ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 22

Question list
Search
Search

Which algorithm provides asymmetric encryption?

A.

RC4

A.

RC4

Answers
B.

AES

B.

AES

Answers
C.

RSA

C.

RSA

Answers
D.

3DES

D.

3DES

Answers
Suggested answer: C

What are two functions of secret key cryptography? (Choose two)

A.

key selection without integer factorization

A.

key selection without integer factorization

Answers
B.

utilization of different keys for encryption and decryption

B.

utilization of different keys for encryption and decryption

Answers
C.

utilization of large prime number iterations

C.

utilization of large prime number iterations

Answers
D.

provides the capability to only know the key on one side

D.

provides the capability to only know the key on one side

Answers
E.

utilization of less memory

E.

utilization of less memory

Answers
Suggested answer: B, D

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

A.

SDP

A.

SDP

Answers
B.

LDAP

B.

LDAP

Answers
C.

subordinate CA

C.

subordinate CA

Answers
D.

SCP

D.

SCP

Answers
E.

HTTP

E.

HTTP

Answers
Suggested answer: B, E

Explanation:

Cisco IOS public key infrastructure (PKI) provides certificate management to support security protocols such as IP Security (IPSec), secure shell (SSH), and secure socket layer (SSL). This module identifies and describes concepts that are needed to understand, plan for, and implement a PKI.

A PKI is composed of the following entities: …

– A distribution mechanism (such as Lightweight Directory Access Protocol [LDAP] or HTTP) forcertificate revocation lists (CRLs)

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pki-overview.html

Which attack type attempts to shut down a machine or network so that users are not able to access it?

A.

smurf

A.

smurf

Answers
B.

bluesnarfing

B.

bluesnarfing

Answers
C.

MAC spoofing

C.

MAC spoofing

Answers
D.

IP spoofing

D.

IP spoofing

Answers
Suggested answer: A

Explanation:

Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to its intended users.

The Smurf attack is a DDoS attack in which large numbers of Internet Control Message Protocol

(ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

What is a difference between DMVPN and sVTI?

A.

DMVPN supports tunnel encryption, whereas sVTI does not.

A.

DMVPN supports tunnel encryption, whereas sVTI does not.

Answers
B.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

B.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

Answers
C.

DMVPN supports static tunnel establishment, whereas sVTI does not.

C.

DMVPN supports static tunnel establishment, whereas sVTI does not.

Answers
D.

DMVPN provides interoperability with other vendors, whereas sVTI does not.

D.

DMVPN provides interoperability with other vendors, whereas sVTI does not.

Answers
Suggested answer: B

What features does Cisco FTDv provide over ASAv?

A.

Cisco FTDv runs on VMWare while ASAv does not

A.

Cisco FTDv runs on VMWare while ASAv does not

Answers
B.

Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not

B.

Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not

Answers
C.

Cisco FTDv runs on AWS while ASAv does not

C.

Cisco FTDv runs on AWS while ASAv does not

Answers
D.

Cisco FTDv supports URL filtering while ASAv does not

D.

Cisco FTDv supports URL filtering while ASAv does not

Answers
Suggested answer: D

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

A.

when there is a need for traditional anti-malware detection

A.

when there is a need for traditional anti-malware detection

Answers
B.

when there is no need to have the solution centrally managed

B.

when there is no need to have the solution centrally managed

Answers
C.

when there is no firewall on the network

C.

when there is no firewall on the network

Answers
D.

when there is a need to have more advanced detection capabilities

D.

when there is a need to have more advanced detection capabilities

Answers
Suggested answer: D

Explanation:

Endpoint protection platforms (EPP) prevent endpoint security threats like known and unknown malware.

Endpoint detection and response (EDR) solutions can detect and respond to threats that your EPP and other security tools did not catch.

EDR and EPP have similar goals but are designed to fulfill different purposes. EPP is designed to provide device-level protection by identifying malicious files, detecting potentially malicious activity, and providing tools for incident investigation and response.

The preventative nature of EPP complements proactive EDR. EPP acts as the first line of defense, filtering out attacks that can be detected by the organization's deployed security solutions. EDR acts as a second layer of protection, enabling security analysts to perform threat hunting and identify more subtle threats to the endpoint.

Effective endpoint defense requires a solution that integrates the capabilities of both EDR and EPP to provide protection against cyber threats without overwhelming an organization's security team.

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

A.

westbound AP

A.

westbound AP

Answers
B.

southbound API

B.

southbound API

Answers
C.

northbound API

C.

northbound API

Answers
D.

eastbound API

D.

eastbound API

Answers
Suggested answer: B

Explanation:

Southbound APIs enable SDN controllers to dynamically make changes based on real-time demands and scalability needs.

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?

A.

weak passwords

A.

weak passwords

Answers
B.

lack of input validation

B.

lack of input validation

Answers
C.

missing encryption

C.

missing encryption

Answers
D.

lack of file permission

D.

lack of file permission

Answers
Suggested answer: C

Explanation:

The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics.

Reference: https://tools.ietf.org/html/rfc3954

What is provided by the Secure Hash Algorithm in a VPN?

A.

integrity

A.

integrity

Answers
B.

key exchange

B.

key exchange

Answers
C.

encryption

C.

encryption

Answers
D.

authentication

D.

authentication

Answers
Suggested answer: A

Explanation:

The HMAC-SHA-1-96 (also known as HMAC-SHA-1) encryption technique is used by IPSec to ensure that a message has not been altered. (-> Therefore answer "integrity" is the best choice). HMACSHA- 1 uses the SHA-1 specified in

FIPS-190-1, combined with HMAC (as per RFC 2104), and is described in RFC 2404.

Reference: https://www.ciscopress.com/articles/article.asp?p=24833&seqNum=4

Total 631 questions
Go to page: of 64