设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14: q& o2 j4 P5 r* O% H
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP
1 ^4 D" e$ k7 ?" W' f* Vcommands to perform file retrieval from the server?+ ^8 U" m+ [! i- G" V
A. profile7 l/ y. i+ c% n# j6 y  b
B. url, M8 t5 J: S  t; G' e
C. terminal
. y! l6 G2 j% @1 T) s5 hD. selfsigned* D; C1 F1 y( O" {+ n  P
Correct Answer: A% x6 Y9 r0 @+ E' Z0 V
QUESTION 15
1 E/ _% ~- @1 I3 y! u8 C9 AWhich two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
7 _5 ~# Z2 P& h. W3 M  t, rA. ARP spoofing
) c3 F7 I/ w9 XB. exploits# Z& h* W! l  \9 D
C. malware
& D0 s8 o' j- AD. eavesdropping" d& e  X) G2 B( `! ~9 R7 D. x
E. denial-of-service attacks
7 p8 W. q- p' f) n2 K. VCorrect Answer: BC
$ z& v, E) Z0 I; RQUESTION 16: I# `$ m# f" h; z1 G
What are two rootkit types? (Choose two)
9 M& m% z4 s) M& E. i' {; L8 M; }A. bootloader- a+ b3 i2 F. F( R% r- v
B. buffer mode
( X% @4 }" P- L2 ~. g& s: GC. registry
9 j1 d5 r! i5 KD. virtual
4 H* _5 J% y" `6 R+ f" H, m, oE. user mode
6 y5 D1 ^* A( M- ECorrect Answer: A
1 ~2 ^' e4 R/ KQUESTION 172 l1 \7 Z, l7 H; h* S
Which threat involves software being used to gain unauthorized access to a computer system?; h3 V0 B- a4 p2 ]& n
A. ping of death
+ I0 R9 x2 `/ i+ c: C. J/ x+ cB. HTTP flood% [9 F" S; B! z
C. virus
4 a2 U. w0 W8 A3 lD. NTP amplification
) {' _9 b7 Y) T3 n1 m' ACorrect Answer: C
: U: i8 P; ?" e! H) Y  [$ SQUESTION 18( R1 w. y1 P, {6 B' o9 \
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
% Y+ y" i2 u& i+ ?3 L2 pA. 3DES
3 w8 |; X! {6 Y  CB. DES, Q8 k3 t: f5 P  X
C. RSA. k. I# Q6 |2 O9 @
D. AES1 f$ L" i( _; n
Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19
: d/ l1 A! L, X7 T$ \- m8 ^7 f% e+ S; eWhich two descriptions of AES encryption are true? (Choose two)
; l& `. {/ L  H/ P( C. [A. AES is more secure than 3DES.# J& |5 |1 E1 a0 V
B. AES can use a 168-bit key for encryption.
& B2 G9 b$ J1 w7 y/ t4 fC. AES can use a 256-bit key for encryption.7 R4 Z7 P" m" p
D. AES encrypts and decrypts a key three times in sequence.0 V7 o5 [4 l- w" b: r1 s
E. AES is less secure than 3DES./ a3 p4 P# f; C7 |
Correct Answer: AC
9 E+ z* J5 `& E- D% s6 P: KQUESTION 20: l; y" O, D3 y
Which algorithm provides encryption and authentication for data plane communication?  t* X; r9 z; \  w
A. SHA-960 ]6 Y' z4 p7 P9 E2 t
B. SHA-384
* D. z* q* X5 V. N! _C. AES-GCM
  E' y8 S9 w& e* PD. AES-2560 A; N& p. U5 h# {5 w% e
Correct Answer: C
, p+ W: X" N# B8 t. @. m  aQUESTION 21
# ~& G# x0 F9 m3 {! V/ k. fWhich two key and block sizes are valid for AES? (Choose two)
% q! c4 D- o$ ]9 y! S2 eA. 128-bit block size, 192-bit key length  U3 A0 O  a6 c
B. 128-bit block size, 256-bit key length
4 L& L8 y% r. @6 V$ W' h9 q. ?2 E1 ]9 VC. 64-bit block size, 168-bit key length# t+ ^* L% d& q. {- z
D. 192-bit block size, 256-bit key length
8 d  {: I7 n* ZE. 64-bit block size, 112-bit key length
# _  J, w! T6 `Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
1 g) ~: c& C0 d2 A9 A  S2 `What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
: I; n* x) a( y3 m: r9 z: ]! kA. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX+ `3 i& T6 V1 r* }. U) v1 c: D" v' [
B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX7 Z. _) k& M+ x0 g9 _0 c
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
& [7 o. O( e( LD. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
1 p. R9 y+ c7 e6 R- }Correct Answer: B& H7 A' e0 R$ V" ^5 B
QUESTION 23
3 q$ X% h; Q5 M5 T9 QWhich technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable9 W9 v- ?. F, K5 e8 ^
connectivity?
/ t; g, q1 @" P( \8 k) K, ~+ kA. DMVPN
( C9 U7 {+ v1 d/ ?/ b6 l5 J0 m0 JB. FlexVPN
% {# M$ V; b+ n4 }' F( XC. IPsec DVTI
" E$ r% b8 D# q, x$ {% hD. GET VPN4 g+ Q4 j6 v; c* Z
Correct Answer: D9 ?! F; G* o1 O0 }. K7 e
QUESTION 24. X# Z0 O2 v5 n, I6 z' C2 m9 t
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
3 O- h/ M* w7 E, I6 MA. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied& p( B! \* {: f- v9 W5 f/ V
automatically# X, C  [7 r# y/ j. C% T' R
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
5 l6 z$ h6 Y( RC. The IPsec configuration that is set up on the active device must be duplicated on the standby device
$ S; `5 k: w! J+ @  p3 kD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied
$ r( W- k1 C2 G5 T1 e0 a/ Tautomatically.- A  i, `, L: a  v
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.6 _% T; x3 M, c, f) m
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 256 X9 ], g/ ~3 C# ?
Which VPN technology can support a multivendor environment and secure traffic between sites?
* S+ _' m6 N- X, |2 D: _A. SSL VPN
, x- p0 `4 E5 |- e0 Q3 \( L: gB. GET VPN
0 L+ [: ?/ U4 E5 K1 }C. FlexVPN3 o" B8 |; L% s
D. DMVPN. K- F/ }1 k  R3 c3 R
Correct Answer: B
1 g4 f+ C- g) N  U! j: }QUESTION 26
9 q0 f+ S4 j2 lA network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not
* z8 D& b; [$ I7 B0 E* c! Hbeing established to hostB. What action is needed to authenticate the VPN?
$ y$ f1 W3 B2 e& KA. Change isakmp to ikev2 in the command on hostA.; ~( h$ i3 w2 {
B. Enter the command with a different password on hostB." |/ C4 ^9 E4 l. ~; }
C. Enter the same command on hostB.
1 u; j' H& ?8 L  L! VD. Change the password on hostA to the default password.
% z8 r: W# y4 Q2 _$ x9 ^2 GCorrect Answer: C
5 P9 {6 ?: b, ]9 D" R' M- DQUESTION 27
& ~8 b% g6 R3 [Refer to the exhibit.5 I8 c8 y7 d/ ?
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of' ?# |) G% R2 F. _; g$ C" R
VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command- C  `, b) |! C) {1 c; I- y% C6 D0 x
output?8 Y5 a2 N) \9 Z
A. hashing algorithm mismatch
2 ^; e! }! V# M2 W2 L4 oB. encryption algorithm mismatch; L" w  n0 a- |; K0 F6 t- S1 J6 a
C. authentication key mismatch
6 P% u) |0 X, t% e; TD. interesting traffic was not applied
, E! [4 j- `5 T* ^7 sCorrect Answer: C
" l% I' f9 V* T, q  U+ L' m& aQUESTION 28
; R- U: G/ Q$ m3 v" I+ wWhat is a difference between FlexVPN and DMVPN?1 @2 c0 N& {. Y1 V; b! v- u; H
A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
. F6 D% E& s, V# Q3 BB. DMVPN uses only IKEv1 FlexVPN uses only IKEv2- h! j, r  @' p" p1 t
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2& G! P5 z1 M7 j4 W9 ~
D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
% X0 K, ~) ?$ x0 J# s) d* |7 u6 P; l2 hCorrect Answer: C1 B1 p- s, T0 ]- y! h5 Q! z7 }7 s2 L
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29
, s" u9 A; V0 n  [7 ?6 gWhich protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?, Y( {' R: |4 O: E8 r
A. TLSv1.2, G) v, Q/ q: W* v+ U- ^7 V: c
B. TLSv1.1
: j5 n, z% b8 E" u1 s2 ~  \4 tC. BJTLSv15 G7 n- V! X0 _  Q
D. DTLSv10 s$ p9 Q* O5 \, T
Correct Answer:
1 z) {$ o  f% a, D$ cD! |/ Z- o! C/ M) j: z
QUESTION 30% U' a& \) a& p
What is a commonality between DMVPN and FlexVPN technologies?
5 [9 D5 L; W( a# i0 K9 [$ {A. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
! \+ V3 ]' O! ]- d* q: TB. FlexVPN and DMVPN use the new key management protocol
9 |, k5 N+ \, s* e# |C. FlexVPN and DMVPN use the same hashing algorithms
$ [' D% _: k2 e. a- g) ED. IOS routers run the same NHRP code for DMVPN and FlexVPN
$ n: t3 O3 l) a' [1 K5 CCorrect Answer: D
& }+ n3 h4 V& C; w1 c+ a0 }QUESTION 318 |; D5 [- {. h$ Q! P1 F% t! ~
Which functions of an SDN architecture require southbound APIs to enable communication?& i% E) K  F1 X) h1 H2 j& L, b
A. management console and the cloud) z* T! I: r% B( ^. y' m2 s7 [
B. management console and the SDN controller2 y' I4 x; R2 Y$ G4 \  y+ P2 X
C. SDN controller and the cloud
* B) N7 U& H* ]( ]8 S" e3 ?D. SDN controller and the network elements
: L. d& d. q7 H) T/ {Correct Answer: D
; z! U0 d# ~" e8 B! c: `QUESTION 321 P- Z  ^" Y" o" g
Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)2 ~1 `( [4 i* b# f* M2 A. k  B
A. accounting" Z+ W' U3 ?/ l
B. encryption
* X) V. F6 O$ IC. assurance; {( d5 M8 P2 R3 R% V2 g; O* G4 }! e! B
D. automation7 I# m/ S+ d2 m# J& U* e5 a
E. authentication4 J7 z6 J) @% O( p, D5 }5 f  T
Correct Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33
  H- G$ i; h& F9 EThe main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
( |: E4 T) t& BA. SDN controller and the cloud
# C4 S# ?4 u3 S& K4 yB. management console and the cloud: t% Q/ p+ F+ {- G  q" N+ B
C. management console and the SDN controller
& O1 P6 c; b. a3 `  D: @* @5 M% G$ _D. SDN controller and the management solution
; W0 K3 |! E% r4 M3 h% w9 eCorrect Answer: D, z# ^+ C* F$ ]5 Q8 v
QUESTION 34* @6 t* c5 i1 g
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
' V+ Z- o* x+ P$ w: CA. push2 E5 _' z1 t, v' b
B. options* x2 l+ M5 h2 I+ N
C. connect
. r' T0 G; G, u4 ^$ A! n' N& AD. put: D$ h0 t2 T6 `8 O
E. get4 w; n& X: y4 ]- _4 |
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.6 |3 V- s# ~  C' c/ x' [

; j+ Y4 w2 G1 p9 p' O+ D! B8 QWhat does the API do when connected to a Cisco security appliance?
- D5 K! A, l2 [/ Z1 K" XA. create an SNMP pull mechanism for managing AMP& B2 w  ?" V0 v3 w( f
B. gather network telemetry information from AMP for endpoints
$ X. k, \, G- K0 y7 ^C. get the process and PID information from the computers in the network
! G; H3 a' I9 M& M/ _! }2 T6 JD. gather the network interface information about the computers AMP sees$ Y7 f) R& y! p- _  |; A$ {
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 366 \. [9 |* A, {
Refer to the exhibit., G0 r% f! R) z& L
What is the result of this Python script of the Cisco DNA Center API?6 f) ]) x8 @, N* C: ^  v4 W
A. adds a switch to Cisco DNA Center
; _/ a7 u/ D6 MB. adds authentication to a switch" p. }  q1 n* Z& n* l4 Q/ K
C. receives information about a switch! i- r5 n, e6 p% S/ f1 i; |
Correct Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37
( h5 R1 i& `# K1 ?3 n( {9 b* o- xWhich API is used for Content Security?0 t' d8 u0 T; f" p5 k, _. E, C
A. OpenVuln API
) u! p- I6 X3 E) |$ e6 E, rB. IOS XR API
* G% l! R1 T! T* M$ e6 Y) ZC. NX-OS API7 `8 X& ]. q; t! M8 y
D. AsyncOS API3 L* R1 p4 ^# c0 G7 c! E* A
Correct Answer: D
8 Z1 V$ w$ G5 N# p5 X: X# L4 KQUESTION 388 E& y" Z+ _6 X+ s
Which option is the main function of Cisco Firepower impact flags?9 ~0 S% W9 p. ~0 M- E
A. They alert administrators when critical events occur.* g/ g( J. s4 i7 Q
B. They identify data that the ASA sends to the Firepower module.# l) D+ E3 Q0 M
C. They correlate data about intrusions and vulnerability.
7 z# w* `- F5 t! k8 s8 C; O8 i7 JD. They highlight known and suspected malicious IP addresses in reports.: H3 k# _8 g5 `; P% f8 C
Correct Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38
: h4 Y2 M9 u5 k1 A. AWhich option is the main function of Cisco Firepower impact flags?
$ |$ o! \9 g; d( E% _A. They alert administrators when critical events occur.' v! p+ E) j7 g, J- c4 p  M
B. They identify data that the ASA sends to the Firepower module.) I: G: T' I1 y( s% B1 S1 i  Z8 |
C. They correlate data about intrusions and vulnerability.
, H' c) p& I) [4 ?0 d1 dD. They highlight known and suspected malicious IP addresses in reports.+ g" Z+ B& e4 v5 H( s
Correct Answer:% ^7 P% B$ H/ F! ^2 I+ l" |7 B+ {
C
4 \, y' F9 |$ p0 x- o( AQUESTION 39+ K& d$ R* w9 y3 s; T' N% b
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
& S2 H3 D9 B( `# o( ~& ~A. Cisco FTDv configured in routed mode and IPv6 configured5 t& N0 R- M% S
B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises8 J" N, R2 `9 F8 L, q; q4 K$ a
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
! f* W7 M& {0 x3 Z9 eD. Cisco FTDv with two management interfaces and one traffic interface configured# H" g# |9 L( a2 t0 ?3 Z
E. Cisco FTDv with one management interface and two traffic interfaces configured* m2 L3 ]% g5 A+ o* @
Correct Answer:( O% H& }/ R: C7 P- Q: `$ C. t. }
BC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41% }# F9 Z$ D4 m0 @+ Y7 A" K
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)9 k! n! |: V) g. T3 k/ u
A. routed mode
7 \* D7 r8 k4 w; l+ ~  BB. active mode4 A8 v6 e  ]5 X. c/ G
C. transparent mode
& I0 o' N0 c4 b! dD. inline mode
5 C+ M1 s1 A1 r7 vE. passive monitor-only mode0 j7 |6 C$ ?% ^  d
Correct Answer:
, B2 c3 W( A/ @& H& d$ ]DE
/ d; d! G+ \# f; [. Q' _6 _5 [QUESTION 42
  {5 O+ D- d! Y6 V, qWhich feature is configured for managed devices in the device platform settings of the Firepower Management Center?; ]7 r& Y9 ?5 L4 u" f" t* G
A. time synchronization; b1 w. \0 W  U1 U- t8 p
B. network address translations
: A) |; A9 |' P3 u, F; pC. quality of service
/ K: v: t; L' k+ GD. intrusion policy
/ A; z7 G; d0 N% {/ ~+ v3 V2 Z, ~Correct Answer:
/ a' v0 V0 R6 G" rA
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-2 09:07 , Processed in 0.140793 second(s), 24 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表