Cisco 350-701 Practice Test - Questions Answers, Page 12
List of questions
Related questions
Refer to the exhibit.
A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?
set the IP address of an interface
complete no configurations
complete all configurations
add subinterfaces
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?
snmp-server host inside 10.255.254.1 version 3 andy
snmp-server host inside 10.255.254.1 version 3 myv3
snmp-server host inside 10.255.254.1 snmpv3 andy
snmp-server host inside 10.255.254.1 snmpv3 myv3
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
interpacket variation
software package variation
flow insight variation
process details variation
How is ICMP used an exfiltration technique?
by flooding the destination host with unreachable packets
by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
by overwhelming a targeted host with ICMP echo-request packets
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
DNS tunneling
DNSCrypt
DNS security
DNSSEC
How is DNS tunneling used to exfiltrate data out of a corporate network?
It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks.
It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data.
It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network.
It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers.
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?
(Choose two)
Outgoing traffic is allowed so users can communicate with outside organizations.
Malware infects the messenger application on the user endpoint to send company data.
Traffic is encrypted, which prevents visibility on firewalls and IPS systems.
An exposed API for the messaging platform is used to send large amounts of data.
Messenger applications cannot be segmented with standard network controls
Which Cisco AMP file disposition valid?
pristine
malware
dirty
non malicious
When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?
Spero analysis
dynamic analysis
sandbox analysis
malware analysis
Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?
cloud web services
network AMP
private cloud
public cloud
Question