ExamGecko
Home / Cisco / 350-701 / List of questions
Ask Question

Cisco 350-701 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?

3DES

3DES

RSA

RSA

DES

DES

AES

AES

Suggested answer: B
Explanation:

Compared to RSA, the prevalent public-key cryptography of the Internet today, Elliptic Curve Cryptography (ECC) offers smaller key sizes, faster computation,as well as memory, energy and bandwidth savings and is thus better suited forsmall devices.

asked 10/10/2024
federico monaco
42 questions

Question 22

Report Export Collapse

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX

authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX

authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX

secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX

secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX

Suggested answer: C
Explanation:

Configure a Crypto ISAKMP Key In order to configure apresharedauthentication key, enter thecrypto isakmp keycommand in global configuration mode: crypto isakmp key cisco123 address 172.16.1.1 https://community.cisco.com/t5/vpn/isakmp-with-0-0-0-0-dmvpn/td-p/4312380


asked 10/10/2024
Johan Wu
32 questions

Question 23

Report Export Collapse

Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?

DMVPN

DMVPN

FlexVPN

FlexVPN

IPsec DVTI

IPsec DVTI

GET VPN

GET VPN

Suggested answer: D
Explanation:

Cisco's Group Encrypted Transport VPN (GETVPN) introduces the concept of a trusted group to eliminate point-to-point tunnels and their associated overlay routing. All group members (GMs) share a common security association (SA), also known as a group SA. This enables GMs to decrypt traffic that was encrypted by any other GM.

GETVPN provides instantaneous large-scale any-to-any IP connectivity using a group IPsec security paradigm.

Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/group-encryptedtransport-vpn/GETVPN_DIG_version_2_0_External.pdf

asked 10/10/2024
Sean Kell
46 questions

Question 24

Report Export Collapse

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)

Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically

Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically

The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

The IPsec configuration that is set up on the active device must be duplicated on the standby device

The IPsec configuration that is set up on the active device must be duplicated on the standby device

Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device

The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device

Suggested answer: C, E
Explanation:

Stateful failover for IP Security (IPsec) enables a router to continue processing and forwarding IPsec packets after a planned or unplanned outage occurs. Customers employ a backup (secondary) router that automatically takes over the tasks of the active (primary) router if the active router loses connectivity for any reason. This failover process is transparent to users and does not require adjustment or reconfiguration of any remote peer.

Stateful failover for IPsec requires that your network contains two identical routers that are available to be either the primary or secondary device. Both routers should be the same type of device, have the same CPU and memory, and have either no encryption accelerator or identical encryption accelerators.

Prerequisites for Stateful Failover for IPsec

Complete, Duplicate IPsec and IKE Configuration on the Active and Standby Devices This document assumes that you have a complete IKE and IPsec configuration.

The IKE and IPsec configuration that is set up on the active device must be duplicated on the standby device.

That is, the crypto configuration must be identical with respect to Internet Security Association and Key Management Protocol (ISAKMP) policy, ISAKMP keys (preshared), IPsec profiles, IPsec transform sets, all crypto map sets that are used for stateful failover, all access control lists (ACLs) that are used in match address statements on crypto map sets, all AAA configurations used for crypto, client configuration groups, IP local pools used for crypto, and ISAKMP profiles.

Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpnavailability-15-mt-book/sec-state-fail-ipsec.htmlAlthough the prerequisites only stated that "Both routers should be the same type of device" but inthe"Restrictions for Stateful Failover for IPsec" section of the link above, it requires "Both the active andstandby devices must run the identical version of the Cisco IOS software" so answer E is better thananswer B.

asked 10/10/2024
Ronald Zegwaard
34 questions

Question 25

Report Export Collapse

Which VPN technology can support a multivendor environment and secure traffic between sites?

SSL VPN

SSL VPN

GET VPN

GET VPN

FlexVPN

FlexVPN

DMVPN

DMVPN

Suggested answer: C
Explanation:

FlexVPN is an IKEv2-based VPN technology that provides several benefits beyond traditional site-tosite VPN implementations. FlexVPN is a standards-based solution that can interoperate with non- Cisco IKEv2 implementations. Therefore

FlexVPN can support a multivendor environment. All of the three VPN technologies support traffic between sites (site-to-site or spoke-to-spoke).

asked 10/10/2024
Randhir Singh
43 questions

Question 26

Report Export Collapse

A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not being established to hostB. What action is needed to authenticate the VPN?

Change isakmp to ikev2 in the command on hostA.

Change isakmp to ikev2 in the command on hostA.

Enter the command with a different password on hostB.

Enter the command with a different password on hostB.

Enter the same command on hostB.

Enter the same command on hostB.

Change the password on hostA to the default password.

Change the password on hostA to the default password.

Suggested answer: C
asked 10/10/2024
Marc Aurele ALLOTCHENOU
41 questions

Question 27

Report Export Collapse

Refer to the exhibit.

Cisco 350-701 image Question 27 117248 10102024233051000000

A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command output?

hashing algorithm mismatch

hashing algorithm mismatch

encryption algorithm mismatch

encryption algorithm mismatch

authentication key mismatch

authentication key mismatch

interesting traffic was not applied

interesting traffic was not applied

Suggested answer: C
asked 10/10/2024
Jose Walter
39 questions

Question 28

Report Export Collapse

What is a difference between FlexVPN and DMVPN?

DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1

DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1

DMVPN uses only IKEv1 FlexVPN uses only IKEv2

DMVPN uses only IKEv1 FlexVPN uses only IKEv2

FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2

FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2

FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2

FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2

Suggested answer: C
asked 10/10/2024
Vilfride Lutumba
45 questions

Question 29

Report Export Collapse

Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?

TLSv1.2

TLSv1.2

TLSv1.1

TLSv1.1

BJTLSv1

BJTLSv1

DTLSv1

DTLSv1

Suggested answer: D
Explanation:

DTLS is used for delay sensitive applications (voice and video) as its UDP based while TLS is TCP based.

Therefore DTLS offers strongest throughput performance. The throughput of DTLS at the time of AnyConnect connection can be expected to have processing performance close to VPN throughput.

asked 10/10/2024
Website Subscription
44 questions

Question 30

Report Export Collapse

What is a commonality between DMVPN and FlexVPN technologies?

FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes

FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes

FlexVPN and DMVPN use the new key management protocol

FlexVPN and DMVPN use the new key management protocol

FlexVPN and DMVPN use the same hashing algorithms

FlexVPN and DMVPN use the same hashing algorithms

IOS routers run the same NHRP code for DMVPN and FlexVPN

IOS routers run the same NHRP code for DMVPN and FlexVPN

Suggested answer: D
Explanation:

In its essence, FlexVPN is the same as DMVPN. Connections between devices are still point-to-point GRE tunnels, spoke-to-spoke connectivity is still achieved with NHRP redirect message, IOS routers even run the same NHRP code for both DMVPN and FlexVPN, which also means that both are Cisco's proprietary technologies.

Reference: https://packetpushers.net/cisco-flexvpn-dmvpn-high-level-design/

asked 10/10/2024
Justin NJOCK
52 questions
Total 631 questions
Go to page: of 64

Related questions