设为首页收藏本站language 语言切换
查看: 3071|回复: 29
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-3 06:12:46 | 显示全部楼层 |阅读模式
Any one is studying on 350-701 now? if please add me to your wechat, so we can learn together.
/ x( V2 d2 d! r1 D; T% h
/ t: J: k- T6 w+ Y' m1 l4 q! F9 B2 Qplease send your wechat id to jhthello@hotmail.com.. M3 D1 W, }+ s- Y! ], i' n' v

* u7 K1 E$ V; F5 k" L, A5 BThanks,
 楼主| 发表于 2020-11-3 23:10:12 | 显示全部楼层
Does anyone want to study together? we can have a daily discussion here. or on the wechat.
. d2 W: W3 I$ l) w
板凳 2020-11-3 23:10:12 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-5 01:38:08 | 显示全部楼层
Question 110 ]" t. t0 R) u6 @2 f! J
( x7 t( O' x' _; ^; S' n2 [
Which two tasks allow NetFlow on a Cisco ASA 5500 Series firewall? (Choose two)0 x6 j5 K% X9 o3 u$ C+ R

/ i6 k; P$ r9 g+ M# LA. Enable NetFlow Version 9.
1 m6 @# M+ N6 L) {3 d2 j( v& F1 [B. Create an ACL to allow UDP traffic on port 9996.- H8 S+ ~& U2 H+ [2 X! m
C. Apply NetFlow Exporter to the outside interface in the inbound direction.
1 r" W' M7 \( h4 ~$ N/ KD. Create a class map to match interesting traffic.
& I  r) |* q" oE. Define a NetFlow collector by using the flow-export command.8 ?# M$ M5 G1 k! b6 Q' Z

9 V+ T+ v7 s0 y" l4 n / H  H5 ]( f) i, o4 b

3 X9 a0 B, m) n- D5 b# oAnswer: C E
8 o+ K0 v" j# U
地板 2020-11-5 01:38:08 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-5 23:09:26 | 显示全部楼层
QUESTION 25
( U* U$ u* y9 S7 K0 MWhich VPN technology can support a multivendor environment and secure traffic between sites?: U! y. _+ K: i& ]3 A) R" Z
A. SSL VPN
, y$ g) W5 q; w6 A0 h) WB. GET VPN
- e: R2 w; @) l+ Z) n% e  b# bC. FlexVPN" d1 o# x6 Z& ?) z9 }, K3 [2 A+ m9 a
D. DMVPN
% s  V& H. L' Q$ DCorrect Answer: B9 ?4 `8 N$ \0 H# T2 J' G/ {
5# 2020-11-5 23:09:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-5 23:19:41 | 显示全部楼层
QUESTION 113
! S0 ?" G/ E- p! U4 F# Y* oUnder which two circumstances is a CoA issued? (Choose two)* t' F$ l. z( S( p/ y4 ]
A. A new authentication rule was added to the policy on the Policy Service node.
6 B2 `" L3 d+ M& B, B% a* k* W9 lB. An endpoint is profiled for the first time., X) |: N7 s! _5 o
C. A new Identity Service Engine server is added to the deployment with the Administration persona
: ?4 O& [6 c" y; S" W" @6 c, fD. A new Identity Source Sequence is created and referenced in the authentication policy.
5 z2 P# |; z- i( C; DE. An endpoint is deleted on the Identity Service Engine server.
3 ~4 n; B: U$ y; s+ I: oCorrect Answer: BE
& T5 n! r6 W5 ^& [, p  a; S8 W# s! Q0 w# [# d# D8 l

8 ?3 }3 ]# F  U' {# TExplanation
6 U* x4 v" Q% i6 a' M# ^& K% i& r& _% o' S6 _# ]9 @6 y
The profiling service issues the change of authorization in the following cases:
% @$ `7 A& T, j1 w$ f" [" W2 C4 D– Endpoint deleted—When an endpoint is deleted from the Endpoints page and the endpoint is disconnected or removed from the network.# J- g0 X" A2 K3 C, w6 Y7 x6 J
An exception action is configured—If you have an exception action configured per profile that leads to an unusual or an unacceptable event from that endpoint. The profiling service moves the endpoint to the corresponding static profile by issuing a CoA.$ e! v$ J# g8 p6 `5 E3 m
– An endpoint is profiled for the first time—When an endpoint is not statically assigned and profiled for the first time; for example, the profile changes from an unknown to a known profile.
  @9 g3 m/ z- e7 D& l2 L+ An endpoint identity group has changed—When an endpoint is added or removed from an endpoint identity group that is used by an authorization policy.; s: [- z1 D& e. Q/ S; s1 ^% _: |
The profiling service issues a CoA when there is any change in an endpoint identity group, and the endpoint identity group is used in the authorization policy for the following:
* h+ P7 \! m$ b9 |. g++ The endpoint identity group changes for endpoints when they are dynamically profiled
$ I2 \- O0 \6 Z& T  ~8 e8 ~$ ]/ B++ The endpoint identity group changes when the static assignment flag is set to true for a dynamic endpoint) W/ h! V0 E; s% _6 a
– An endpoint profiling policy has changed and the policy is used in an authorization policy—When an endpoint profiling policy changes, and the policy is included in a logical profile that is used in an authorization policy. The endpoint profiling policy may change due to the profiling policy match or when an endpoint is statically assigned to an endpoint profiling policy, which is associated to a logical profile. In both the cases, the profiling service issues a CoA, only when the endpoint profiling policy is used in an authorization policy.8 V4 [  V# ?6 Z8 X9 c, F; \7 I; i# ^

/ M$ I5 ^: [* IReference: https://www.cisco.com/c/en/us/td ... chapter_010100.html
6# 2020-11-5 23:19:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2020-11-6 20:00:49 | 显示全部楼层
what are you talking about
7# 2020-11-6 20:00:49 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-7 04:23:50 | 显示全部楼层
贾旭丶 发表于 2020-11-6 20:00" l7 Y/ j  [( M$ _
what are you talking about
/ G- `; }7 z+ j2 h: V+ `" d+ S
This is the question which from the 350-701 exam? are you taking the exam ?
8# 2020-11-7 04:23:50 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-7 07:14:09 | 显示全部楼层
QUESTION 1
3 a2 m8 W1 C7 D/ a% H# q0 hWhich attack is commonly associated with C and C++ programming languages?
* V- ~# P4 d7 F$ m; cA. cross-site scriptingwrong6 Q" F5 R; U2 x3 n' v$ y
B. DDoS4 X: R& m7 O3 r# A# h& N( r. l
C. buffer overflow. R3 ~- B. v  w( {, `5 c. G
D. water holing0 g$ q( u3 P4 b7 n, K
Correct Answer: C
9# 2020-11-7 07:14:09 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-9 06:05:11 | 显示全部楼层
QUESTION 2
7 C5 P* R) T/ o4 R) ^  DWhat is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
9 M- k4 w0 s) h. J- U/ D* bA. SMTPwrong
+ ]' D/ U2 ~# B) RB. pxGrid( m" }" h" l* A* _, A9 r5 [' h1 N
C. STIX
- `2 k& g' }7 B* l" o& eD. XMPP  z0 Y1 ]& v* V# s. m' X5 X7 E
Correct Answer: C
10# 2020-11-9 06:05:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-10 00:07:14 | 显示全部楼层
QUESTION 3
4 D- Y" Z2 k7 iWhich two preventive measures are used to control cross-site scripting? (Choose two)
" d; v/ B: V5 z8 ^7 ?' t3 LA. Disable cookie inspection in the HTML inspection engine.wrong( M3 f; z4 \( T$ n0 I! _# c3 H- B
B. Incorporate contextual output encoding/escaping
( X6 Y! G" X# ?4 Y4 WC. Enable client-side scripts on a per-domain basis
3 d1 s! z' x- Y# fD. Run untrusted HTML input through an HTML sanitization engine.
. P6 n- A  n. E- r  IE. Same Site cookie attribute should not be used.5 S: k6 I3 Y0 X3 D6 @  c
Correct Answer: BC
11# 2020-11-10 00:07:14 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-10 23:14:27 | 显示全部楼层
QUESTION 4; |4 L2 l: P; o
Which two mechanisms are used to control phishing attacks? (Choose two): T1 d6 {. V& I2 G
A. Use antispyware software.wrong
3 S! F( i+ G" c- k# d* \B. Implement email filtering techniques.6 u, N+ C/ g6 M5 n
C. Revoke expired CRL of the websites.
  m  f" m2 o* w6 ?7 P6 o; y  \" e+ KD. Enable browser alerts for fraudulent websites.% Z, S: ~% N* ^- g
E. Define security group memberships.
; O' k" e/ j- r& pCorrect Answer: BD
' |, u# T% v5 I! J# z5 b1 H# A+ S! @. I9 \5 c
QUESTION 5
* V* x& C2 ?/ z8 s  x1 \. @In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?$ i. t0 v& ^) E) u& z2 v  x* q
A. rootkit exploitwrong
. G3 m0 c" @$ @% YB. Smurf( g4 z/ V  |4 R: x' n: l9 ^
C. distributed denial of service
, s1 f" r7 `$ b- zD. cross-site scripting" b7 h/ L* U+ z% S
Correct Answer: D
12# 2020-11-10 23:14:27 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-13 11:27:55 | 显示全部楼层
QUESTION 6$ m/ {6 V- D: h5 {% \6 c/ e! b
Which two behavioral patterns characterize a ping of death attack? (Choose two)
7 Q( H( f$ \5 Q8 s" o5 g1 _A. Malformed packets are used to crash systems.& M; H; o# \: J/ @5 ]1 @6 J  T
B. The attack is fragmented into groups of 8 octets before transmission.
/ T! a/ W# M0 d- ]- B+ w4 `$ t! ?C. The attack is fragmented into groups of 16 octets before transmission.
. |- h1 h7 R% J& ^( d* ]D. Publicly accessible DNS servers are typically used to execute the attack.1 q5 C0 V: h8 s2 _" x1 }& Q6 Z. c
E. Short synchronized bursts of traffic are used to disrupt TCP connections.% T4 N$ O3 w7 b5 Q9 S4 X
Correct Answer: AB
: q& B: a9 y; Q( R, Z' ~QUESTION 7; o& B$ J$ B3 A
What is the difference between deceptive phishing and spear phishing?9 ~6 o: ~2 d, i0 ^
A. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
. O& ^, y" |* K' ~7 H# R# F7 NB. A spear phishing campaign is aimed at a specific person versus a group of people.
' c6 m9 h: i) ]  j+ i5 aC. Spear phishing is when the attack is aimed at the C-level executives of an organization.
3 N" A" G4 e& j; ?. C4 @! kD. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
' w4 O3 @5 ~: r0 Y8 S+ ^+ lCorrect Answer: B
13# 2020-11-13 11:27:55 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-15 04:03:32 | 显示全部楼层
QUESTION 8
% r6 C) b4 Q! M; b: b' KWhich two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)" y: f/ V  G) E7 F
A. Patch for cross-site scripting.
$ Q+ L( k: N8 N( d8 gB. Perform backups to the private cloud.1 S& c+ W* G. f+ x' F1 s" S2 ~
C. Protect systems with an up-to-date antimalware program.
0 z# b" a5 S" v, CD. Protect against input validation and character escapes in the endpoint.
1 n( D. k: E5 q/ i, n' VE. Install a spam and virus email filter.. b9 C- {) n' T0 ^
Correct Answer: CE
( `( e3 A3 O) h+ X  a& BQUESTION 9
1 g: S# m% c: b8 _Which two capabilities does TAXII support? (Choose two): E1 B' k. U2 W' B" K
A. Binding9 O) k; S8 f" t/ S! x$ r: Q/ g
B. Exchange7 M1 A; o# \2 Q& K1 u  m
C. Mitigating1 A& ~; p3 Y4 r+ d
D. Pull messaging4 q0 ]/ \  j9 a, E
E. Correlation0 K, D7 Z/ k& E& c/ V
Correct Answer: AD5 u! H9 J6 |2 X. I
QUESTION 10
# B. B. l% A4 e9 l: D8 HWhich flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
( a" |/ K- v, z4 GA. web page images
+ I7 @% g3 P% q9 `/ Z7 e5 wB. database+ P* J0 Q7 o; P4 r* V5 `  V
C. Linux and Windows operating systems
6 }/ `5 L( r# {7 f: r5 J" VD. user input validation in a web page or web application' |- A5 Q! ^' Y% c2 V
Correct Answer: D
14# 2020-11-15 04:03:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-16 10:35:39 | 显示全部楼层
QUESTION 11
9 F4 r; z" _% R* HWhich two prevention techniques are used to mitigate SQL injection attacks? (Choose two)
) @) v: ^7 @7 K9 ~/ V( K8 v! ^A. Secure the connection between the web and the app tier.2 U% J) h+ e& X
B. Use prepared statements and parameterized queries.
$ i. F/ O6 Q5 p) r* BC. Check integer, float, or Boolean string parameters to ensure accurate values.( z% A  T- X, C$ P* ?
D. Block SQL code execution in the web application database login.
7 y, w, F; @* X, u4 }! xE. Write SQL code instead of using object-relational mapping libraries.% m9 A# n4 |4 w, \$ ^, m) O* P
Correct Answer: BC
+ E' q0 y' W! Y) [" ?0 {5 fQUESTION 12$ Q* I3 k4 u! C6 z0 d+ M" m
Which form of attack is launched using botnets?
& W- r$ v, }: p8 a! M0 lA. DDOS4 b! p! h' ~" c$ s7 p/ B
B. EIDDOS6 S9 ]6 W5 v* I* v: d2 z
C. TCP flood  v# c8 Z" w; L% h& t
D. virus
) w- ]- j2 E. H0 P: [( qCorrect Answer: A: B. X) x( u& [, R8 m. I  F) b
QUESTION 13* O5 L# T1 |- Y7 H3 T$ T
Which type of attack is social engineering?
  `/ b% T  m( B0 L+ KA. trojan$ ^; P9 r. m' o
B. malware
' I' L* p' u  h$ J9 ^0 R& n9 }C. phishing0 J. U) J0 X4 @
D. MITM7 _2 @2 E' m9 u1 K; @
Correct Answer: C
15# 2020-11-16 10:35:39 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-24 06:39 , Processed in 0.070375 second(s), 23 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表