ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 12

Question list
Search
Search

Refer to the exhibit.

A network administrator configures command authorization for the admin5 user. What is the admin5 user able to do on HQ_Router after this configuration?

A.

set the IP address of an interface

A.

set the IP address of an interface

Answers
B.

complete no configurations

B.

complete no configurations

Answers
C.

complete all configurations

C.

complete all configurations

Answers
D.

add subinterfaces

D.

add subinterfaces

Answers
Suggested answer: B

Explanation:

The user "admin5" was configured with privilege level 5. In order to allow configuration (enter global configuration mode), we must type this command:

(config)#privilege exec level 5 configure terminal

Without this command, this user cannot do any configuration.

Note: Cisco IOS supports privilege levels from 0 to 15, but the privilege levels which are used by default are privilege level 1 (user EXEC) and level privilege 15 (privilege EXEC)

A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1. Which command achieves this goal?

A.

snmp-server host inside 10.255.254.1 version 3 andy

A.

snmp-server host inside 10.255.254.1 version 3 andy

Answers
B.

snmp-server host inside 10.255.254.1 version 3 myv3

B.

snmp-server host inside 10.255.254.1 version 3 myv3

Answers
C.

snmp-server host inside 10.255.254.1 snmpv3 andy

C.

snmp-server host inside 10.255.254.1 snmpv3 andy

Answers
D.

snmp-server host inside 10.255.254.1 snmpv3 myv3

D.

snmp-server host inside 10.255.254.1 snmpv3 myv3

Answers
Suggested answer: A

Explanation:

The command "snmp-server user user-name group-name [remote ip-address [udp-port port]] {v1 | v2c | v3 [encrypted] [auth {md5 | sha} auth-password]} [access access-list]" adds a new user (in this case "andy") to an SNMPv3 group (in this case group name "myv3") and configures a password for the user.

In the "snmp-server host" command, we need to:

+ Specify the SNMP version with key word "version {1 | 2 | 3}"

+ Specify the username ("andy"), not group name ("myv3").

Note: In "snmp-server host inside …" command, "inside" is the interface name of the ASA interface through which the NMS (located at 10.255.254.1) can be reached.

Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

A.

interpacket variation

A.

interpacket variation

Answers
B.

software package variation

B.

software package variation

Answers
C.

flow insight variation

C.

flow insight variation

Answers
D.

process details variation

D.

process details variation

Answers
Suggested answer: A

Explanation:

The telemetry information consists of three types of data:

+ Flow information: This information contains details about endpoints, protocols, ports, when the flow started, how long the flow was active, etc.

+ Interpacket variation: This information captures any interpacket variations within the flow.

Examples include variation in Time To Live (TTL), IP and TCP flags, payload length, etc + Context details: Context information is derived outside the packet header. It includes details about variation in buffer utilization, packet drops within a flow, association with tunnel endpoints, etc.

Reference: https://www.cisco.com/c/dam/global/en_uk/products/switches/cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf

How is ICMP used an exfiltration technique?

A.

by flooding the destination host with unreachable packets

A.

by flooding the destination host with unreachable packets

Answers
B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address

B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address

Answers
C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host

C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host

Answers
D.

by overwhelming a targeted host with ICMP echo-request packets

D.

by overwhelming a targeted host with ICMP echo-request packets

Answers
Suggested answer: C

Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

A.

DNS tunneling

A.

DNS tunneling

Answers
B.

DNSCrypt

B.

DNSCrypt

Answers
C.

DNS security

C.

DNS security

Answers
D.

DNSSEC

D.

DNSSEC

Answers
Suggested answer: A

Explanation:

DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNS queries and responses. DNS tunneling often includes data payloads that can be added to an attacked DNS server and used to control a remote server and applications.

How is DNS tunneling used to exfiltrate data out of a corporate network?

A.

It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks.

A.

It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks.

Answers
B.

It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data.

B.

It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data.

Answers
C.

It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network.

C.

It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network.

Answers
D.

It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers.

D.

It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers.

Answers
Suggested answer: B

Explanation:

Domain name system (DNS) is the protocol that translates human-friendly URLs, such as securitytut.com, into IP addresses, such as 183.33.24.13. Because DNS messages are only used as the beginning of each communication and they are not intended for data transfer, many organizations do not monitor their DNS traffic for malicious activity. As a result, DNS-based attacks can be effective if launched against their networks. DNS tunneling is one such attack.

An example of DNS Tunneling is shown below:

The attacker incorporates one of many open-source DNS tunneling kits into an authoritative DNS nameserver (NS) and malicious payload.

2. An IP address (e.g. 1.2.3.4) is allocated from the attacker's infrastructure and a domain name (e.g. attackerdomain.com) is registered or reused. The registrar informs the top-level domain (.com) nameservers to refer requests for attackerdomain.com to ns.attackerdomain.com, which has a DNS record mapped to 1.2.3.4 3. The attacker compromises a system with the malicious payload. Once the desired data is obtained, the payload encodes the data as a series of

32 characters (0-9, A-Z) broken into short strings

(3KJ242AIE9, P028X977W,…).

4. The payload initiates thousands of unique DNS record requests to the attacker's domain with each string as a part of the domain name (e.g. 3KJ242AIE9.attackerdomain.com). Depending on the attacker's patience and stealth, requests can be spaced out over days or months to avoid suspicious network activity.

5. The requests are forwarded to a recursive DNS resolver. During resolution, the requests are sent to the attacker's authoritative DNS nameserver, 6. The tunneling kit parses the encoded strings and rebuilds the exfiltrated data.

Reference: https://learn-umbrella.cisco.com/i/775902-dns-tunneling/0

Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent?

(Choose two)

A.

Outgoing traffic is allowed so users can communicate with outside organizations.

A.

Outgoing traffic is allowed so users can communicate with outside organizations.

Answers
B.

Malware infects the messenger application on the user endpoint to send company data.

B.

Malware infects the messenger application on the user endpoint to send company data.

Answers
C.

Traffic is encrypted, which prevents visibility on firewalls and IPS systems.

C.

Traffic is encrypted, which prevents visibility on firewalls and IPS systems.

Answers
D.

An exposed API for the messaging platform is used to send large amounts of data.

D.

An exposed API for the messaging platform is used to send large amounts of data.

Answers
E.

Messenger applications cannot be segmented with standard network controls

E.

Messenger applications cannot be segmented with standard network controls

Answers
Suggested answer: C, E

Which Cisco AMP file disposition valid?

A.

pristine

A.

pristine

Answers
B.

malware

B.

malware

Answers
C.

dirty

C.

dirty

Answers
D.

non malicious

D.

non malicious

Answers
Suggested answer: B

When using Cisco AMP for Networks which feature copies a file to the Cisco AMP cloud for analysis?

A.

Spero analysis

A.

Spero analysis

Answers
B.

dynamic analysis

B.

dynamic analysis

Answers
C.

sandbox analysis

C.

sandbox analysis

Answers
D.

malware analysis

D.

malware analysis

Answers
Suggested answer: B

Explanation:

Spero analysis examines structural characteristics such as metadata and header information in executable files. After generating a Spero signature based on this information, if the file is an eligible executable file, the device submits it to the Spero heuristic engine in the AMP cloud. Based on the Spero signature, the Spero engine determines whether the file is malware.

Reference:

https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-configguidev60/Reference_a_wrapper_Chapter_topic_here.html-> Spero analysis only uploads the signature of the (executable) files to the AMP cloud. It does notupload thewhole file. Dynamic analysis sends files to AMP ThreatGrid.

Dynamic Analysis submits (the whole) files to Cisco Threat Grid (formerly AMP Threat Grid). Cisco Threat Grid runs the file in a sandbox environment, analyzes the file's behavior to determine whether the file is malicious, and returns a threat score that indicates the likelihood that a file contains malware. From the threat score, you can view a dynamic analysis summary report with the reasons for the assigned threat score. You can also look in Cisco Threat Grid to view detailed reports for files that your organization submitted, as well as scrubbed reports with limited data for files that your organization did not submit.

Local malware analysis allows a managed device to locally inspect executables, PDFs, office documents, and other types of files for the most common types of malware, using a detection rule set provided by the Cisco Talos Security

Intelligence and Research Group (Talos). Because local analysis does not query the AMP cloud, and does not run the file, local malware analysis saves time and system resources. -> Malware analysis does not upload files to anywhere, it only checks the files locally.

There is no sandbox analysis feature, it is just a method of dynamic analysis that runs suspicious files in a virtual machine.

Which Cisco Advanced Malware protection for Endpoints deployment architecture is designed to keep data within a network perimeter?

A.

cloud web services

A.

cloud web services

Answers
B.

network AMP

B.

network AMP

Answers
C.

private cloud

C.

private cloud

Answers
D.

public cloud

D.

public cloud

Answers
Suggested answer: C
Total 631 questions
Go to page: of 64