Cisco 350-701 Practice Test - Questions Answers, Page 22
List of questions
Related questions
Which algorithm provides asymmetric encryption?
RC4
AES
RSA
3DES
What are two functions of secret key cryptography? (Choose two)
key selection without integer factorization
utilization of different keys for encryption and decryption
utilization of large prime number iterations
provides the capability to only know the key on one side
utilization of less memory
For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)
SDP
LDAP
subordinate CA
SCP
HTTP
Which attack type attempts to shut down a machine or network so that users are not able to access it?
smurf
bluesnarfing
MAC spoofing
IP spoofing
What is a difference between DMVPN and sVTI?
DMVPN supports tunnel encryption, whereas sVTI does not.
DMVPN supports dynamic tunnel establishment, whereas sVTI does not.
DMVPN supports static tunnel establishment, whereas sVTI does not.
DMVPN provides interoperability with other vendors, whereas sVTI does not.
What features does Cisco FTDv provide over ASAv?
Cisco FTDv runs on VMWare while ASAv does not
Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not
Cisco FTDv runs on AWS while ASAv does not
Cisco FTDv supports URL filtering while ASAv does not
In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?
when there is a need for traditional anti-malware detection
when there is no need to have the solution centrally managed
when there is no firewall on the network
when there is a need to have more advanced detection capabilities
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
westbound AP
southbound API
northbound API
eastbound API
An organization has two systems in their DMZ that have an unencrypted link between them for communication.
The organization does not have a defined password policy and uses several default accounts on the systems.
The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?
weak passwords
lack of input validation
missing encryption
lack of file permission
What is provided by the Secure Hash Algorithm in a VPN?
integrity
key exchange
encryption
authentication
Question