设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14
0 ~+ V; E; b/ r+ ]4 k/ \Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP
0 U7 L4 f& V' V9 K0 K4 G; ]commands to perform file retrieval from the server?
0 D  A5 F: H/ U; G$ fA. profile
, b3 M! y) `0 P' |- PB. url5 o8 G( e2 d% t, T; v( N
C. terminal
- `, ^$ N/ {1 K: |; H! ?/ sD. selfsigned
. X  P' M8 M4 P) x& A0 vCorrect Answer: A) k) L5 \7 Y) A6 ~; z! i
QUESTION 15- ^% a, u& T" s6 z6 o
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
& y" O4 v& y( M. hA. ARP spoofing
. D; @+ B. V3 o: k  m/ _B. exploits( B7 `' s9 G2 X' @2 Q3 e! O6 R
C. malware# z8 _, c- [- u. ~+ J" O
D. eavesdropping
( M6 E# E  M$ A# zE. denial-of-service attacks7 M5 e+ F+ R  s
Correct Answer: BC* s/ p% R. n# X+ q  G" l7 h
QUESTION 16& X; |: n8 Z" S: a4 g" f, N& O; P
What are two rootkit types? (Choose two); l  F6 `; D$ `* M) `$ ^6 {
A. bootloader
; G3 ~  D2 C2 Z# w1 kB. buffer mode
& K& q9 Q; w9 f: K& J/ h1 G% JC. registry
/ @% G* r) [- z7 \5 mD. virtual; e8 u7 ?3 u* h" Z3 ?# k# m. u
E. user mode, z/ z' a" a$ ]+ P& i( ]6 [
Correct Answer: A
- [, T3 L, [/ g& p4 F1 m' QQUESTION 172 B( ^5 j) p: E
Which threat involves software being used to gain unauthorized access to a computer system?" H; @5 t3 q6 K6 H! ~/ e
A. ping of death
0 @% U7 K3 l, E+ G' l- K' QB. HTTP flood
8 f2 O2 b! \3 @" D6 I( w1 GC. virus
" ~1 ~$ m/ m! f4 ND. NTP amplification
9 ]+ V% J' h7 f  F( kCorrect Answer: C: z$ Q- L& V5 w. ~6 Y
QUESTION 18% b3 Q) k2 H8 X/ E
Elliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?
( U; X8 O8 `; qA. 3DES) L) \; |) x; e! U6 i3 r
B. DES+ ^/ D+ R, h' v1 h# j
C. RSA1 x% Q9 A6 a6 I; \
D. AES
1 B9 ^, i& H, u: I1 n/ n# {Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19
; l6 c( b8 n& T5 m; f& a# m% n5 @Which two descriptions of AES encryption are true? (Choose two)$ E- Z3 k: e: z- q
A. AES is more secure than 3DES.
% f) g/ z+ G$ |# T% }# Z. \B. AES can use a 168-bit key for encryption.
2 U# W% b+ b! }5 hC. AES can use a 256-bit key for encryption.9 S% D5 `+ m* Q' B
D. AES encrypts and decrypts a key three times in sequence.
' R& I4 U7 g6 _E. AES is less secure than 3DES.
. L" J% `8 ~) }1 SCorrect Answer: AC
4 y! b& u# a" wQUESTION 20+ `& W& K5 e  x. X- h
Which algorithm provides encryption and authentication for data plane communication?* F" o& Y& B! a: z& p; ~
A. SHA-96
" p! x7 z( H6 M, l) [B. SHA-384% I' z; _; r0 F* s$ N. M
C. AES-GCM% e& A* q% C5 p/ j: l
D. AES-2566 Q# `" f$ h7 P5 h+ i- T; S$ X
Correct Answer: C+ o9 A5 q& B/ a7 a8 _1 x
QUESTION 21& h5 h' T! J0 S5 `5 w1 M, [
Which two key and block sizes are valid for AES? (Choose two)
1 O. ?5 [' m- B2 v4 b  {+ r. ?- nA. 128-bit block size, 192-bit key length
! }, Y8 b9 ]/ T. d; U4 x; D! JB. 128-bit block size, 256-bit key length
) h* D6 {# S, H. k  N. aC. 64-bit block size, 168-bit key length
7 o+ I( ?' {) |$ K4 gD. 192-bit block size, 256-bit key length
. P1 b6 ~7 l* QE. 64-bit block size, 112-bit key length
( o# f: s& }- }Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
9 U7 w( ~( X0 F& SWhat is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?6 Z0 h7 \* M( I' G! b& I" U
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
; m' T: ~6 z) P- C+ \( fB. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX5 i4 q& z7 X% g/ g
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX. l5 g5 h2 O' ~5 t" u8 Q; ^
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX; v0 A: r1 U/ J- n/ X0 `
Correct Answer: B* g; ]' R2 R" V2 L# |
QUESTION 23
8 h* O: B7 e3 _$ |7 k- i( iWhich technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable
9 h- l) S2 S4 _* m6 Rconnectivity?( J* ~7 o, i' L1 E8 y/ [% ?0 j
A. DMVPN# \. m% Y/ e: ^, X5 p5 O
B. FlexVPN
8 A& H- C* W8 \) j( j# jC. IPsec DVTI
3 u  n7 @% [- {; ?& E) `8 V8 tD. GET VPN& _( w* s3 s* q0 h
Correct Answer: D' Y6 O: y' p  b* C8 ]( u
QUESTION 24
1 ~/ N$ W$ v3 h6 d, DWhich two conditions are prerequisites for stateful failover for IPsec? (Choose two)& j1 T2 H1 m( Q, l5 a
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied6 P* c. b& f2 X1 H) ?  C8 d  ]; S
automatically
) S( L2 c$ `$ I4 ^, K  w7 aB. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.# Z' j- n! h9 l6 \& t% q
C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
9 \. q+ {. f6 H5 R( |6 V+ P4 aD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied5 d9 s( f8 ~; h3 p2 ]- |5 L& t
automatically.
/ T' O$ i7 v5 u  L2 uE. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.0 e* ?* m- J& k% M$ e' N
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 25
6 b, ^( p& _1 N' N) T7 P9 z' kWhich VPN technology can support a multivendor environment and secure traffic between sites?- E8 G8 U* R2 ~' k3 O' I* Q0 T+ [
A. SSL VPN
7 F8 B& R( a4 V! I0 ~B. GET VPN( `2 l- Y9 _$ H& F8 C
C. FlexVPN
% Y& b$ ?. Q; w" O$ J: C! N2 zD. DMVPN# M; }, E; H- r, }5 Q" u3 w. v- j
Correct Answer: B
0 @8 {! Q6 W1 I/ h1 m( \QUESTION 26/ U) \4 P# X2 x/ E
A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not
- I7 |; C' ^# rbeing established to hostB. What action is needed to authenticate the VPN?  p; \6 f6 l1 m$ r/ }, A  f
A. Change isakmp to ikev2 in the command on hostA.
/ J- [5 C* f# @8 ]9 gB. Enter the command with a different password on hostB.: {+ E* f, y# w. ?) o; e
C. Enter the same command on hostB.# w4 K6 B8 b4 Y
D. Change the password on hostA to the default password.
1 t( G* O8 n, P6 J- WCorrect Answer: C
# Q% m; v4 X/ [7 ~. ]QUESTION 27
+ M& K  r1 g& ^Refer to the exhibit.7 m' d" u* G% ^. g, r
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of
1 e' `! p9 ^1 _  q) H" XVPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command
# ~( E( e  I3 x1 A# goutput?
6 q& E, f9 V) VA. hashing algorithm mismatch$ X/ ^5 M) I* m. \5 {# ]
B. encryption algorithm mismatch8 o$ V. B( O6 }4 x/ K2 d
C. authentication key mismatch
0 Y# C3 P! A0 }; a0 h9 {  b4 [D. interesting traffic was not applied
) Y! z4 |$ K" a% b" xCorrect Answer: C
: N  r* g# i- `% U$ S" M3 mQUESTION 28& h% |# t' {! Q* l& C
What is a difference between FlexVPN and DMVPN?
9 Y% T& T/ E. H* u* K+ vA. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
- z# @+ _7 W5 Z$ F% k$ P1 X( LB. DMVPN uses only IKEv1 FlexVPN uses only IKEv2" X+ d2 A$ M1 n$ k
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
) i( G3 _5 p, @3 U+ mD. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2; n7 t! H* N" ^$ X, z" y1 P7 i
Correct Answer: C
6 ^& [- A" g7 G: X( J. R" J' b0 m
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 29
2 |+ V1 P- j- W/ u: y6 hWhich protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
8 b: E4 M0 g$ P+ z& {) @A. TLSv1.2
1 n/ |/ ~: c& EB. TLSv1.1
: ~/ e7 B( |9 KC. BJTLSv1/ T  c: _6 z; s$ d5 N. Y
D. DTLSv1
) [2 ^) ~5 @1 x  |: ]3 i* CCorrect Answer:  H+ M( {* s; G* U5 j- D/ S7 J3 \1 x
D
# m! E" o8 F9 o) P: o" |6 @QUESTION 30
; o: v: H1 K; x; LWhat is a commonality between DMVPN and FlexVPN technologies?
. a: L% T' [2 B: XA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes
: Z2 o" ~/ x- P, fB. FlexVPN and DMVPN use the new key management protocol
# |9 y3 I2 a/ Z( ~4 C( m! U( t6 b5 JC. FlexVPN and DMVPN use the same hashing algorithms
' c* `9 I0 G7 x8 p: C% J% V3 m7 QD. IOS routers run the same NHRP code for DMVPN and FlexVPN7 [" d6 I/ {/ t
Correct Answer: D
6 b# z' A6 d, w1 R2 U) ]9 ]QUESTION 31( d6 C$ [3 N' s
Which functions of an SDN architecture require southbound APIs to enable communication?, j* b7 j- A1 C% ?- D- Y( b
A. management console and the cloud0 j- ^% O: v2 O
B. management console and the SDN controller
2 ]; u) N# v. F+ rC. SDN controller and the cloud4 H: i  i" T  c/ ?5 y  ~3 C( f& {9 }
D. SDN controller and the network elements
7 @" j" l" t6 i! d6 a; {Correct Answer: D5 r9 c- o5 _5 a& T* _$ t& V
QUESTION 32
4 B% t3 v! o" |" ~Which two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)  y2 S( y( e  o% [. Y
A. accounting! _4 J; P0 p/ f( S  ~
B. encryption
! G# y, `! X& f( L9 I' p6 Y# UC. assurance; s$ z9 m5 l8 {/ S3 _! i& p3 D
D. automation! m  O+ G4 [6 Q: b( L6 S
E. authentication
  F( L" ~1 d- _' W5 N% R& UCorrect Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33
" I# O" a, z, j3 ZThe main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
- `) P2 _) f! ?& x: K4 zA. SDN controller and the cloud
5 v$ z+ m4 U1 |  O: F/ hB. management console and the cloud4 R+ b7 N$ w& l' o9 g
C. management console and the SDN controller8 \6 I) t7 {( W3 @2 z
D. SDN controller and the management solution
$ A; M: Z& m% ]% _# aCorrect Answer: D
# F9 o7 E) I( P1 ^$ b2 hQUESTION 34  i! R/ ^, @. V8 x3 x
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
! {  S0 U) f0 o4 tA. push0 O6 k4 j& O7 I+ g% c7 h
B. options, h: G: B( D. D! |
C. connect
4 e8 H/ y0 B5 B; j) j; [D. put$ ?7 R  {% V3 U4 R
E. get* G6 B/ S, X% \5 i
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.
1 l* A- `! R( g9 y# `8 T+ r- J1 ^7 U/ [) f, {- O. i; W  R
What does the API do when connected to a Cisco security appliance?, s4 r4 g) _/ h. A
A. create an SNMP pull mechanism for managing AMP8 Z) ?% c/ _; c) {: R- m9 D& i) d4 b
B. gather network telemetry information from AMP for endpoints/ J- [2 ]$ ], ~/ p
C. get the process and PID information from the computers in the network2 l7 \5 ]) X0 E$ }2 W9 L7 I
D. gather the network interface information about the computers AMP sees
% w+ D# \8 k# H$ z% a( X' PCorrect Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 366 O! o/ m. `3 a7 R% b
Refer to the exhibit.
1 _7 k4 d: q! ?; _/ LWhat is the result of this Python script of the Cisco DNA Center API?* Q; T. z4 F! B8 w* S
A. adds a switch to Cisco DNA Center
2 j: p; R2 m. v1 _2 m7 j0 K2 ^B. adds authentication to a switch7 [' I0 _$ b  E" O" D2 I
C. receives information about a switch
% ]& l" Y3 q3 T+ M/ j; J8 LCorrect Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37; ~4 G( G" O9 M  J1 N
Which API is used for Content Security?9 Q9 D& B# _% z7 [
A. OpenVuln API. F" E9 E& b; ~" y( V% o& e
B. IOS XR API
* ~2 {5 |5 A+ e1 m( GC. NX-OS API
: D% u3 M; ^! zD. AsyncOS API) V! L# n2 K/ K) R+ U0 @4 P
Correct Answer: D7 J  M2 D( x* a6 P" x) J* K
QUESTION 386 i! i# e$ Z# M% m9 c/ {- X
Which option is the main function of Cisco Firepower impact flags?
0 |/ v, _# J& sA. They alert administrators when critical events occur.6 Q! A& F. h8 v( T, A6 J, L
B. They identify data that the ASA sends to the Firepower module.
! ^9 i3 k; C+ i/ @/ h$ N/ V5 dC. They correlate data about intrusions and vulnerability.4 s9 g- ]! x1 f; w/ g$ `& r# Y! _
D. They highlight known and suspected malicious IP addresses in reports.
- Y% E2 Y* d  _* }0 u: Q: VCorrect Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38
1 H/ Z) x# g! h$ N6 yWhich option is the main function of Cisco Firepower impact flags?
* N5 u0 Q9 y0 RA. They alert administrators when critical events occur.
5 G* w' |7 v' O9 A8 z# m3 IB. They identify data that the ASA sends to the Firepower module.
# N6 j1 u" V% a$ T$ s5 c$ m3 dC. They correlate data about intrusions and vulnerability.
% v! R5 A9 ]4 h! u# dD. They highlight known and suspected malicious IP addresses in reports.
" m: Y* X. b6 y) J4 NCorrect Answer:3 Y1 }. n, g" N0 }; m
C2 F$ W/ ^: {* @
QUESTION 395 J  _  V% a/ y
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)/ u1 F! `1 ~! \% T, u" [8 ?6 ^
A. Cisco FTDv configured in routed mode and IPv6 configured
. j* j4 r6 ?$ D5 K3 ]& Z# aB. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises8 j6 q8 r+ H6 r  @
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
, T, D! K5 W6 Z3 c& h; p6 E! oD. Cisco FTDv with two management interfaces and one traffic interface configured. n/ M9 {5 I% |! C( L2 Y. F
E. Cisco FTDv with one management interface and two traffic interfaces configured8 q" y/ K. G% V
Correct Answer:
9 R6 Q5 K) Y  _8 P" K% KBC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41% L  E% N* b+ f5 S
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)- o0 G1 n; r' S( z4 Q9 T8 T$ [& O
A. routed mode
6 `! l; C" Y. v& u5 SB. active mode& j# w* I' c( K: L# `3 L9 ^; Y! }
C. transparent mode
$ a$ W5 j" p: ], z" XD. inline mode
2 I- w2 [. S8 m3 RE. passive monitor-only mode4 H, E' p. d$ W& \2 C
Correct Answer:
# Y  B0 o' o! I5 `/ P1 \DE
/ j. y2 E" i" O- `% \9 _: TQUESTION 42
6 @) ?% _* A2 o9 @% G& P, NWhich feature is configured for managed devices in the device platform settings of the Firepower Management Center?/ {) i: W( b. x1 {
A. time synchronization
2 |7 M& w  H( M' d, Y6 jB. network address translations
' g  C, i3 Y8 o. R. lC. quality of service; r) @; i+ j+ |6 z
D. intrusion policy
! g5 X; F/ R+ J. C3 g& X4 rCorrect Answer:
* [9 A# u* i  u, y8 fA
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-5-28 12:57 , Processed in 0.076633 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表