ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 29

Question list
Search
Search

Which type of encryption uses a public key and private key?

A.

Asymmetric

A.

Asymmetric

Answers
B.

Symmetric

B.

Symmetric

Answers
C.

Linear

C.

Linear

Answers
D.

Nonlinear

D.

Nonlinear

Answers
Suggested answer: A

What are two features of NetFlow flow monitoring? (Choose two)

A.

Can track ingress and egress information

A.

Can track ingress and egress information

Answers
B.

Include the flow record and the flow importer

B.

Include the flow record and the flow importer

Answers
C.

Copies all ingress flow information to an interface

C.

Copies all ingress flow information to an interface

Answers
D.

Does not required packet sampling on interfaces

D.

Does not required packet sampling on interfaces

Answers
E.

Can be used to track multicast, MPLS, or bridged traffic

E.

Can be used to track multicast, MPLS, or bridged traffic

Answers
Suggested answer: A, E

Explanation:

The following are restrictions for Flexible NetFlow:

+ Traditional NetFlow (TNF) accounting is not supported.

+ Flexible NetFlow v5 export format is not supported, only NetFlow v9 export format is supported.

+ Both ingress and egress NetFlow accounting is supported.

+ Microflow policing feature shares the NetFlow hardware resource with FNF.

+ Only one flow monitor per interface and per direction is supported.

Reference: https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consolidated_3850_3se_cg_chapter_011010.htmlWhen configuring NetFlow, follow these guidelines and restrictions:

+ Except in PFC3A mode, NetFlow supports bridged IP traffic. PFC3A mode does not support NetFlow bridged IP traffic.

+ NetFlow supports multicast IP traffic.

Reference: https://www.cisco.com/en/US/docs/general/Test/dwerblo/broken_guide/netflow.htmlThe Flexible NetFlow – MPLS Egress NetFlow feature allows you to capture IP flow information forpackets thatarrive on a router as

Multiprotocol Label Switching (MPLS) packets and are transmitted as IP packets.

This feature allows you to capture the MPLS VPN IP flows that are traveling through the service provider backbone from one site of a VPN to another site of the same VPN

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/netflow/configuration/15-mt/nf-15-mt-book/cfgmpls-netflow.html

A customer has various external HTTP resources available including Intranet Extranet and Internet,with aproxy configuration running in explicit mode. Which method allows the client desktop browsers to beconfiguredto select when to connect direct or when to use the proxy?

A.

Transport mode

A.

Transport mode

Answers
B.

Forward file

B.

Forward file

Answers
C.

PAC file

C.

PAC file

Answers
D.

Bridge mode

D.

Bridge mode

Answers
Suggested answer: C

Explanation:

A Proxy Auto-Configuration (PAC) file is a JavaScript function definition that determines whether web browser requests (HTTP, HTTPS, and FTP) go direct to the destination or are forwarded to a web proxy server.

PAC files are used to support explicit proxy deployments in which client browsers are explicitly configured to send traffic to the web proxy. The big advantage of PAC files is that they are usually relatively easy to create and maintain.

Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?

A.

IP and Domain Reputation Center

A.

IP and Domain Reputation Center

Answers
B.

File Reputation Center

B.

File Reputation Center

Answers
C.

IP Slock List Center

C.

IP Slock List Center

Answers
D.

AMP Reputation Center

D.

AMP Reputation Center

Answers
Suggested answer: A

An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACK and sequence. Which protocol accomplishes this goal?

A.

AES-192

A.

AES-192

Answers
B.

IKEv1

B.

IKEv1

Answers
C.

AES-256

C.

AES-256

Answers
D.

ESP

D.

ESP

Answers
Suggested answer: D

An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of 172.19.20.24. Which command on the hub will allow the administrator to accomplish this?

A.

crypto ca identity 172.19.20.24

A.

crypto ca identity 172.19.20.24

Answers
B.

crypto isakmp key Cisco0123456789 172.19.20.24

B.

crypto isakmp key Cisco0123456789 172.19.20.24

Answers
C.

crypto enrollment peer address 172.19.20.24

C.

crypto enrollment peer address 172.19.20.24

Answers
D.

crypto isakmp identity address 172.19.20.24

D.

crypto isakmp identity address 172.19.20.24

Answers
Suggested answer: B

Explanation:

The command "crypto isakmp identity address 172.19.20.24" is not valid. We can only use "crypto isakmp identity {address | hostname}. The following example uses preshared keys at two peers and sets both their ISAKMP identities to the IP address.

At the local peer (at 10.0.0.1) the ISAKMP identity is set and the preshared key is specified: crypto isakmp identity address crypto isakmp key sharedkeystring address 192.168.1.33 At the remote peer (at 192.168.1.33) the ISAKMP identity is set and the same preshared key is specified: crypto isakmp identity address crypto isakmp key sharedkeystring address 10.0.0.1

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/seccrc4.html#wp3880782430The command "crypto enrollment peer address" is not valid either.

The command "crypto ca identity …" is only used to declare a trusted CA for the router and puts you in the caidentity configuration mode. Also it should be followed by a name, not an IP address. For example: "crypto ca identity CA-Server"

-> Answer A is not correct.

Only answer B is the best choice left.

What is a difference between an XSS attack and an SQL injection attack?

A.

SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist in many different types of applications

A.

SQL injection is a hacking method used to attack SQL databases, whereas XSS attacks can exist in many different types of applications

Answers
B.

XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications

B.

XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications

Answers
C.

SQL injection attacks are used to steal information from databases whereas XSS attacks are used to redirect users to websites where attackers can steal data from them

C.

SQL injection attacks are used to steal information from databases whereas XSS attacks are used to redirect users to websites where attackers can steal data from them

Answers
D.

XSS attacks are used to steal information from databases whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them

D.

XSS attacks are used to steal information from databases whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them

Answers
Suggested answer: C

Explanation:

In XSS, an attacker will try to inject his malicious code (usually malicious links) into a database. When other users follow his links, their web browsers are redirected to websites where attackers can steal data from them. In a SQL Injection, an attacker will try to inject SQL code (via his browser) into forms, cookies, or HTTP headers that do not use data sanitizing or validation methods of GET/POST parameters.

An engineer has been tasked with configuring a Cisco FTD to analyze protocol fields and detect anomalies in the traffic from industrial systems. What must be done to meet these requirements?

A.

Implement pre-filter policies for the CIP preprocessor

A.

Implement pre-filter policies for the CIP preprocessor

Answers
B.

Enable traffic analysis in the Cisco FTD

B.

Enable traffic analysis in the Cisco FTD

Answers
C.

Configure intrusion rules for the DNP3 preprocessor

C.

Configure intrusion rules for the DNP3 preprocessor

Answers
D.

Modify the access control policy to trust the industrial traffic

D.

Modify the access control policy to trust the industrial traffic

Answers
Suggested answer: C

Explanation:

configure INTRUSION RULES for DNP3' -> Documentation states, that enabling INTRUSION RULES is mandatory for CIP to work + required preprocessors (in Network Access Policy - NAP) will be enabled automatically: 'If you want the CIP preprocessor rules listed in the following table to generate events, you MUST enable them. See Setting Intrusion Rule States for information on enabling rules.' 'If the Modbus, DNP3, or CIP preprocessor is disabled, and you enable and deploy an intrusion rule that requires one of these preprocessors, the system automatically uses the required preprocessor, with its current settings, although the preprocessor remains disabled in the web interface for the corresponding network analysis policy.' [1] https://www.cisco.com/c/en/us/td/docs/security/firepower/630/configuration/guide/fpmc-config- guide-v63/scada_preprocessors.html


Which posture assessment requirement provides options to the client for remediation and requires the remediation within a certain timeframe?

A.

Audit

A.

Audit

Answers
B.

Mandatory

B.

Mandatory

Answers
C.

Optional

C.

Optional

Answers
D.

Visibility

D.

Visibility

Answers
Suggested answer: B

Explanation:

A posture requirement is a set of compound conditions with an associated remediation action that can be linked with a role and an operating system. All the clients connecting to your network must meet mandatory requirements during posture evaluation to become compliant on the network.

Posture-policy requirements can be set to mandatory, optional, or audit types in posture policies. If requirements are optional and clients fail these requirements, then the clients have an option to continue during posture evaluation of endpoints.

Mandatory Requirements

During policy evaluation, the agent provides remediation options to clients who fail to meet the mandatory requirements defined in the posture policy. End users must remediate to meet the requirements within the time specified in the remediation timer settings.

For example, you have specified a mandatory requirement with a user-defined condition to check the existence of C:\temp\text.file in the absolute path. If the file does not exist, the mandatory requirement fails and the user will be moved to Non-Compliant state.

Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-4/admin_guide/b_ise_admin_guide_14/ b_ise_admin_guide_14_chapter_010111.html

Which attribute has the ability to change during the RADIUS CoA?

A.

NTP

A.

NTP

Answers
B.

Authorization

B.

Authorization

Answers
C.

Accessibility

C.

Accessibility

Answers
D.

Membership

D.

Membership

Answers
Suggested answer: B

Explanation:

The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec-usr-aaa-15-sy-book/sec-rad-coa.html

Total 631 questions
Go to page: of 64