设为首页收藏本站language→→ 语言切换

鸿鹄论坛

 找回密码
 论坛注册

QQ登录

先注册再绑定QQ

12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14
/ C9 Z5 U/ c  c6 w# ?Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP
/ F, W% j- Q" B( `/ {9 Z" m6 y- scommands to perform file retrieval from the server?# D5 K* y& L' f) `: b; ^
A. profile8 H% ^/ d( ?0 g# W3 }* B1 l7 I& |* n
B. url3 z1 v  e) w+ f3 T- i" Y4 ~& f+ D2 ~
C. terminal0 l, P& l& b7 x$ O) U1 }
D. selfsigned3 ~1 P3 I) t& p9 e$ d. ~, j
Correct Answer: A/ y+ ]. \/ R5 \3 u# D
QUESTION 15
& V8 U% H, }3 ?% cWhich two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)7 B, l# T6 H$ b
A. ARP spoofing- U7 S! G( b5 m6 i3 u
B. exploits
0 t4 ~4 g/ X5 @2 [) P) d! W  [C. malware; O' }% Q# W% L! U" e$ s; Q$ |
D. eavesdropping
0 S) ]6 |" O" S, M# C; ^E. denial-of-service attacks
* N" g7 m2 c3 \; y# ]6 ?Correct Answer: BC
& W# c1 W! P, _/ Q7 iQUESTION 16
$ N6 T6 m& E6 _- k3 R# KWhat are two rootkit types? (Choose two)
& u! L2 i, K1 G: w: TA. bootloader
# x& q/ r7 u* }  ~) V' dB. buffer mode
0 D' A' h# G1 p; ?. J+ qC. registry, J2 C! h' L9 q& Q
D. virtual
9 B7 }* W$ g! v: eE. user mode
2 S$ l0 L# r0 S& H  Y. JCorrect Answer: A0 H! |) N3 U) `2 x
QUESTION 17+ \! `6 f# k. |+ r2 e
Which threat involves software being used to gain unauthorized access to a computer system?- V' ~" x4 W! |7 {6 u8 O! H7 Y
A. ping of death1 `! H7 I+ Q) I8 L" w
B. HTTP flood
. H( v4 j# z$ c; vC. virus6 {- c+ h5 Y1 g3 ~( [- I$ g
D. NTP amplification# q% g4 S' w3 {
Correct Answer: C4 A: {$ Y! u% F8 }8 |4 }1 ?
QUESTION 18
4 N- i# Y4 M- pElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?3 t, f6 P( R, z
A. 3DES" q, e8 n8 q  |( k8 P& }
B. DES; j0 d( }; Y6 t9 s7 L
C. RSA
# X5 }; x' S4 D/ yD. AES  P$ I6 _, r( z. b
Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19* s& Y/ r/ x8 }
Which two descriptions of AES encryption are true? (Choose two)
" R  U" u( F' ]' B+ |- \  zA. AES is more secure than 3DES.
* `% o( c, M+ W" d" xB. AES can use a 168-bit key for encryption.  N4 l  k; V8 W
C. AES can use a 256-bit key for encryption.% ^6 c, {: f% A+ _3 s
D. AES encrypts and decrypts a key three times in sequence.
) i( G  |/ x5 @) IE. AES is less secure than 3DES.
2 C7 W2 L: N! F% w/ }9 b4 U) YCorrect Answer: AC5 L/ l9 r6 o5 w8 J" v5 i# c& C
QUESTION 205 C9 C% r: o; Y( D! G8 I
Which algorithm provides encryption and authentication for data plane communication?4 y* q7 Y" N0 t& q. v: A
A. SHA-96% ~0 D, D# P& d
B. SHA-384: \* k* N" b$ c+ y1 e! b
C. AES-GCM
2 F" E" ~6 I2 R' @D. AES-256% G8 _2 f: q  W9 G
Correct Answer: C
0 [; d. t/ K2 U4 S$ E5 PQUESTION 21
$ t; o- B4 Q8 ~5 t/ b! uWhich two key and block sizes are valid for AES? (Choose two)& {  ~6 }$ k0 q' V
A. 128-bit block size, 192-bit key length
7 i% X% D" o$ O8 b' vB. 128-bit block size, 256-bit key length
( b* r# Z1 {1 e3 j' kC. 64-bit block size, 168-bit key length
1 J( V5 Y& r$ _9 z1 d9 B8 I+ D& _D. 192-bit block size, 256-bit key length. l. C/ M' C( Y. e' Q" I- f
E. 64-bit block size, 112-bit key length
" B( p5 Y6 k+ p1 JCorrect Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
# C" X  h8 E% E; q" A4 QWhat is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
! v* _- @) d! t, D3 D' r! jA. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX& U# M; j2 [9 N5 m+ o
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
4 _- h$ g) e0 \' i& V: u( AC. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
: ^& L: ~; u5 R0 B" nD. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
9 q4 L5 O4 T8 O, T0 \Correct Answer: B+ `- C  g) |2 v: i' H+ k' d3 g
QUESTION 23
1 Y( x# @$ f+ o+ k& hWhich technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable5 X" U2 H" I3 E) o
connectivity?9 w/ J4 l/ P* R# O8 Q
A. DMVPN$ _9 j7 |' j, K% B
B. FlexVPN
% x( u' V/ v6 B/ w6 ]8 C1 gC. IPsec DVTI% R/ G6 c6 U! F' t/ W0 @
D. GET VPN
( E, M' ]6 {' o( O: {" rCorrect Answer: D0 }2 X/ @2 m( T. j
QUESTION 24+ q4 `* N+ o5 \
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two): O( Z: `, M, e# B) b0 |0 \
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied! {6 D; N3 h6 U4 k3 V
automatically' M3 h' j* p9 d$ u1 }6 U
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.- J( j: o/ Q$ ^; F& |. J9 e
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
# o: |+ X' y* G1 KD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied% b! ?/ Y1 n1 `
automatically.+ y, h9 G. `/ }. |( q$ u
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.! p: H6 B: w  z/ c
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 25
9 s% ?) {( Y  v+ q" o# k) e! R9 MWhich VPN technology can support a multivendor environment and secure traffic between sites?
) E! I1 Z* l: L& p7 G' QA. SSL VPN
) D* M2 j1 l, T4 d! P! d1 WB. GET VPN8 E$ o$ d1 S( F6 S! z
C. FlexVPN
; d/ R/ d6 K& }2 Q$ A' Q. OD. DMVPN
0 A, j  `, q1 K. U1 cCorrect Answer: B  T8 ~3 `# ~3 v
QUESTION 26  y0 p  c' D1 Z" ~, ?& {
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not
) W) R* O# O" j, y( H( Y& Hbeing established to hostB. What action is needed to authenticate the VPN?$ _/ f6 ]) P+ V1 g8 ~% \
A. Change isakmp to ikev2 in the command on hostA.
6 e, y4 B$ c. c) }3 a. A( p8 A- jB. Enter the command with a different password on hostB.
' X' C8 m! |; N+ @" R! f, w, q5 Z6 JC. Enter the same command on hostB., G. ^' r( W; u' N1 E2 W
D. Change the password on hostA to the default password., Y2 E( Q2 X# K& C4 F; |( M# B
Correct Answer: C
* Q. e2 w0 e# c$ ~' @2 p8 K+ ~3 f/ pQUESTION 276 G$ l1 W9 `% P! l4 D5 H0 Y7 m9 y5 d
Refer to the exhibit.
1 P# j3 l# q  Q, T3 n* OA network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of
; w, c* R7 L0 R# n2 y, U6 S9 @2 CVPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command
$ R( t9 y4 f# @) B$ c( s9 Q7 Eoutput?0 G) E8 p9 r7 O
A. hashing algorithm mismatch" ^: E, M" l. t* b) Q7 j* W
B. encryption algorithm mismatch1 n; G' Y' h% _9 R! w4 O
C. authentication key mismatch
# r7 O/ |, h$ }$ ZD. interesting traffic was not applied/ a" K+ K) e5 L2 `3 z. O/ x
Correct Answer: C
; N& Z5 Y+ m1 A' k5 pQUESTION 289 n2 m" D/ j7 O/ D0 U
What is a difference between FlexVPN and DMVPN?# i: ]+ F6 t. }+ k# d. I8 g9 t
A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv13 _4 C9 i* b2 _) z
B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2
; c9 E2 J+ e- \$ ?0 sC. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
  \4 \* `: s9 ?" w8 O% SD. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
5 p% m5 s* ]0 O# `6 Q7 dCorrect Answer: C' o* r4 \7 `0 b
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29) T% V* o6 X; ~
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?+ l. m' C* _) O
A. TLSv1.2
  t" q  `$ a& ~* j2 T8 P/ |( tB. TLSv1.1
8 ]1 I) h" |# w  Z/ c( E4 a3 j$ rC. BJTLSv1
3 p+ J" k' Z2 K: o+ tD. DTLSv1
1 T* R6 U' m4 f# L- {2 l- x7 TCorrect Answer:# D2 j0 k& m; Q3 b8 y( W8 Q
D
5 l# A1 i, C( {1 h6 ?0 i6 m3 zQUESTION 30& U* j4 Q5 C4 I( X3 J7 h- a
What is a commonality between DMVPN and FlexVPN technologies?
2 ^! y) [  M7 r% KA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes3 x1 l( F7 W/ R9 j# l
B. FlexVPN and DMVPN use the new key management protocol
9 x/ l, \# ~) e( mC. FlexVPN and DMVPN use the same hashing algorithms. E. f1 x3 K0 J% l$ E
D. IOS routers run the same NHRP code for DMVPN and FlexVPN. s% L9 U) v1 v9 M  E
Correct Answer: D
  r4 Z* M" k/ h& H4 r+ ~- a& HQUESTION 31
$ o8 X. {5 u1 VWhich functions of an SDN architecture require southbound APIs to enable communication?
5 o4 |1 E# T$ c' l) e+ kA. management console and the cloud/ D: X0 j; |% \0 I
B. management console and the SDN controller
; \1 ]3 L0 t- H4 I/ ^4 D! wC. SDN controller and the cloud# t4 I& Q( W8 P9 Q2 ~7 M& B$ b
D. SDN controller and the network elements7 @# K7 f) Z. P
Correct Answer: D
% R9 T. W9 f0 A3 E( x, F, ^% [% WQUESTION 32
* I, P1 g6 J: G/ \) mWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
/ w" {. X8 F1 r& }, IA. accounting
% K$ m8 d" g' p# V( X' n% HB. encryption+ z9 O2 L) ^$ A/ d4 h: Z3 {
C. assurance
: Z$ I6 X  ]8 n; xD. automation2 n4 K" k: |* f- y$ y4 A5 T
E. authentication
' w7 C0 m: z4 D) H+ y1 ACorrect Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33
  E- V* ^* J, kThe main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?- B, y! ]7 }( B* |
A. SDN controller and the cloud/ u8 _* Y8 r- s5 V
B. management console and the cloud& d* A+ a6 {. h) L& x
C. management console and the SDN controller  j" A0 ]- ~- S5 m
D. SDN controller and the management solution% f$ o0 a* g( x2 a& M
Correct Answer: D/ ~" w0 Y- M- l9 x
QUESTION 34
* B0 F3 {( i9 ]: P6 d- {5 l1 lWhich two request of REST API are valid on the Cisco ASA Platform? (Choose two)
' z4 m- M: G3 B% N( z* `5 ~% lA. push
5 W- M2 V0 s% ~B. options
( [' C1 {$ V# H$ XC. connect
/ v. M7 L7 P$ Y) o& CD. put
) o0 U3 z0 h. @5 iE. get
  V# A0 O, E$ r% }0 }3 oCorrect Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.
* b+ j2 W& B# W
# y: ^% k! {4 F2 `( A, K+ PWhat does the API do when connected to a Cisco security appliance?2 x, E3 W2 B' _* i  A2 f* @2 r6 P* |9 m
A. create an SNMP pull mechanism for managing AMP6 K! n0 m  S9 S) U7 M: d8 y, q6 f
B. gather network telemetry information from AMP for endpoints* X! S" U% E9 }
C. get the process and PID information from the computers in the network
; \7 p/ F. t6 n7 _% U* ~5 wD. gather the network interface information about the computers AMP sees2 r6 t4 q: Z. P- x4 Z, Y* K' k+ @
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 36
. z9 a/ |/ H2 vRefer to the exhibit., w9 N7 }4 O: ~+ ~7 w
What is the result of this Python script of the Cisco DNA Center API?5 t7 }4 _' x: T# Q& L8 y4 ?
A. adds a switch to Cisco DNA Center
3 \7 l& c/ _2 m+ RB. adds authentication to a switch
  ^0 {* w% m0 \0 V( K4 HC. receives information about a switch
+ v% j, W, Z  W0 oCorrect Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37+ M/ F. I: A, G
Which API is used for Content Security?8 U+ I- t' k0 @) m4 Y
A. OpenVuln API' k" q) B* ]- c, V
B. IOS XR API
( q' h" ]' x) P& L% X. }, QC. NX-OS API
6 |4 l# y8 n+ O/ O2 L  AD. AsyncOS API8 x' S  _- ~2 V" U/ }# X: `
Correct Answer: D
' U& A/ Y! q! \! kQUESTION 38- P! d) O0 c  y! ]% }% n
Which option is the main function of Cisco Firepower impact flags?
4 q& }4 b8 z+ @/ Q4 ]A. They alert administrators when critical events occur.# b+ U5 D+ J1 u; Q- d
B. They identify data that the ASA sends to the Firepower module.% U; }8 [' U8 d% ~9 B
C. They correlate data about intrusions and vulnerability.) |" S" ^9 _2 y( W
D. They highlight known and suspected malicious IP addresses in reports.
. v1 [! \& x  h! [2 ~5 d6 `6 JCorrect Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38/ w( D2 e3 a& ?8 \
Which option is the main function of Cisco Firepower impact flags?
1 T- ]4 Y7 m6 m* ]* P# dA. They alert administrators when critical events occur.
6 Y0 P" K- @9 MB. They identify data that the ASA sends to the Firepower module.
+ N& I% W( p; ^4 b3 e1 d# |3 uC. They correlate data about intrusions and vulnerability.+ s. v  E, o6 [, h
D. They highlight known and suspected malicious IP addresses in reports.
. l2 {; }5 ~; [$ `7 X  nCorrect Answer:( H( Y4 Z5 Q3 v1 e* Y$ [1 Y1 a
C
  t# L/ ^* l! K$ ?/ T. [- s" cQUESTION 39
$ J8 R* E+ [+ b# ]$ ~' |Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
$ }7 g2 {: E: l  m4 hA. Cisco FTDv configured in routed mode and IPv6 configured
  |4 S1 I2 V) Q* YB. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises* Z) Y0 ^. x' q  y
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS: q" d4 E2 I( ^2 J% ?
D. Cisco FTDv with two management interfaces and one traffic interface configured
: v! @5 p  a/ K2 U" _E. Cisco FTDv with one management interface and two traffic interfaces configured
- F, F/ D+ H$ B. _! ?4 fCorrect Answer:
' C. _" y9 @3 N% o8 FBC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41/ O" _4 P; B- e6 s8 ~9 Y
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
  H2 a# b5 @) Y! z; ^" ?A. routed mode
4 u$ V$ N6 m5 `7 o" sB. active mode
  T& ?3 ?1 @" p- R) n. O! T8 m5 FC. transparent mode& r: e) B) a' @& V" q) Y4 f
D. inline mode& U; u6 m8 ?& A+ y  C& y( T
E. passive monitor-only mode% d6 a  Q! C( G0 ]! l! w$ q) p
Correct Answer:: a, N' F6 K3 F/ z& B
DE- j4 M5 ^" Z* d7 w& B- s+ E7 |
QUESTION 42
$ y' k3 _% u; B8 |+ A, _Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?1 Z! n  O2 x8 U  S' Q4 o2 ]' \* k
A. time synchronization% Z7 V( S) z8 D
B. network address translations  U9 j* d1 ~1 a
C. quality of service- x2 J$ B9 r# u5 ?
D. intrusion policy! z# Z8 F! [; ^! F2 F
Correct Answer:
2 o) s6 L& Q1 ^4 OA
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-1-23 03:52 , Processed in 0.062082 second(s), 11 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表