Cisco 350-701 Practice Test - Questions Answers, Page 29
List of questions
Related questions
Which type of encryption uses a public key and private key?
Asymmetric
Symmetric
Linear
Nonlinear
What are two features of NetFlow flow monitoring? (Choose two)
Can track ingress and egress information
Include the flow record and the flow importer
Copies all ingress flow information to an interface
Does not required packet sampling on interfaces
Can be used to track multicast, MPLS, or bridged traffic
A customer has various external HTTP resources available including Intranet Extranet and Internet,with aproxy configuration running in explicit mode. Which method allows the client desktop browsers to beconfiguredto select when to connect direct or when to use the proxy?
Transport mode
Forward file
PAC file
Bridge mode
Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
IP and Domain Reputation Center
File Reputation Center
IP Slock List Center
AMP Reputation Center
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?
AES-192
IKEv1
AES-256
ESP
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24. Which command on the hub will allow the administrator to accomplish this?
crypto ca identity 172.19.20.24
crypto isakmp key Cisco0123456789 172.19.20.24
crypto enrollment peer address 172.19.20.24
crypto isakmp identity address 172.19.20.24
What is a difference between an XSS attack and an SQL injection attack?
SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist in many different types of applications
XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications
SQL injection attacks are used to steal information from databases whereas XSS attacks are used to redirect users to websites where attackers can steal data from them
XSS attacks are used to steal information from databases whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them
An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?
Implement pre-filter policies for the CIP preprocessor
Enable traffic analysis in the Cisco FTD
Configure intrusion rules for the DNP3 preprocessor
Modify the access control policy to trust the industrial traffic
Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?
Audit
Mandatory
Optional
Visibility
Which attribute has the ability to change during the RADIUS CoA?
NTP
Authorization
Accessibility
Membership
Question