Free Practice Mock Questions Set 81-85 (Questions:81-85) for Cisco 350-701 Exam, according to official Cisco Implementing and Operating Cisco Security Core Technologies exam syllabus topic # 13
After a recent breach, an organization determined that phishing was used to gain initial access to the network before regaining persistence. The information gained from the phishing attack was a result of users visiting known malicious websites. What must be done in order to prevent this from happening in the future?
Answer : D
What provides visibility and awareness into what is currently occurring on the network?
Which DoS attack uses fragmented packets in an attempt to crash a target machine?
Answer : A
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true
Answer : C
Which two key and block sizes are valid for AES? (Choose two.)
Answer : C, D