ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Which two capabilities does TAXII support? (Choose two)

A.

Exchange

A.

Exchange

Answers
B.

Pull messaging

B.

Pull messaging

Answers
C.

Binding

C.

Binding

Answers
D.

Correlation

D.

Correlation

Answers
E.

Mitigating

E.

Mitigating

Answers
Suggested answer: A, B

Explanation:


Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

A.

exploits

A.

exploits

Answers
B.

ARP spoofing

B.

ARP spoofing

Answers
C.

denial-of-service attacks

C.

denial-of-service attacks

Answers
D.

malware

D.

malware

Answers
E.

eavesdropping

E.

eavesdropping

Answers
Suggested answer: A, D

Explanation:

Malware means "malicious software", is any software intentionally designed to cause damage to a computer, server, client, or computer network. The most popular types of malware includes viruses, ransomware and spyware. Virus Possibly the most common type of malware, viruses attach their malicious code to clean code and wait to be run.

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again.

Spyware is spying software that can secretly record everything you enter, upload, download, and store on your computers or mobile devices. Spyware always tries to keep itself hidden.

An exploit is a code that takes advantage of a software vulnerability or security flaw.

Exploits and malware are two risks for endpoints that are not up to date. ARP spoofing and eavesdropping are attacks against the network while denial-of-service attack is based on the flooding of IP packets.

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

A.

url

A.

url

Answers
B.

terminal

B.

terminal

Answers
C.

profile

C.

profile

Answers
D.

selfsigned

D.

selfsigned

Answers
Suggested answer: C

Explanation:

A trustpoint enrollment mode, which also defines the trustpoint authentication mode, can be performed via 3 main methods:

1. Terminal Enrollment – manual method of performing trustpoint authentication and certificate enrolment using copy-paste in the CLI terminal.

2. SCEP Enrollment – Trustpoint authentication and enrollment using SCEP over HTTP.

3. Enrollment Profile – Here, authentication and enrollment methods are defined separately. Along with terminal and SCEP enrollment methods, enrollment profiles provide an option to specify HTTP/TFTP commands to perform file retrieval from the Server, which is defined using an authentication or enrollment url under the profile.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructurepki/211333-IOSPKI-Deployment-Guide-Initial-Design.html

What are two rootkit types? (Choose two)

A.

registry

A.

registry

Answers
B.

virtual

B.

virtual

Answers
C.

bootloader

C.

bootloader

Answers
D.

user mode

D.

user mode

Answers
E.

buffer mode

E.

buffer mode

Answers
Suggested answer: C, D

Explanation:

The term 'rootkit' originally comes from the Unix world, where the word 'root' is used to describe a user with the highest possible level of access privileges, similar to an 'Administrator' in Windows. The word 'kit' refers to the software that grants root-level access to the machine. Put the two together and you get 'rootkit', a program that gives someone – with legitimate or malicious intentions – privileged access to a computer.

There are four main types of rootkits: Kernel rootkits, User mode rootkits, Bootloader rootkits, Memory rootkits

Which form of attack is launched using botnets?

A.

EIDDOS

A.

EIDDOS

Answers
B.

virus

B.

virus

Answers
C.

DDOS

C.

DDOS

Answers
D.

TCP flood

D.

TCP flood

Answers
Suggested answer: C

Explanation:

A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them.

Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.

Which threat involves software being used to gain unauthorized access to a computer system?

A.

virus

A.

virus

Answers
B.

NTP amplification

B.

NTP amplification

Answers
C.

ping of death

C.

ping of death

Answers
D.

HTTP flood

D.

HTTP flood

Answers
Suggested answer: A

Which type of attack is social engineering?

A.

trojan

A.

trojan

Answers
B.

phishing

B.

phishing

Answers
C.

malware

C.

malware

Answers
D.

MITM

D.

MITM

Answers
Suggested answer: B

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.

Which two key and block sizes are valid for AES? (Choose two)

A.

64-bit block size, 112-bit key length

A.

64-bit block size, 112-bit key length

Answers
B.

64-bit block size, 168-bit key length

B.

64-bit block size, 168-bit key length

Answers
C.

128-bit block size, 192-bit key length

C.

128-bit block size, 192-bit key length

Answers
D.

128-bit block size, 256-bit key length

D.

128-bit block size, 256-bit key length

Answers
E.

192-bit block size, 256-bit key length

E.

192-bit block size, 256-bit key length

Answers
Suggested answer: C, D

Explanation:

The AES encryption algorithm encrypts and decrypts data in blocks of 128 bits (block size). It can do this using 128-bit, 192-bit, or 256-bit keys

Which two descriptions of AES encryption are true? (Choose two)

A.

AES is less secure than 3DES.

A.

AES is less secure than 3DES.

Answers
B.

AES is more secure than 3DES.

B.

AES is more secure than 3DES.

Answers
C.

AES can use a 168-bit key for encryption.

C.

AES can use a 168-bit key for encryption.

Answers
D.

AES can use a 256-bit key for encryption.

D.

AES can use a 256-bit key for encryption.

Answers
E.

AES encrypts and decrypts a key three times in sequence.

E.

AES encrypts and decrypts a key three times in sequence.

Answers
Suggested answer: B, D

Which algorithm provides encryption and authentication for data plane communication?

A.

AES-GCM

A.

AES-GCM

Answers
B.

SHA-96

B.

SHA-96

Answers
C.

AES-256

C.

AES-256

Answers
D.

SHA-384

D.

SHA-384

Answers
Suggested answer: A

Explanation:

The data plane of any network is responsible for handling data packets that are transported across the network.

(The data plane is also sometimes called the forwarding plane.)

Maybe this Qwants to ask about the encryption and authentication in the data plane of a SD-WAN network (but SD-WAN is not a topic of the SCOR 350-701 exam?).

In the Cisco SD-WAN network for unicast traffic, data plane encryption is done by AES-256-GCM, a symmetrickey algorithm that uses the same key to encrypt outgoing packets and to decrypt incoming packets. Each router periodically generates an AES key for its data path (specifically, one key per TLOC) and transmits this key to the vSmart controller in OMP route packets, which are similar to IP route updates.

Reference:

https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/securitybook/security-overview.html

Total 631 questions
Go to page: of 64