Cisco 350-701 Practice Test - Questions Answers, Page 22

List of questions
Question 211

Which algorithm provides asymmetric encryption?
Question 212

What are two functions of secret key cryptography? (Choose two)
Question 213

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
Question 214

Which attack type attempts to shut down a machine or network so that users are not able to access it?
Question 215

What is a difference between DMVPN and sVTI?
Question 216

What features does Cisco FTDv provide over ASAv?
Question 217

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?
Question 218

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
Question 219

An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?
Question 220

What is provided by the Secure Hash Algorithm in a VPN?
Question