ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 22

List of questions

Question 211

Report Export Collapse

Which algorithm provides asymmetric encryption?

RC4

RC4

AES

AES

RSA

RSA

3DES

3DES

Suggested answer: C
asked 10/10/2024
Jeffrey VanBemmel
41 questions

Question 212

Report Export Collapse

What are two functions of secret key cryptography? (Choose two)

key selection without integer factorization

key selection without integer factorization

utilization of different keys for encryption and decryption

utilization of different keys for encryption and decryption

utilization of large prime number iterations

utilization of large prime number iterations

provides the capability to only know the key on one side

provides the capability to only know the key on one side

utilization of less memory

utilization of less memory

Suggested answer: B, D
asked 10/10/2024
ayodele fakayode
43 questions

Question 213

Report Export Collapse

For Cisco IOS PKI, which two types of Servers are used as a distribution point for CRLs? (Choose two)

SDP

SDP

LDAP

LDAP

subordinate CA

subordinate CA

SCP

SCP

HTTP

HTTP

Suggested answer: B, E
Explanation:

Cisco IOS public key infrastructure (PKI) provides certificate management to support security protocols such as IP Security (IPSec), secure shell (SSH), and secure socket layer (SSL). This module identifies and describes concepts that are needed to understand, plan for, and implement a PKI.

A PKI is composed of the following entities: …

– A distribution mechanism (such as Lightweight Directory Access Protocol [LDAP] or HTTP) forcertificate revocation lists (CRLs)

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_pki/configuration/15-mt/sec-pki-15-mtbook/sec-pki-overview.html

asked 10/10/2024
AHOPlvaro Zorrilla
42 questions

Question 214

Report Export Collapse

Which attack type attempts to shut down a machine or network so that users are not able to access it?

smurf

smurf

bluesnarfing

bluesnarfing

MAC spoofing

MAC spoofing

IP spoofing

IP spoofing

Suggested answer: A
Explanation:

Denial-of-service (DDoS) aims at shutting down a network or service, causing it to be inaccessible to its intended users.

The Smurf attack is a DDoS attack in which large numbers of Internet Control Message Protocol

(ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address.

asked 10/10/2024
Harold van den Meijdenberg
32 questions

Question 215

Report Export Collapse

What is a difference between DMVPN and sVTI?

DMVPN supports tunnel encryption, whereas sVTI does not.

DMVPN supports tunnel encryption, whereas sVTI does not.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

DMVPN supports static tunnel establishment, whereas sVTI does not.

DMVPN supports static tunnel establishment, whereas sVTI does not.

DMVPN provides interoperability with other vendors, whereas sVTI does not.

DMVPN provides interoperability with other vendors, whereas sVTI does not.

Suggested answer: B
asked 10/10/2024
Ravi Kundu
33 questions

Question 216

Report Export Collapse

What features does Cisco FTDv provide over ASAv?

Cisco FTDv runs on VMWare while ASAv does not

Cisco FTDv runs on VMWare while ASAv does not

Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not

Cisco FTDv provides 1GB of firewall throughput while Cisco ASAv does not

Cisco FTDv runs on AWS while ASAv does not

Cisco FTDv runs on AWS while ASAv does not

Cisco FTDv supports URL filtering while ASAv does not

Cisco FTDv supports URL filtering while ASAv does not

Suggested answer: D
asked 10/10/2024
Francesco Balducci
40 questions

Question 217

Report Export Collapse

In which situation should an Endpoint Detection and Response solution be chosen versus an Endpoint Protection Platform?

when there is a need for traditional anti-malware detection

when there is a need for traditional anti-malware detection

when there is no need to have the solution centrally managed

when there is no need to have the solution centrally managed

when there is no firewall on the network

when there is no firewall on the network

when there is a need to have more advanced detection capabilities

when there is a need to have more advanced detection capabilities

Suggested answer: D
Explanation:

Endpoint protection platforms (EPP) prevent endpoint security threats like known and unknown malware.

Endpoint detection and response (EDR) solutions can detect and respond to threats that your EPP and other security tools did not catch.

EDR and EPP have similar goals but are designed to fulfill different purposes. EPP is designed to provide device-level protection by identifying malicious files, detecting potentially malicious activity, and providing tools for incident investigation and response.

The preventative nature of EPP complements proactive EDR. EPP acts as the first line of defense, filtering out attacks that can be detected by the organization's deployed security solutions. EDR acts as a second layer of protection, enabling security analysts to perform threat hunting and identify more subtle threats to the endpoint.

Effective endpoint defense requires a solution that integrates the capabilities of both EDR and EPP to provide protection against cyber threats without overwhelming an organization's security team.

asked 10/10/2024
Ankur Patel
44 questions

Question 218

Report Export Collapse

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

westbound AP

westbound AP

southbound API

southbound API

northbound API

northbound API

eastbound API

eastbound API

Suggested answer: B
Explanation:

Southbound APIs enable SDN controllers to dynamically make changes based on real-time demands and scalability needs.

Cisco 350-701 image Question 218 explanation 117439 10102024233051000000

asked 10/10/2024
Cheikh Ndiaye
38 questions

Question 219

Report Export Collapse

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability would help an attacker brute force their way into the systems?

weak passwords

weak passwords

lack of input validation

lack of input validation

missing encryption

missing encryption

lack of file permission

lack of file permission

Suggested answer: C
Explanation:

The version 9 export format uses templates to provide access to observations of IP packet flows in a flexible and extensible manner. A template defines a collection of fields, with corresponding descriptions of structure and semantics.

Reference: https://tools.ietf.org/html/rfc3954

asked 10/10/2024
Szymon Strzep
44 questions

Question 220

Report Export Collapse

What is provided by the Secure Hash Algorithm in a VPN?

integrity

integrity

key exchange

key exchange

encryption

encryption

authentication

authentication

Suggested answer: A
Explanation:

The HMAC-SHA-1-96 (also known as HMAC-SHA-1) encryption technique is used by IPSec to ensure that a message has not been altered. (-> Therefore answer "integrity" is the best choice). HMACSHA- 1 uses the SHA-1 specified in

FIPS-190-1, combined with HMAC (as per RFC 2104), and is described in RFC 2404.

Reference: https://www.ciscopress.com/articles/article.asp?p=24833&seqNum=4

asked 10/10/2024
Allen J Tyson
34 questions
Total 631 questions
Go to page: of 64

Related questions