ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 22

Add to Whishlist

List of questions

Question 211

Report Export Collapse

Which algorithm provides asymmetric encryption?

Become a Premium Member for full access
  Unlock Premium Member

Question 212

Report Export Collapse

What are two functions of secret key cryptography? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 213

Report Export Collapse

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

Become a Premium Member for full access
  Unlock Premium Member

Question 214

Report Export Collapse

Which attack type attempts to shut down a machine or network so that users are not able to access it?

Become a Premium Member for full access
  Unlock Premium Member

Question 215

Report Export Collapse

What is a difference between DMVPN and sVTI?

Become a Premium Member for full access
  Unlock Premium Member

Question 216

Report Export Collapse

What features does Cisco FTDv provide over ASAv?

Become a Premium Member for full access
  Unlock Premium Member

Question 217

Report Export Collapse

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

Become a Premium Member for full access
  Unlock Premium Member

Question 218

Report Export Collapse

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

Become a Premium Member for full access
  Unlock Premium Member

Question 219

Report Export Collapse

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?

Become a Premium Member for full access
  Unlock Premium Member

Question 220

Report Export Collapse

What is provided by the Secure Hash Algorithm in a VPN?

Become a Premium Member for full access
  Unlock Premium Member
Total 631 questions
Go to page: of 64

Related questions