设为首页收藏本站language→→ 语言切换

鸿鹄论坛

 找回密码
 论坛注册

QQ登录

先注册再绑定QQ

12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 149 g; w! S+ e' o& W  Q8 @% W
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP) B/ @1 V1 [; @) F: z
commands to perform file retrieval from the server?
" W& D) g/ D6 B" V! r( MA. profile+ k* _1 x, [' `4 }6 G# d9 q: U5 o
B. url
9 I' G( Z8 u; }2 V8 G( r8 ZC. terminal( U% i% x/ j3 W2 M
D. selfsigned
1 Q0 p" Z! s( b! bCorrect Answer: A
( [0 }: Y& S- s' i4 }; R# LQUESTION 15% f+ _: b: T" c3 }: H
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)( ^: H3 d  k8 K, i4 }7 G3 G, G
A. ARP spoofing, y$ m, U( N( |4 K- Z) A; Z* `
B. exploits0 s9 z4 z3 K4 B5 J# v* T5 p( d7 ^
C. malware
& q: i& C* a" n8 b, P5 g4 D! ED. eavesdropping
. c2 N0 U0 F% x* b2 iE. denial-of-service attacks
1 A( |! N+ U1 A8 t  R; rCorrect Answer: BC) ^( @* N9 b' l
QUESTION 16! i$ {* _/ D. R; D$ t; q: u
What are two rootkit types? (Choose two)7 u* f$ l# U+ D' G
A. bootloader+ ~5 U* d. S* B, t. h5 c' u9 X$ W; r( X
B. buffer mode- W  u9 x# O, m( C$ I5 J% e: W9 p
C. registry$ m( o/ @, h1 V6 n
D. virtual
) Y% @8 \# K7 }* X7 V) kE. user mode" ^7 J" g6 ?; b, D' M- D% @0 }/ ^( Z
Correct Answer: A; j- \! P5 e9 ~: D/ k# O/ E
QUESTION 176 u9 b4 t- F9 j+ ]! X
Which threat involves software being used to gain unauthorized access to a computer system?
* J3 d7 T# G3 \4 c$ v2 c, JA. ping of death
+ d* |& C0 K$ IB. HTTP flood# p: S% }# G& t1 D+ b
C. virus
# Z* L1 a/ i% g) u. s# r0 W* s* [D. NTP amplification
) N- F. Z0 t! _# QCorrect Answer: C: P9 o! f  U0 q7 ]! j" T
QUESTION 18
5 s: T9 E; f; EElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
' O: K' e6 B6 B  R; o1 k7 b+ t' B  F# vA. 3DES
" U' i: D6 x/ mB. DES
5 g+ {& X2 `1 w$ x1 GC. RSA- p$ K5 [2 R' U3 a+ m
D. AES
6 e; h: n0 C, X  k  C1 VCorrect Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19
6 C( ^4 W) r. _% z( TWhich two descriptions of AES encryption are true? (Choose two)4 w& j$ s  F: O0 N1 E0 r+ |$ X
A. AES is more secure than 3DES.8 X! n& X4 E, z0 s9 U- k; s3 u
B. AES can use a 168-bit key for encryption.6 u2 R) \. e7 o3 |; @
C. AES can use a 256-bit key for encryption.- L& g1 h) T: L6 F- R8 ~! h
D. AES encrypts and decrypts a key three times in sequence.
) D" B% W+ u! J5 w4 k/ k4 z6 DE. AES is less secure than 3DES.# L; O7 H9 g+ f2 Y' `
Correct Answer: AC
) Q: H2 b  Y  l4 ?+ M/ |) X( k$ jQUESTION 20
2 x" h6 d. ~3 e8 C; zWhich algorithm provides encryption and authentication for data plane communication?1 G$ ^5 B# [, H+ T
A. SHA-968 R9 G: U4 s. v: o# d0 P
B. SHA-384
! e1 o  x8 Z2 }! \4 B- |7 d% bC. AES-GCM) M& _3 z, V, \6 y
D. AES-256
" _5 B+ j3 t& {Correct Answer: C& u. l+ i1 d4 W& p+ |
QUESTION 21/ V( p! T) f* B3 ?" \) C
Which two key and block sizes are valid for AES? (Choose two)/ F' I* k* D2 U9 D, C
A. 128-bit block size, 192-bit key length' E2 ?" D4 C1 r: F' K
B. 128-bit block size, 256-bit key length
1 o/ F5 y3 ?2 Y; }- B' i7 [C. 64-bit block size, 168-bit key length
, T' U8 J8 }! r7 j& @D. 192-bit block size, 256-bit key length! l; r5 w, t4 o1 ~1 o7 i! K
E. 64-bit block size, 112-bit key length- b+ k7 C, L) O% u
Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 226 p3 H6 k: B: a, q
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
8 B+ |- O% @0 R! b: dA. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
8 Y2 D8 G" M( ^, h0 DB. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX/ B* k* z( g6 z2 M
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
% l( v/ j) U, A7 ?. H1 R- G; jD. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX: Z9 y4 Y* k8 P5 n* p  M2 U
Correct Answer: B: a; S! u1 I( S
QUESTION 23+ v9 L6 C* {2 \6 r
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable
& `0 i6 M9 v0 K# r3 \, oconnectivity?" ^% j1 p( O3 |7 m7 U8 `
A. DMVPN
. g8 c. L# F1 Z/ @B. FlexVPN
/ s7 O+ H7 Q. @4 T$ d! dC. IPsec DVTI
; E2 Y" ^( H8 v# wD. GET VPN  F# _. l: A! L* R
Correct Answer: D1 t1 H5 _6 d$ f, A. \0 @" x
QUESTION 24
, a/ ]/ d! F- B1 C. }Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
. f& |$ G4 o* y1 O" qA. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied
8 b' D# D8 n) O" `; Y3 @automatically( E2 q! T  C2 S4 Z
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.3 h6 Y  W3 ?5 ^5 m8 Z
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
* O; Z$ U/ W% `7 \# i/ e8 c$ fD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied  n, A! u7 E3 ?+ `
automatically.
2 P  j8 {. g2 {1 n# YE. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.% T: I; ?6 `9 j3 ?& Y/ C% n( {
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 25
1 i/ @/ e, r, ^! c* F5 j* EWhich VPN technology can support a multivendor environment and secure traffic between sites?
9 k3 E& X( _2 WA. SSL VPN
4 ?# u# Z* n/ k2 V  E- L! nB. GET VPN
" z' X5 T+ ]# b# |6 kC. FlexVPN6 b% ]6 @6 E- G1 o$ I! m0 `
D. DMVPN' L9 M$ }1 O# L2 n( P0 k
Correct Answer: B1 Z- H0 l1 T$ K! }) {# C
QUESTION 26
$ ^3 b0 s: O! g" Y2 cA network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not8 s/ V" P3 j+ }2 {/ A) Q; ?9 t) D
being established to hostB. What action is needed to authenticate the VPN?
3 K; J3 n4 S! U3 a0 f7 AA. Change isakmp to ikev2 in the command on hostA.% _- W9 @; Y& u9 E( P2 U) T
B. Enter the command with a different password on hostB.
3 L/ W( v4 I* e+ rC. Enter the same command on hostB.6 y9 U! `7 y/ T7 X+ S! g
D. Change the password on hostA to the default password.
$ E: }0 W( `& u* H7 E( HCorrect Answer: C; `- o5 E! |8 ?7 I3 ?" E# O
QUESTION 271 ]& Y& P! y( d( v1 I
Refer to the exhibit.9 h" }3 s. R( j! L+ X1 e
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of
5 }. t: U/ o. e/ H* G7 ?VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command8 ]! t0 \3 r3 C+ a6 T
output?
1 s! C% m5 \4 aA. hashing algorithm mismatch
* x: \, t& `6 ^) WB. encryption algorithm mismatch
/ ?, Y. Q4 Y( A( O2 L( }' @  d! w% RC. authentication key mismatch
! e6 i8 k( U( S  h9 ]* W7 eD. interesting traffic was not applied
* ]! m; Q# c3 h! {0 }Correct Answer: C
4 @' Z. @7 D' v4 YQUESTION 28( [! n/ S0 }; l$ }& E
What is a difference between FlexVPN and DMVPN?
% Z, q; E* v4 L: [5 |A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
' ~3 X5 ]( [1 g5 @" h2 _1 O8 ]B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2: R% h: ~1 O+ i* |/ P; u! i# q
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2% w# O8 r. [( R" l: r
D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv20 [5 p8 ~. X9 Q3 s$ ~3 y
Correct Answer: C% Z5 M- L7 a1 r" X7 ?
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29. `4 ^( U/ ^3 P/ _/ D
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
+ p8 }$ b& S% ^  |! eA. TLSv1.2
7 A7 B0 b1 s0 hB. TLSv1.1
# Y* O5 [9 I# F6 M6 u& i* bC. BJTLSv1
# \( l, U4 z6 p* S3 l# P8 t! CD. DTLSv1
: P" M$ U5 h: g% k; o1 W7 KCorrect Answer:; M) j- ~( `; l2 A1 ^3 I6 {7 o
D
& l/ [3 \( {: YQUESTION 30! Y3 H2 `; y4 H% Q8 g8 a, T+ X
What is a commonality between DMVPN and FlexVPN technologies?
5 S; H8 Y$ ^' G  L3 u1 D: eA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
# Y& V7 e# L2 f4 p0 i7 b' XB. FlexVPN and DMVPN use the new key management protocol
$ u& Z) B5 L3 p0 i) ZC. FlexVPN and DMVPN use the same hashing algorithms0 K+ R& {# Y8 {) p2 X
D. IOS routers run the same NHRP code for DMVPN and FlexVPN/ u" M2 Z6 j% ]) F. g. R
Correct Answer: D
, g1 D4 d% Y) }1 C" Q5 WQUESTION 31* s, ?$ s  ~! K6 [* H" j6 A
Which functions of an SDN architecture require southbound APIs to enable communication?8 @( Y5 f: P9 Y) Q- K' e; Q+ d
A. management console and the cloud
3 V! o& ]; j  O6 h/ uB. management console and the SDN controller
) |6 H; e- o, I/ mC. SDN controller and the cloud
' C0 j. j4 U5 d% CD. SDN controller and the network elements: a9 o6 R+ l# l, |2 K+ ~7 j
Correct Answer: D( [4 r) F2 f: p# `0 j: F& g
QUESTION 32
! r3 r2 V9 ^( Q0 ?: u9 u( D! lWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
4 @  g; A0 g5 y  H' j5 mA. accounting' X) M9 c7 [$ @1 D6 A( s
B. encryption
% ^( P8 {7 A0 a1 s7 [9 eC. assurance
: t& ]: e2 ^1 W4 ]D. automation3 m/ Q' {- p! n7 w' h+ w
E. authentication
4 d. b0 H' b, g5 X: x4 o: ^$ iCorrect Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33
# R. z. C: C* UThe main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
( s- @. a2 w/ \1 x% Z* ?( gA. SDN controller and the cloud
6 ~1 u0 d, N( H* F6 s. kB. management console and the cloud+ N9 O$ F$ [1 x2 N! K
C. management console and the SDN controller
6 k5 z" `- i+ w2 l+ a0 l* X1 VD. SDN controller and the management solution
! }/ \& l. K+ i4 KCorrect Answer: D
# G# I# t6 |3 h% UQUESTION 34
% I( d/ P6 u2 n4 L6 t* HWhich two request of REST API are valid on the Cisco ASA Platform? (Choose two)3 _" _; b1 [8 V) z- f
A. push3 q" {# p5 X; N
B. options
. O% c' b+ Z7 O. SC. connect6 r) c' q3 U4 O, D
D. put) V* ^5 U& \5 D3 e6 r
E. get
6 s. A* J/ J* M, \+ eCorrect Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.
: ^8 |) K* y) D! d2 x5 h
  y+ d9 {+ Z6 R; N6 o9 `6 SWhat does the API do when connected to a Cisco security appliance?. Y. W% C$ \, n+ P. }
A. create an SNMP pull mechanism for managing AMP
. k& e1 v0 y0 s" p3 bB. gather network telemetry information from AMP for endpoints! L6 i" b' U8 x" M9 H& m- a; O. ~
C. get the process and PID information from the computers in the network& t" P. E! M, ~& V
D. gather the network interface information about the computers AMP sees- Q% I8 \9 @2 |) ?, h1 G4 {: E
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 36
# |4 X- ^# l6 r+ V7 ?Refer to the exhibit.* ~0 Y3 G) u# k: z% z0 W
What is the result of this Python script of the Cisco DNA Center API?
, S% B+ ^; a0 z0 k& F, RA. adds a switch to Cisco DNA Center! _( a3 t8 ~+ X/ r6 S+ U
B. adds authentication to a switch
$ X' }, t9 Q  g& y  xC. receives information about a switch
* H" Y( z; u. W5 X/ e* PCorrect Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 373 Q2 s: H( w( K, c1 W4 y2 t/ G% r
Which API is used for Content Security?, O2 {0 `# \* b5 J) s) H! W: o  F( n
A. OpenVuln API
3 P: m; s* Y' i5 G9 PB. IOS XR API9 g) v( ~5 k0 ]2 ^  R. N0 n: Y
C. NX-OS API6 `% h4 m3 Q, ^+ T* ^1 m' U0 C+ W/ S% m
D. AsyncOS API  k2 `! ?6 \7 d' L* g' ]- G( x0 T
Correct Answer: D
# `& p7 Q, k9 H8 @QUESTION 38# F% E  _4 ~6 ]6 A: x! g. Q
Which option is the main function of Cisco Firepower impact flags?
. q1 L1 W: V# @7 W/ }; o+ h) HA. They alert administrators when critical events occur.
( i# K( b/ o1 v" x6 h3 {B. They identify data that the ASA sends to the Firepower module.
# s' Z3 `5 M7 o! E1 @1 z0 t7 l7 `. AC. They correlate data about intrusions and vulnerability.
3 v6 m* K: N0 ^9 q& f4 Z% c2 ^D. They highlight known and suspected malicious IP addresses in reports.6 ~0 j  R2 E2 Z( C0 J" m  Z7 F
Correct Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 385 D6 Y) l8 z1 B6 k" q' o
Which option is the main function of Cisco Firepower impact flags?
& i( H: B" F2 g' f2 z( k0 U6 KA. They alert administrators when critical events occur.
5 R; H/ g+ f8 j/ wB. They identify data that the ASA sends to the Firepower module.
% B8 ~& ^2 E2 H& |) r* b- DC. They correlate data about intrusions and vulnerability.4 P9 K, c/ S- S1 E* Y
D. They highlight known and suspected malicious IP addresses in reports.
0 o0 C$ m% h% \6 ~1 {3 F* ICorrect Answer:" k+ ~1 t* z+ v& O# z# y6 J
C
& S6 T4 G' }# ]) p0 Z! A: ~QUESTION 39
, d2 O4 F  A7 c* }5 V. q2 O( sWhich two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
2 G$ q' G, [3 ?. R- EA. Cisco FTDv configured in routed mode and IPv6 configured) D5 }9 o! Z' X5 N# f
B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises
4 A1 k3 J: V# B; z4 a# H- q3 {C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
; l/ _2 {) J  u& f3 H  r0 ED. Cisco FTDv with two management interfaces and one traffic interface configured
0 i/ g, N8 ~. f6 W3 ME. Cisco FTDv with one management interface and two traffic interfaces configured
5 |% F5 {3 W: D% M0 |- iCorrect Answer:
" T: A7 i/ c0 F7 tBC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41
8 D( v8 w. A5 zWhich two deployment modes does the Cisco ASA FirePower module support? (Choose two)& B7 H1 l0 }( n( k% _1 \
A. routed mode
7 C: D. ?1 {6 I$ X# O* L( g+ t+ RB. active mode
3 `& a  n! ~8 ~% s3 R& w3 FC. transparent mode  V1 C/ |* ]2 q* H# _
D. inline mode: D) F3 T; K$ Y: r. E8 Z
E. passive monitor-only mode
) }7 I: h, M- N1 p" `7 |Correct Answer:
) Y' q- D$ ]  cDE/ N: B$ w) n4 m6 d1 [  b
QUESTION 427 ]" F+ J. ^( U7 b& Z
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?; j# I; m+ H/ s. ^* |6 x
A. time synchronization/ b  T/ D) X; D+ T
B. network address translations
- D4 z, E- u+ M+ y  w/ {9 cC. quality of service
1 x$ l9 e% Z. a0 |. MD. intrusion policy
1 H. S% T! M; w+ u" dCorrect Answer:! I. S+ R" k* g7 r0 r
A
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-1-23 04:08 , Processed in 0.060439 second(s), 12 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表