ExamGecko
Home Home / Cisco / 350-701

Cisco 350-701 Practice Test - Questions Answers, Page 50

Question list
Search
Search

DRAG DROP

Drag and drop the solutions from the left onto the solution’s benefits on the right.


Question 491
Correct answer: Question 491

DRAG DROP

Drag and drop the cloud security assessment components from the left onto the definitions on the right.


Question 492
Correct answer: Question 492

DRAG DROP

Drag and drop the posture assessment flow actions from the left into a sequence on the right.


Question 493
Correct answer: Question 493

DRAG DROP

Drag and drop the descriptions from the left onto the encryption algorithms on the right.


Question 494
Correct answer: Question 494

Explanation:

Symmetric encryption uses a single key that needs to be shared among the people who need to receive the message while asymmetric encryption uses a pair of public key and a private key to encrypt and decrypt messages when communicating.

Asymmetric encryption takes relatively more time than the symmetric encryption.

Diffie Hellman algorithm is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm. Nowadays most of the people uses hybrid crypto system i.e, combination of symmetric and asymmetric encryption.

Asymmetric Encryption is used as a technique in key exchange mechanism to share secret key and after the key is shared between sender and receiver, the communication will take place using symmetric encryption. The shared secret key will be used to encrypt the communication.

Triple DES (3DES), a symmetric-key algorithm for the encryption of electronic data, is the successor of DES (Data Encryption Standard) and provides more secure encryption then DES.

Note: Although "requires secret keys" option in this question is a bit unclear but it can only be assigned to Symmetric algorithm.

DRAG DROP

Drag and drop the VPN functions from the left onto the description on the right.


Question 495
Correct answer: Question 495

Explanation:

The purpose of message integrity algorithms, such as Secure Hash Algorithm (SHA-1), ensures data has not been changed in transit. They use one way hash functions to determine if data has been changed.

SHA-1, which is also known as HMAC-SHA-1 is a strong cryptographic hashing algorithm, stronger than another popular algorithm known as Message Digest 5 (MD5). SHA-1 is used to provide data integrity (to guarantee data has not been altered in transit) and authentication (to guarantee data came from the source it was supposed to come from). SHA was produced to be used with the digital signature standard.

A VPN uses groundbreaking 256-bit AES encryption technology to secure your online connection against cyberattacks that can compromise your security. It also offers robust protocols to combat malicious attacks and reinforce your online identity.

IKE SAs describe the security parameters between two IKE devices, the first stage in establishing IPSec

DRAG DROP

Drag and drop the exploits from the left onto the type of security vulnerability on the right.


Question 496
Correct answer: Question 496

DRAG DROP

Drag and drop the concepts from the left onto the correct descriptions on the right


Question 497
Correct answer: Question 497

Which two criteria must a certificate meet before the WSA uses it to decrypt application traffic? (Choose two.)

A.

It must include the current date.

A.

It must include the current date.

Answers
B.

It must reside in the trusted store of the WSA.

B.

It must reside in the trusted store of the WSA.

Answers
C.

It must reside in the trusted store of the endpoint.

C.

It must reside in the trusted store of the endpoint.

Answers
D.

It must have been signed by an internal CA.

D.

It must have been signed by an internal CA.

Answers
E.

it must contain a SAN.

E.

it must contain a SAN.

Answers
Suggested answer: A, B

What are two benefits of using Cisco Duo as an MFA solution? (Choose two.)

A.

grants administrators a way to remotely wipe a lost or stolen device

A.

grants administrators a way to remotely wipe a lost or stolen device

Answers
B.

provides simple and streamlined login experience for multiple applications and users

B.

provides simple and streamlined login experience for multiple applications and users

Answers
C.

native integration that helps secure applications across multiple cloud platforms or on-premises environments

C.

native integration that helps secure applications across multiple cloud platforms or on-premises environments

Answers
D.

encrypts data that is stored on endpoints

D.

encrypts data that is stored on endpoints

Answers
E.

allows for centralized management of endpoint device applications and configurations

E.

allows for centralized management of endpoint device applications and configurations

Answers
Suggested answer: B, C

How does Cisco Workload Optimization portion of the network do EPP solutions solely performance issues?

A.

It deploys an AWS Lambda system

A.

It deploys an AWS Lambda system

Answers
B.

It automates resource resizing

B.

It automates resource resizing

Answers
C.

It optimizes a flow path

C.

It optimizes a flow path

Answers
D.

It sets up a workload forensic score

D.

It sets up a workload forensic score

Answers
Suggested answer: B
Total 631 questions
Go to page: of 64