Cisco 350-701 Practice Test - Questions Answers, Page 2
List of questions
Related questions
Which two capabilities does TAXII support? (Choose two)
Exchange
Pull messaging
Binding
Correlation
Mitigating
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
exploits
ARP spoofing
denial-of-service attacks
malware
eavesdropping
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
url
terminal
profile
selfsigned
What are two rootkit types? (Choose two)
registry
virtual
bootloader
user mode
buffer mode
Which form of attack is launched using botnets?
EIDDOS
virus
DDOS
TCP flood
Which threat involves software being used to gain unauthorized access to a computer system?
virus
NTP amplification
ping of death
HTTP flood
Which type of attack is social engineering?
trojan
phishing
malware
MITM
Which two key and block sizes are valid for AES? (Choose two)
64-bit block size, 112-bit key length
64-bit block size, 168-bit key length
128-bit block size, 192-bit key length
128-bit block size, 256-bit key length
192-bit block size, 256-bit key length
Which two descriptions of AES encryption are true? (Choose two)
AES is less secure than 3DES.
AES is more secure than 3DES.
AES can use a 168-bit key for encryption.
AES can use a 256-bit key for encryption.
AES encrypts and decrypts a key three times in sequence.
Which algorithm provides encryption and authentication for data plane communication?
AES-GCM
SHA-96
AES-256
SHA-384
Question