设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14
8 v2 {9 i1 y4 m1 PWhich PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP
/ K8 ?8 N8 @% e" v4 i4 zcommands to perform file retrieval from the server?
; }' a" Q& \. Y2 R9 JA. profile
3 R2 g$ ?3 I" |  L: V# v' BB. url
) P1 i- o/ O* \8 ~( a# U& \C. terminal3 M9 a+ y' W# H4 z) }' M
D. selfsigned
3 d& o/ i) a; E! _* o; V3 ?Correct Answer: A
; c4 U9 U* S) P4 i" z7 ?1 rQUESTION 15
9 I5 h. c2 \; u. rWhich two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)3 R, M* M" K% ?* i4 o- M8 c/ Z
A. ARP spoofing
, V4 b' h# _6 ~6 G/ eB. exploits8 v1 ]9 F6 M. f( `
C. malware4 f4 |* [+ @: q6 a" i+ B# n: B
D. eavesdropping* M! w, U- L& g* w) b2 z
E. denial-of-service attacks
7 q3 `- H) O$ ]2 ECorrect Answer: BC5 |  g9 V4 \4 |2 F9 z
QUESTION 16* n* F( q, w" b0 x5 y
What are two rootkit types? (Choose two)
+ E! c4 ~" J0 N3 N* K" oA. bootloader, x  k& n! J, s# M( v$ a
B. buffer mode/ }3 p) l4 ?! b7 a& u+ L& ]
C. registry/ N; X% n7 n% p" Z+ B2 a0 k+ F
D. virtual
/ }6 l8 q4 {" y% Q: uE. user mode
, X& X0 D7 B; \, _- ]5 lCorrect Answer: A. K0 [4 A7 O- o/ a2 }( ^5 o
QUESTION 17% w1 }% Y7 Q5 k7 B0 p0 V1 L" b
Which threat involves software being used to gain unauthorized access to a computer system?4 m5 ~- h2 ~3 _6 S8 B
A. ping of death
! F6 _% `& F/ f' ~7 P8 Z5 iB. HTTP flood
# N2 {' o  K* e/ _, ^) T7 `C. virus
$ C2 H5 r) Z1 R( TD. NTP amplification
1 A0 [4 F, p9 Z. w* p: Z- VCorrect Answer: C
1 y- T3 j; U& y; n4 W3 B4 ^QUESTION 186 m8 U3 e" M7 V. U, E3 q
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?* ?0 l, @# n. p: j1 U$ ^+ Y
A. 3DES
* X5 g+ g: R; y- G$ W# c$ U9 m  `0 aB. DES  s3 s6 j8 B9 U
C. RSA
* S. c- P, n$ ]& C7 [) b% oD. AES
3 s( B9 ]' H3 j/ D- ~Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19
( V0 G$ S7 V! a1 ]( wWhich two descriptions of AES encryption are true? (Choose two)* [+ o( M2 @9 I% i) ~( M8 p
A. AES is more secure than 3DES.  P5 k+ P8 @" c. p
B. AES can use a 168-bit key for encryption.; M9 I: u7 j  t  c
C. AES can use a 256-bit key for encryption.  g  E' o" Q% B3 c+ B7 F. q; y
D. AES encrypts and decrypts a key three times in sequence.1 H1 b  e% |  g, ]: O
E. AES is less secure than 3DES.
; R; ~% R3 @4 `9 ]* |4 ECorrect Answer: AC
1 d+ I$ m$ y' m( t, n+ G, }! z5 lQUESTION 20
- c  o5 \! G/ [$ G. a' cWhich algorithm provides encryption and authentication for data plane communication?6 P/ n/ B& f( P
A. SHA-96
) a0 J5 M8 B  V2 r* A0 u: ZB. SHA-3846 N  Y$ e6 W7 N' n! Y7 w$ [9 I
C. AES-GCM6 {" e$ Z! K! U% h3 V5 K
D. AES-256( o4 X9 ]+ h! j- a
Correct Answer: C5 E- B0 w- y4 A+ E6 y: q
QUESTION 21
# V! m* v' F7 W* zWhich two key and block sizes are valid for AES? (Choose two)+ }9 @7 l. U( `0 u$ @! R! }5 E- ~! m
A. 128-bit block size, 192-bit key length
+ F1 l& ~" z6 K. e8 vB. 128-bit block size, 256-bit key length
  }1 h& R% Q+ h6 nC. 64-bit block size, 168-bit key length+ I  X$ K. T+ H
D. 192-bit block size, 256-bit key length/ Y3 W4 ?6 S" A2 K6 ~4 j6 i7 Q8 @
E. 64-bit block size, 112-bit key length8 M% s% ~. I. V6 n' Y
Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
, S! n* o5 c$ U0 y3 }What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?5 N1 U: l+ u( J9 c1 Q3 E
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX. m7 o" E: D6 p2 t7 [6 J
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
2 R6 r: \  I) O( @% a3 OC. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX& m5 o0 l# y0 U
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
" Q! U; q  t: u; v# i( GCorrect Answer: B
6 e, P( X- O3 W. |QUESTION 23+ Q- |. _7 \5 ]
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable( u. T* V, c5 \$ K* j% u
connectivity?7 X2 U$ f6 B6 B& b5 y2 b" l' C) z
A. DMVPN+ u; B# ~, T* A' P( V( C1 P8 X
B. FlexVPN
6 \) D  w: X2 m! @1 g; M+ fC. IPsec DVTI# ^. v, l# O- O4 W8 f8 \3 k7 e
D. GET VPN
$ Z" O: [4 l" M( w& }8 U* S, ~, @Correct Answer: D3 O% P; j) Y* S* ^0 B
QUESTION 24
9 s: U2 m+ C$ \, L& I' v* Y* AWhich two conditions are prerequisites for stateful failover for IPsec? (Choose two); A6 `# f9 {# U7 d: d, M
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied" e- n* I! }, n: K8 }" H) B
automatically) a3 \5 y3 N4 D5 t+ {
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
, d& J) X! s2 q" JC. The IPsec configuration that is set up on the active device must be duplicated on the standby device7 N' ^5 Y9 a% t' J; j" k5 f
D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied7 P& Z& |. {! a6 M6 J" i
automatically.
  d4 Q3 @( ~! c' f" u+ n8 BE. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.6 `! u9 n/ Y2 R( m
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 25# j( I/ e, v0 q# s' d, [
Which VPN technology can support a multivendor environment and secure traffic between sites?
2 Q( C' ]2 Z; Q# D  XA. SSL VPN( U$ F0 T5 K' Q( }7 x
B. GET VPN) @6 e5 a; E; ]+ y  ~  k& X. y
C. FlexVPN
  M0 i; v; H8 [+ z$ |. zD. DMVPN
3 m" p4 J" J+ ?4 Y7 nCorrect Answer: B. b( X7 Z& M- P
QUESTION 26
4 W1 l( ^1 w0 J$ f$ bA network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not0 J2 X5 u/ t  F2 M' G
being established to hostB. What action is needed to authenticate the VPN?; Z5 p$ m% C/ T2 h, a
A. Change isakmp to ikev2 in the command on hostA.
* e5 S! i2 m( p8 m) `0 ?B. Enter the command with a different password on hostB.* c9 c/ D2 B/ j- Y% H/ s* `- }
C. Enter the same command on hostB.
1 ~7 ?: y2 {  Z; r6 q: ?$ @D. Change the password on hostA to the default password." _3 Z; m  M0 ?
Correct Answer: C0 q3 Y# @6 d. i2 t' [- E
QUESTION 27, z! P- A' X, O# J$ g! s
Refer to the exhibit." T7 g; P! x$ `6 t$ K& V. n
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of/ ]1 K$ R/ @) i! p9 e
VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command* r% \: A$ D2 [3 W: k3 S) ~
output?
, K0 T3 H$ c7 a% h: AA. hashing algorithm mismatch# ~( U4 Q7 x0 |
B. encryption algorithm mismatch
. \  c2 m1 U) H: c  ^$ n0 \C. authentication key mismatch
' e, w% p  V! E- y: ZD. interesting traffic was not applied# m( E9 [2 I- J. U5 H
Correct Answer: C
: i" H9 i- b5 ]. m/ eQUESTION 28
* {* Q. ?7 C" c0 I8 T4 H2 D% S8 Q% GWhat is a difference between FlexVPN and DMVPN?
! a2 H& N$ g$ O# x& r, u9 TA. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
' w9 e) N: S3 W2 |% eB. DMVPN uses only IKEv1 FlexVPN uses only IKEv2" i: M3 r# t; n3 M; S2 t
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2' Q2 g9 u1 S8 \7 N9 a; a
D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv26 r) u. S/ |8 U  @+ [: A
Correct Answer: C. G, J$ I6 i* W% _
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29
) X0 f4 {3 P1 b- H+ D* P" c; @6 WWhich protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?: n- `$ B$ D5 ~, \9 L# ^" o9 A9 U
A. TLSv1.2
9 P, G+ z% |9 X( Y3 u. O% {* i9 ?: \B. TLSv1.1; P: M6 m7 F& b" a5 q
C. BJTLSv1
% n1 i* f! X* b# m, E4 {! k* CD. DTLSv1
4 u+ x! }) E- ?  ?Correct Answer:
/ e, E5 X% ?8 i% P: eD
% W* T; E: M9 i0 h; [QUESTION 30# f( W5 d" O4 S
What is a commonality between DMVPN and FlexVPN technologies?
/ p/ |5 C* l0 l: a1 _! XA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes. v7 H  o) V' E6 b2 k4 G
B. FlexVPN and DMVPN use the new key management protocol0 y, k1 z, a  }: J/ I
C. FlexVPN and DMVPN use the same hashing algorithms
: M& u- K. @$ _% K* h8 G9 HD. IOS routers run the same NHRP code for DMVPN and FlexVPN( \1 N" I& u7 {& [& L- \) e
Correct Answer: D
! Y0 z, D" Q7 b: S3 }" B  o5 xQUESTION 31
1 c6 B" Z2 v. T2 N- G* nWhich functions of an SDN architecture require southbound APIs to enable communication?6 `2 B' t4 E# y5 ~/ k
A. management console and the cloud
& U0 e- Z8 _, W7 b5 S& p3 TB. management console and the SDN controller5 U0 a. I. o# n5 W  F: b8 x- P
C. SDN controller and the cloud( u8 F, j  R! h5 Y3 R  b( m
D. SDN controller and the network elements/ [% F+ V7 H7 b) o7 m
Correct Answer: D' O# l& G7 t; Y) ^/ Y# c
QUESTION 32
3 j( Z0 z, O' U( PWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
3 v1 S; f6 o* y- }A. accounting7 f6 L0 G" g. R# `8 d
B. encryption& `' p( i! F3 M- ?% P" J- F7 y
C. assurance9 u  G, X( H6 x8 B1 R
D. automation* ~0 [/ L+ K' ?) d3 n+ S' g
E. authentication9 F. [1 E% M2 d/ B1 R4 A1 D4 Q
Correct Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33
0 n. i5 ^6 v  C# u, D1 WThe main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?6 i8 S/ L' b) ]8 A0 E& u* W
A. SDN controller and the cloud; O4 c/ w' k- I% M  x
B. management console and the cloud
& R- K$ o, X/ w' fC. management console and the SDN controller
+ a/ L0 l& n0 GD. SDN controller and the management solution
" B. b; P0 n8 {1 BCorrect Answer: D
: i& D* ~. a" S! j+ v0 ]5 JQUESTION 34) G* u& v% l% C1 G* P
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
: f% G8 J  Q9 `% W. w. vA. push
1 V) y2 b* b" `! X! U/ [* cB. options1 B' r  v' Z. n, s' j
C. connect
! }& h# Z; }. h# zD. put
1 v7 ]4 u# ]# u4 F! WE. get& n, `+ a; [! L  {" y8 M0 j9 k
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.+ W3 U- e' s1 U* A5 y
3 e1 H$ e( B  [
What does the API do when connected to a Cisco security appliance?
' J$ ^3 K! R* M2 ]A. create an SNMP pull mechanism for managing AMP
) t% Q" p& f) K6 [0 G2 C4 Q' p1 GB. gather network telemetry information from AMP for endpoints
' V7 A. A: z! C( QC. get the process and PID information from the computers in the network
1 p- `1 }$ v" @3 K+ M  |8 sD. gather the network interface information about the computers AMP sees
4 L4 R1 F1 N8 @# q" f9 V" NCorrect Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 36
+ e! _% l5 p  D) ]; @" y9 BRefer to the exhibit.1 d" U! C: H3 `
What is the result of this Python script of the Cisco DNA Center API?9 ^4 G- T# d% p9 Y  z( i4 n! [
A. adds a switch to Cisco DNA Center
6 r6 R$ h4 ]# H; w9 H% p' V' PB. adds authentication to a switch
) X# _( H2 w8 t0 PC. receives information about a switch
, \4 J* J( E/ u( Z! j2 UCorrect Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37
7 Z, t3 o. }+ U3 Z5 b: G1 {Which API is used for Content Security?7 d- R. ^3 c3 A
A. OpenVuln API
5 g! ~! t9 a' L7 r% H" }( A* d6 M( jB. IOS XR API  B5 z2 \" E! r' I) ~6 O3 K
C. NX-OS API
  `( H) b4 e% {- r# q0 h: H* @D. AsyncOS API( w  _1 o& H' a; A, q
Correct Answer: D- ^+ H5 w. f# ]4 b5 L6 a
QUESTION 38) g( Q% T0 y" L3 O% O' o$ E) ]
Which option is the main function of Cisco Firepower impact flags?( j6 d0 \0 Q& B( @) s
A. They alert administrators when critical events occur.8 Z4 U, q! R6 l$ Y( G4 c- f; [
B. They identify data that the ASA sends to the Firepower module.
$ ]9 n/ u, n1 E& f7 @& {: Q; kC. They correlate data about intrusions and vulnerability.
" C9 N) Z# z  B5 \D. They highlight known and suspected malicious IP addresses in reports.
& s+ l8 R: X  {& g$ ?1 u* ]Correct Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38, V8 a8 C( R3 e; N- x- m
Which option is the main function of Cisco Firepower impact flags?, [! g- w0 p! Q3 `( C; ^; V
A. They alert administrators when critical events occur.
) m9 [1 q# x4 W( x  I- p+ x* r  wB. They identify data that the ASA sends to the Firepower module.: h& u3 K: o. N
C. They correlate data about intrusions and vulnerability.+ P1 f# J' F) d) f$ M. F
D. They highlight known and suspected malicious IP addresses in reports.
' ^! n2 f  a6 n7 J9 |Correct Answer:
1 O- Q7 g( O% NC
) c! c  J0 @# {QUESTION 39
7 C. P! z" s% w3 @0 f3 H: a  lWhich two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)) x4 h2 D: z% C/ g! K, T$ Z
A. Cisco FTDv configured in routed mode and IPv6 configured, O6 D5 l, Z8 [) _9 F8 ~" B
B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises' `4 T+ Q5 T: A. m
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
. P3 Y5 F/ |, t( T- \D. Cisco FTDv with two management interfaces and one traffic interface configured- X+ x* l1 k; A- |
E. Cisco FTDv with one management interface and two traffic interfaces configured1 `' F# C$ M- _9 J
Correct Answer:8 C1 q+ f( X1 ^1 \' k) ]+ T
BC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41) I7 v; T" h, y: h% t" c
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
; M8 V& a: K* L% e. BA. routed mode
& ]1 B( m1 g) C1 c# w$ X+ DB. active mode
2 O# ]+ s9 ]" E: |! {C. transparent mode
6 P* ^; U; Q* dD. inline mode
. X2 _! Z8 ], v9 }, eE. passive monitor-only mode8 x8 }0 F+ z! k0 e% z
Correct Answer:% F4 Z) C' M; F% g9 ]# r* U" M
DE0 f* k% E  p. s& Z5 w
QUESTION 42
! S% y5 C' Q- ]* h+ T0 A1 MWhich feature is configured for managed devices in the device platform settings of the Firepower Management Center?( v1 p/ V( q, m1 D9 @0 c7 Q; m
A. time synchronization1 R! k8 W+ ]  y; q
B. network address translations
0 p! O- h) b% _' N) k) qC. quality of service) N1 I' N' o( {4 ^9 [" R
D. intrusion policy
$ W- X6 X1 ^6 vCorrect Answer:  i. j/ e5 t! w
A
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-2-24 06:47 , Processed in 0.083684 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表