Post
  • One Year In
  • Dedicated
  • Week One Done
  • One Month Later

Recent Badges

0

Reputation

  1. HI, Can someone confirm, are these questions exists in the exam 350-701: Which two technologies do attackers use to evade detection by border firewalls and security appliances? a) JWT b) S/MIME c) SHA-256 d) TLS Which 5-tuple element is missing from the NetFlow output beloow? Source IP: 40.112.167.90 Source port: 21441 Destination IP: 72.163.4.185 Destination port: 443 a) interface b) Application c) Receive time d) protocol Which two are elements of Cisco AMP's EDR capabilities? (Choose two.) a) Containment b) Patching c) Full disk encryption d) File timeline Which ISE component is used to apply DACLs? a) user Dictionaries b) Smart Conditions c) Posture Policy d) Authorization Profile
×
×
  • Create New...