Cisco 350-701 Practice Test - Questions Answers, Page 22
List of questions
Question 211

Which algorithm provides asymmetric encryption?
RC4
AES
RSA
3DES
Question 212

What are two functions of secret key cryptography? (Choose two)
key selection without integer factorization
utilization of different keys for encryption and decryption
utilization of large prime number iterations
provides the capability to only know the key on one side
utilization of less memory
Question 213

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
SDP
LDAP
subordinate CA
SCP
HTTP
Cisco IOS public key infrastructure (PKI) provides certificate management to support security protocols such as IP Security (IPSec), secure shell (SSH), and secure socket layer (SSL). This module identifies and describes concepts that are needed to understand, plan for, and implement a PKI.
A PKI is composed of the following entities: …
– A distribution mechanism (such as Lightweight Directory Access Protocol [LDAP] or HTTP) forcertificate revocation lists (CRLs)
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pki-overview.html
Question 214

Which attack type attempts to shut down a machine or network so that users are not able to access it?
smurf
bluesnarfing
MAC spoofing
IP spoofing
Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to its intended users.
The Smurf attack is a DDoS attack in which large numbers of Internet Control Message Protocol
(ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.
Question 215

What is a difference between DMVPN and sVTI?
DMVPN supports tunnel encryption, whereas sVTI does not.
DMVPN supports dynamic tunnel establishment, whereas sVTI does not.
DMVPN supports static tunnel establishment, whereas sVTI does not.
DMVPN provides interoperability with other vendors, whereas sVTI does not.
Question 216

What features does Cisco FTDv provide over ASAv?
Cisco FTDv runs on VMWare while ASAv does not
Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not
Cisco FTDv runs on AWS while ASAv does not
Cisco FTDv supports URL filtering while ASAv does not
Question 217

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?
when there is a need for traditional anti-malware detection
when there is no need to have the solution centrally managed
when there is no firewall on the network
when there is a need to have more advanced detection capabilities
Endpoint protection platforms (EPP) prevent endpoint security threats like known and unknown malware.
Endpoint detection and response (EDR) solutions can detect and respond to threats that your EPP and other security tools did not catch.
EDR and EPP have similar goals but are designed to fulfill different purposes. EPP is designed to provide device-level protection by identifying malicious files, detecting potentially malicious activity, and providing tools for incident investigation and response.
The preventative nature of EPP complements proactive EDR. EPP acts as the first line of defense, filtering out attacks that can be detected by the organization's deployed security solutions. EDR acts as a second layer of protection, enabling security analysts to perform threat hunting and identify more subtle threats to the endpoint.
Effective endpoint defense requires a solution that integrates the capabilities of both EDR and EPP to provide protection against cyber threats without overwhelming an organization's security team.
Question 218

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
westbound AP
southbound API
northbound API
eastbound API
Southbound APIs enable SDN controllers to dynamically make changes based on real-time demands and scalability needs.
Question 219

An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?
weak passwords
lack of input validation
missing encryption
lack of file permission
The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics.
Reference: https://tools.ietf.org/html/rfc3954
Question 220

What is provided by the Secure Hash Algorithm in a VPN?
integrity
key exchange
encryption
authentication
The HMAC-SHA-1-96 (also known as HMAC-SHA-1) encryption technique is used by IPSec to ensure that a message has not been altered. (-> Therefore answer "integrity" is the best choice). HMACSHA- 1 uses the SHA-1 specified in
FIPS-190-1, combined with HMAC (as per RFC 2104), and is described in RFC 2404.
Reference: https://www.ciscopress.com/articles/article.asp?p=24833&seqNum=4
Question