exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 274 discussion

Actual exam question from Cisco's 350-701
Question #: 274
Topic #: 1
[All 350-701 Questions]

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two.)

  • A. Messenger applications cannot be segmented with standard network controls
  • B. Malware infects the messenger application on the user endpoint to send company data
  • C. Traffic is encrypted, which prevents visibility on firewalls and IPS systems
  • D. An exposed API for the messaging platform is used to send large amounts of data
  • E. Outgoing traffic is allowed so users can communicate with outside organizations
Show Suggested Answer Hide Answer
Suggested Answer: CE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
itisfakemaillol
Highly Voted 3 years, 11 months ago
Vote for C and E
upvoted 15 times
...
Dinges
Highly Voted 3 years, 11 months ago
I think AE is correct. https://www.cisco.com/c/en_uk/products/security/network-visibility-segmentation/index.html
upvoted 14 times
...
kloug
Most Recent 7 months, 3 weeks ago
Answer c, e
upvoted 1 times
...
Premium_Pils
10 months, 1 week ago
Selected Answer: CE
C and E are preventing visibility. Encryption and allowed outgoing traffic for DNS protocols
upvoted 1 times
...
ums008
1 year, 11 months ago
Selected Answer: CE
I believe C & E are correct: C. Traffic is encrypted: Messenger protocols often use encryption to secure the communication between users. While encryption provides privacy and security for legitimate users, it can also make it challenging for firewalls and intrusion prevention systems (IPS) to inspect and detect any potential data exfiltration. Encrypted traffic can bypass traditional security measures and make it difficult to identify if sensitive data is being transmitted. A. Messenger applications cannot be segmented with standard network controls: This statement is not accurate. Messenger applications can be subject to network segmentation, firewall rules, and network access controls like any other application. However, the ability to segment them may vary based on the specific implementation and network architecture.
upvoted 1 times
...
jku2cya
1 year, 11 months ago
Selected Answer: AE
Not C as SSL Decryption can be done on NGFW/IPS
upvoted 1 times
...
Jessie45785
2 years, 2 months ago
Selected Answer: CE
A is incorrect - most of the modern communicators enforce SSL pinning - hence man in the middle approach is not an option cause traffic is encrypted it leaves us only with C and E https://docs.diladele.com/faq/squid/sslbump_exlusions/whatsapp.html
upvoted 4 times
...
Jessie45785
2 years, 2 months ago
Selected Answer: AE
C is incorrect - most of the modern communicators enforce SSL pinning - hence man in the middle approach is not an option it leaves us only with A and E https://docs.diladele.com/faq/squid/sslbump_exlusions/whatsapp.html
upvoted 3 times
Jessie45785
2 years, 2 months ago
I meant A is Incorrect - traffic is encrypted !!! - remove that vote
upvoted 3 times
...
...
Totosos1
2 years, 2 months ago
Selected Answer: AE
It's weird how many people are suggesting 'C' for encrypted traffic when any security engineer knows a modern NGFWs have Decryption policies for such traffic, C is definitely not the right answer! I'm going A & E.
upvoted 3 times
...
Tuxzinator
2 years, 4 months ago
Selected Answer: AC
Messenger applications are often designed to bypass traditional network segmentation controls such as firewalls and proxies, making it difficult to detect and prevent data exfiltration
upvoted 1 times
Rododendron2
1 year ago
How you will magically bypass designed and setup traffic flow ? David Copperfield ? :-)
upvoted 1 times
...
...
achille5
2 years, 4 months ago
Selected Answer: CE
Messenger protocols often use encryption to protect communication between endpoints, which makes it difficult for firewalls and IPS systems to detect and prevent data exfiltration. Additionally, since messenger applications are designed to allow outgoing traffic so users can communicate with outside organizations, it can be difficult to distinguish legitimate communications from unauthorized data exfiltration attempts.
upvoted 5 times
...
sull3y
2 years, 4 months ago
The two characteristics of messenger protocols that make data exfiltration difficult to detect and prevent are: C. Traffic encryption: Encrypting traffic makes it difficult for firewalls and IPS (Intrusion Prevention Systems) to inspect the content of the data. Encryption obscures the data being sent, making it more challenging to detect malicious activity. E. Outgoing traffic allowed: Allowing outgoing traffic for legitimate communication purposes makes it difficult to detect and prevent malicious data exfiltration. This is because the data being exfiltrated can be disguised as normal communication traffic, making it harder for security systems to distinguish between benign and malicious activity.
upvoted 4 times
...
amtf8888
2 years, 5 months ago
Selected Answer: AE
AE , answer is correct
upvoted 1 times
...
Emlia1
2 years, 6 months ago
I think AE
upvoted 1 times
...
sis_net_sec
2 years, 8 months ago
Selected Answer: AC
..encrypting traffic prevents intrusion detection systems and firewalls from inspecting the contents of the traffic (Fawcett, 2012)........there is a significant risk of data exfiltration via Skype traffic or more importantly, traffic that simply mimics the characteristics of Skype communication.....
upvoted 1 times
...
Pwned
3 years, 1 month ago
vote for C and E... opcion B is not correct because a malware infection is not a "messenger protocol characteristic" as the question asked
upvoted 4 times
...
TWu2
3 years, 5 months ago
Protocol is what the question is asking.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...