设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14
% N1 W0 r4 W9 }( P6 X7 xWhich PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP
! F; k% }: d, y! L$ [commands to perform file retrieval from the server?3 l1 L% j0 U2 \$ X) F( |: j
A. profile
. {+ c8 Z& l- E* E3 YB. url  w% [% o: Q. w6 J* ]0 t( a* N
C. terminal
* k1 {! G1 n8 ^) mD. selfsigned
# [* ^. s; q7 t' E. @; z7 T4 VCorrect Answer: A
1 Q  a. o/ r: n( s/ NQUESTION 15
* A7 i$ n5 Y/ [7 h+ J5 T1 fWhich two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two), ^- l/ I$ V* V
A. ARP spoofing
; e& t7 O7 m) J2 {+ B" C0 qB. exploits" l5 g% q- J" b& a) {
C. malware1 i: e- Q+ `1 ?+ {  Z4 \9 w) u# _, s
D. eavesdropping
2 k+ a# `$ u6 ]; l+ ?+ BE. denial-of-service attacks
; t2 [3 _2 N) {4 N7 p$ e. MCorrect Answer: BC  |- y0 Z5 u5 e: T* b- p
QUESTION 16
( w* `$ a/ O4 }What are two rootkit types? (Choose two)
5 T' G+ L( ^1 E$ |$ pA. bootloader
" |! @! o' X1 B. y" T- A6 N7 F& YB. buffer mode" R; _1 [: L' X# R; U
C. registry- r% Y8 v" \6 g: o% u( ?4 s% K( h/ l
D. virtual
8 N" P: L( W$ F  ~1 xE. user mode- K3 o) y' o* ^" A7 k
Correct Answer: A/ e+ x# P: y/ c6 c5 v6 d4 k
QUESTION 178 ~% |; I; s& o
Which threat involves software being used to gain unauthorized access to a computer system?0 o( G. ]$ e& F# Q% L" ~
A. ping of death
' o; u+ Z, s4 y2 LB. HTTP flood3 Y1 ~, h: L+ G- ]0 @7 V* S. r4 o
C. virus
9 m  {; o# w; ]: |D. NTP amplification
: }6 l  `7 ?7 ICorrect Answer: C! h* L, Y% k' a' f
QUESTION 18
, d% t$ {+ `/ ]  |Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?  a* c4 g; F0 D) S- m, `2 D" U9 b
A. 3DES7 @' ?3 N% `) r
B. DES- i! ]4 W1 @: H6 C. F4 s
C. RSA' b0 k% K- X! G5 A8 S7 B3 N
D. AES/ `5 N- f: S' _* K
Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19+ s) \& J8 G) u4 c* y
Which two descriptions of AES encryption are true? (Choose two)
  p& A# _+ U3 x4 nA. AES is more secure than 3DES.4 ]( O1 H6 X9 Z; y5 V$ r/ M
B. AES can use a 168-bit key for encryption.5 H9 F; }* d3 t" u8 m
C. AES can use a 256-bit key for encryption.& x2 J1 T6 A- G: f6 ~$ h% X! H
D. AES encrypts and decrypts a key three times in sequence.6 Q9 j! I, n  ^4 H
E. AES is less secure than 3DES.9 z. A* s) ~& V' J! ~1 H8 y
Correct Answer: AC
3 q) `( g5 y# s2 ZQUESTION 20
; c3 Y. o( Q0 _0 l6 BWhich algorithm provides encryption and authentication for data plane communication?
' e) [) ^+ L0 n: g$ G9 NA. SHA-96- ^7 h8 g6 ~! j' G# |3 ^! K
B. SHA-384* K9 a+ [/ z$ A5 t" T- q7 E% e
C. AES-GCM
9 u; R, D* f# Z; H0 Z) MD. AES-256# ]% s" p/ J0 S: _
Correct Answer: C
) c' S/ B1 G  n5 P# I* ^, N9 fQUESTION 21: e6 y, [+ l' \9 r: {
Which two key and block sizes are valid for AES? (Choose two), I5 e& k( w- P2 v& A- L* r! K3 l
A. 128-bit block size, 192-bit key length6 B; M0 ^; L" `
B. 128-bit block size, 256-bit key length0 |( J" H# ^2 E( r
C. 64-bit block size, 168-bit key length
1 K. T" _/ w' z) AD. 192-bit block size, 256-bit key length- f8 t" D( a9 a9 b( L; c& n% v0 z
E. 64-bit block size, 112-bit key length0 p+ h; Z$ L- [
Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
3 l# L# A& i0 q' l/ iWhat is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?& s' \- K' q% O7 ^/ a6 x7 l
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX+ y, I  N& ]1 q* D9 [$ a
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX! X4 ?# m) z. h5 {
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
% \# S1 v5 y$ h, B1 V2 u( D; gD. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX9 y9 H1 u0 c9 ]2 B* h# J
Correct Answer: B# u6 u% a2 S2 v1 R+ `
QUESTION 23' t% Q. Z: ^3 F  ~, A
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable9 h+ ]  D& L8 g) P; [5 ?
connectivity?5 c- ~$ m' D( W* Y+ g. s' }& L
A. DMVPN
7 k' H  U' ^/ qB. FlexVPN( x; X# U" f2 o( P8 w
C. IPsec DVTI+ a) _! I9 {, D4 F; Z* _! A" j- _4 T
D. GET VPN
5 u: H3 h0 _+ q- n/ |Correct Answer: D; n8 D) y8 N- @6 w8 _
QUESTION 24
& j& I) F& `/ ?; |: iWhich two conditions are prerequisites for stateful failover for IPsec? (Choose two)
6 }/ u. H4 B) @2 G5 _6 YA. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied
; |7 r: T. ^" b) |9 ?) g  \automatically
$ n9 E1 v  Z0 {0 l! }$ ^1 W4 lB. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
' R/ E6 Q% t% ~C. The IPsec configuration that is set up on the active device must be duplicated on the standby device% D6 B# v# y$ t) d9 B0 W
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied
, M! y1 x  l2 X3 ?0 `& ~4 Rautomatically.6 _1 j4 n* R- ], a
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
  f" H' ]; _; \% s/ Y- v) kCorrect Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 250 m" M- P% f! I8 F7 v
Which VPN technology can support a multivendor environment and secure traffic between sites?5 V9 o7 `) u) z- _
A. SSL VPN
0 s; z: a0 G) B" p1 GB. GET VPN/ W8 K+ N1 {* m  p2 X' U1 Z# P& R7 ^
C. FlexVPN
0 w& o: r$ E% |( j2 X3 uD. DMVPN+ P3 N6 s( C, ~; J: E. U
Correct Answer: B/ T3 x7 u- j0 v  e
QUESTION 26
5 D! l/ }, X& v: ~2 ?A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not/ ]1 p7 u% S# E2 H; ^
being established to hostB. What action is needed to authenticate the VPN?6 n5 A+ W" T9 O' d5 d# u( p
A. Change isakmp to ikev2 in the command on hostA.7 ^; \/ A' r. @8 u
B. Enter the command with a different password on hostB./ X$ z( ~; q6 a5 q+ E
C. Enter the same command on hostB.0 _4 E. H  x) i
D. Change the password on hostA to the default password.
* V& t) e) {7 R- q9 TCorrect Answer: C. c1 `  {8 N. h" @4 M  h- W
QUESTION 27
& v0 E4 i; [7 d0 d. M! {" gRefer to the exhibit.
6 |0 b* h9 F- g) g% @! }6 FA network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of% ^8 U/ b5 ~, N: N+ y7 h' J" D
VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command
6 E) {* k+ |9 L" f2 @( J, e1 m+ N  ]output?
8 A: H% B0 J& \0 [A. hashing algorithm mismatch
3 ]1 O3 ~6 d( ]7 v  s$ J' ]B. encryption algorithm mismatch- @7 b/ b) m! F
C. authentication key mismatch
$ }+ ^. H2 I" t- i2 Q; _* AD. interesting traffic was not applied7 ^; q  N. i* b9 m, ?5 p  A
Correct Answer: C
- D( j! W) m: k. y8 \& }1 i$ ^QUESTION 28
9 V$ i9 A$ ^% L/ A! b0 b% PWhat is a difference between FlexVPN and DMVPN?9 ?# ]( c2 G" f1 [+ f
A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
, F; q5 o+ D$ k! J. [B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2/ R/ S/ z) p3 {( x
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
+ U' S" Q8 z; E+ \D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2! ^; U* ~' ?9 W5 h7 j$ z
Correct Answer: C
0 K4 }8 q. [; L+ ~6 S3 X1 n
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29
6 g2 T6 z  i7 ^8 k9 c/ ]7 o2 j7 UWhich protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?/ A+ J8 y6 v6 A$ O
A. TLSv1.2
! ]1 Q8 o* |8 }& T8 j3 \8 c. ?' ^B. TLSv1.1
' f' j7 Q, R9 U1 f8 pC. BJTLSv1/ N" F; H4 c6 }8 h5 h3 L
D. DTLSv1
$ z& S7 J- G3 ZCorrect Answer:
1 X8 w) H! c* h7 W! ND
: e! V- A* R# Q7 G4 \QUESTION 30
5 K1 i: P+ B' _' |- J4 v) pWhat is a commonality between DMVPN and FlexVPN technologies?
7 }0 M( l& ?3 l0 X6 V( D1 R" K1 @9 dA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes4 p/ n3 B9 p$ B* ~0 C  K
B. FlexVPN and DMVPN use the new key management protocol
4 t( i4 _6 S9 @9 ~. dC. FlexVPN and DMVPN use the same hashing algorithms% b7 b. K; s+ b0 h
D. IOS routers run the same NHRP code for DMVPN and FlexVPN
0 G. l1 [# E2 u& E4 M% NCorrect Answer: D2 r. w( p% t4 }6 s0 ?; v& ]) Q
QUESTION 31
, U3 v! t) A; ?Which functions of an SDN architecture require southbound APIs to enable communication?
) t2 j: `; k, ?/ P# xA. management console and the cloud
, Y1 j* g2 i) EB. management console and the SDN controller
% ~1 ?- r: E/ ]3 s1 e' {C. SDN controller and the cloud, q- T$ F% E. _; M
D. SDN controller and the network elements1 V! Z4 g: h7 {5 Y8 E
Correct Answer: D6 k( Y! V8 u. d; x
QUESTION 32
# T& K+ L$ E9 j2 ?+ e, h8 |( YWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)# F9 M1 N0 _& ]. b! e
A. accounting
5 W( s* d. Z% q# [9 E% OB. encryption5 M; S4 o' g& v: y
C. assurance& q7 Z* `) n' [1 B& y  c
D. automation; @9 T' C( }1 R
E. authentication
6 U, X* H/ |$ OCorrect Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33  @8 h5 x& O/ O" ?9 |
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
  d/ W- \2 ^2 e, hA. SDN controller and the cloud' N9 K3 B% b/ V4 }% w$ X
B. management console and the cloud
, r9 d8 k. S. o0 {" ~C. management console and the SDN controller
6 }2 S; p- I8 J( E3 dD. SDN controller and the management solution) e: ~6 J/ S; R" M& l4 n! h
Correct Answer: D3 v0 g9 G! ~& W# X5 |7 y, H8 s3 k
QUESTION 34
: _8 s/ a6 f7 fWhich two request of REST API are valid on the Cisco ASA Platform? (Choose two)
' ^5 ]- [  V% B% e2 UA. push
5 q0 ^8 y; j$ K# Y4 C& }B. options
+ e) r! f( M* w$ sC. connect4 Y4 g6 C9 w8 _) W, K6 c
D. put
( k# i1 h" C* @8 fE. get6 h1 g& O) x: c, y
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.
& \; }( i) w' x% h7 K8 a! ?3 ]% j' N
7 o& J: U  l- \6 P6 N# GWhat does the API do when connected to a Cisco security appliance?
6 [: s, Y8 A' M! VA. create an SNMP pull mechanism for managing AMP
% `3 w' ?5 ]4 R( L- V! M  e! O' xB. gather network telemetry information from AMP for endpoints
1 H( [+ N- D' P( {, V2 CC. get the process and PID information from the computers in the network
' Z) s9 \' }  b' e  E0 U- G. dD. gather the network interface information about the computers AMP sees% @, @! c; ~, }& B! G* Q8 S; P
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 36
  N. m# D) T7 v, m. XRefer to the exhibit.+ ?7 [% E# e: m, Q/ R$ H
What is the result of this Python script of the Cisco DNA Center API?1 U" T( T- Z# `# {
A. adds a switch to Cisco DNA Center. k4 j0 a3 p. e3 _  j
B. adds authentication to a switch  K% Q5 O8 ^/ k0 A% X# m; |
C. receives information about a switch
) B* e! V  Z1 T$ |# Y6 k" D9 ICorrect Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37+ H* ^& S" ]% r7 E- d( A3 U; m' O
Which API is used for Content Security?
/ }8 m, f) m# E; [% OA. OpenVuln API
, C; t& e* {! j, b) I2 xB. IOS XR API
; h, |9 [  c* NC. NX-OS API/ x. _/ ]; e7 C4 J. l
D. AsyncOS API
4 z3 l3 i# C: j7 W8 [* tCorrect Answer: D  w$ k/ L8 E9 a# p- v
QUESTION 38
. P. t( C- G. P' A5 k4 u& e( VWhich option is the main function of Cisco Firepower impact flags?
' R' _! C; i$ u- z- xA. They alert administrators when critical events occur.
2 ~% E9 m' P, i" ~1 N( MB. They identify data that the ASA sends to the Firepower module.
3 Z8 G1 B% L2 s8 R' J' c9 NC. They correlate data about intrusions and vulnerability.
6 Z0 b6 m" k- j- a% ED. They highlight known and suspected malicious IP addresses in reports.
1 P1 V5 a! D( e" p6 F  _4 ZCorrect Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38
8 T% v( E4 @8 l3 |0 [) R0 NWhich option is the main function of Cisco Firepower impact flags?+ [/ x! o$ P: v! m: g8 }
A. They alert administrators when critical events occur.
# k. S9 G4 S, y  b. |9 RB. They identify data that the ASA sends to the Firepower module.. ^4 r* C- U: _; H- r; C
C. They correlate data about intrusions and vulnerability.
+ C& Q* A( @9 k% r2 Y; |D. They highlight known and suspected malicious IP addresses in reports.
* P- H% `4 n  r- eCorrect Answer:5 o2 Q0 _5 L  v1 ?# i1 E8 l3 u1 r2 D: m
C+ F# f4 z- h  X- Y$ i) e3 q9 ]
QUESTION 39
4 t) y" v- E- k: C% AWhich two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
& F5 F2 J, ^$ m7 a. @A. Cisco FTDv configured in routed mode and IPv6 configured
. |+ F% {- ]; J# HB. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises8 `* F. g' t, Z: A: x9 S, q
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
5 b* Q8 ^/ i/ K. B2 N' J: q. P! xD. Cisco FTDv with two management interfaces and one traffic interface configured
- K0 K6 N) _+ q! ]  z- ME. Cisco FTDv with one management interface and two traffic interfaces configured8 x$ c, [$ B) G( i& K. E( m. D
Correct Answer:6 C/ ?5 K) y; _
BC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41  j  R9 O1 i# S1 G9 s7 ]
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two). N/ Y- t5 z0 Q$ a
A. routed mode
( z8 y2 t! l) p+ SB. active mode  }3 `1 D! \/ J  T9 {2 y; V
C. transparent mode, d& o: A0 U4 F3 E! i
D. inline mode
/ k% W* p7 A" k( Y) fE. passive monitor-only mode
5 s" h: L3 R# M3 n3 A- Q$ L1 \Correct Answer:, W! R8 B: O: l  q1 R- C
DE
# [+ K8 [$ o* M" N' IQUESTION 42
9 h/ v! m+ J+ R" ?: t3 A$ }Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?9 C8 s  u  K$ B, Z. |  A9 e; j8 _
A. time synchronization
$ k( [* v: N" L( q5 \B. network address translations5 X6 y, X- d4 w; i+ a( B* Z9 b
C. quality of service
1 `; e, ?( s5 }0 j6 J6 U. t7 CD. intrusion policy
4 G' N! S  `0 b3 D7 k( BCorrect Answer:
  a9 a) n% ^! V) p/ O4 m1 C. YA
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-29 13:01 , Processed in 0.099804 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表