设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 14* h. G% L1 s2 }" ], {! p
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP0 s0 U8 |, U9 c9 H
commands to perform file retrieval from the server?: |; b. I8 {7 ~6 Z8 `6 @, ^; t) J
A. profile
- q; s2 s2 M. D0 J. @4 b' UB. url( e7 G+ ]% w' R# H( T. O
C. terminal
$ w0 p; C% o# jD. selfsigned
& r  K/ l/ q' uCorrect Answer: A
7 v( R  s/ Q8 u! s$ D/ nQUESTION 159 w* t1 A; x4 p0 f1 W
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two), c, }+ m  O* X* x) q, f4 s
A. ARP spoofing
. I2 P- K  g/ sB. exploits9 a# @& r7 h. \' C+ _
C. malware
( o, ?5 v7 Z! V5 P+ ~1 m/ s  iD. eavesdropping
5 k) T% ]0 R: f3 H: x5 H7 B- E+ Y+ OE. denial-of-service attacks$ P! V6 |, ]; i" a
Correct Answer: BC
3 M+ L6 ?! V1 b9 _QUESTION 16
! ?& G1 ]6 w! v- W% ZWhat are two rootkit types? (Choose two)
& E" B" Z  `! T, M( h% JA. bootloader. f* |/ o! m2 F+ x( t: R
B. buffer mode" a7 y7 b6 s/ Z: q% B. M) P: e/ i
C. registry( I& N% d9 ^! J9 T
D. virtual8 s( _* `! T! M/ O' h  z4 |/ r
E. user mode# Q7 c5 U7 o% a3 R1 B, V9 ~
Correct Answer: A. e, l- K  ]0 h5 @1 Z
QUESTION 171 F# K- P  n) Q+ x
Which threat involves software being used to gain unauthorized access to a computer system?
# A( G& B* s2 U: f$ \7 LA. ping of death, u! \. A1 K  ~4 K7 i
B. HTTP flood" r$ C! f6 @7 e! B
C. virus) M$ Z! B4 O, J; Z; C
D. NTP amplification
" @' q: q7 K+ N; MCorrect Answer: C
0 E( y: w3 |; x- n, F1 C9 a1 ]QUESTION 18
0 V) S  d; f9 nElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?- J5 f: b  J+ U  b+ t2 [4 ]
A. 3DES
6 ]. L, x+ W! r3 d+ vB. DES9 e- ~) g  X) }
C. RSA
& d. D1 S  d) m. W8 K2 U& H8 G! W0 sD. AES
( x3 t% `, k5 v5 s: X; I. n7 J9 d% x& r+ lCorrect Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 19
9 n) R0 O( I0 \% V2 R, C: U1 W) jWhich two descriptions of AES encryption are true? (Choose two)2 M+ Z) G7 g; \  S, E, Z3 w
A. AES is more secure than 3DES.
5 T. Z* s8 E" V$ \0 n* \B. AES can use a 168-bit key for encryption.6 V0 E+ b! @$ T' C) \) Z+ r+ w
C. AES can use a 256-bit key for encryption." ^3 x7 p/ I1 y. v% c) |
D. AES encrypts and decrypts a key three times in sequence.
" W( R- j8 @: Q" t- tE. AES is less secure than 3DES.& z% Y2 k2 C. c: V! _# f  R. g
Correct Answer: AC
& v6 F+ o( l: l' q5 c2 S2 PQUESTION 20
3 O4 @, y9 V2 @5 s9 ]4 KWhich algorithm provides encryption and authentication for data plane communication?) r4 E, Z; H) v- A9 K4 a
A. SHA-96
# D- x- I2 `5 _! uB. SHA-384# s( o% W  i% t9 j0 T6 w. t  ]& t1 G
C. AES-GCM
8 v! ^( q6 [+ ID. AES-256
& D' n# o& D! B# q) {" wCorrect Answer: C) C* b' t8 z) t5 r
QUESTION 21! A$ k3 f5 r1 b  q
Which two key and block sizes are valid for AES? (Choose two)- q- q  m/ z% r+ Y0 T  D; T. O% |
A. 128-bit block size, 192-bit key length
, |6 \5 z6 X: Y* U1 r1 aB. 128-bit block size, 256-bit key length, F  a) h& \" j7 B, U; I+ x) U  Q# K% U3 C
C. 64-bit block size, 168-bit key length
' }  S  w" f  }. V- `$ r, `2 s+ c  M1 E, tD. 192-bit block size, 256-bit key length
$ \/ r3 s% s: xE. 64-bit block size, 112-bit key length0 x7 c1 R4 {0 K2 m
Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22
+ ], [$ I' a, F8 B, ^What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
: G0 a& c3 E/ zA. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
* ?. P1 b5 J( C0 l' jB. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
1 c2 q3 ~! z6 a# I# \  D& mC. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX' {3 G3 ]7 g- G+ @0 o
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
/ P4 e) d$ I/ o7 }6 @Correct Answer: B$ s- y2 A9 ^- j+ Q
QUESTION 23: C& ]- |) k9 S
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable3 C& C# S5 T2 k
connectivity?& o+ W  y  ]7 x4 \- o9 X
A. DMVPN5 R0 V2 T( k" z, E# L
B. FlexVPN
" h+ i0 y5 r- ^C. IPsec DVTI
: V0 X. f0 E$ k# J4 PD. GET VPN7 m3 d  c, E) M% W0 N/ k+ ~, E$ Y, H
Correct Answer: D
. w1 d2 U$ l  @' [QUESTION 24
, j9 F% E; Q) AWhich two conditions are prerequisites for stateful failover for IPsec? (Choose two)
& C. d# p4 A3 k! h- I- V) z  D* w6 x- pA. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied
. o! `+ R! H. g- m5 Kautomatically
% w! [0 o- A: G( z/ L- d4 hB. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
8 E3 b1 b4 p& f0 |$ b" p: @C. The IPsec configuration that is set up on the active device must be duplicated on the standby device
4 Y+ R& r9 c4 u- Y+ Q1 O6 tD. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied4 N1 ~0 e* c7 E8 A/ W! b4 q3 H0 J5 d
automatically.$ A/ F' L) s7 ?* z' G. U0 z4 {
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.& \" G* H4 ]8 k+ p" W) l
Correct Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 25
3 m8 ^9 o! k4 @Which VPN technology can support a multivendor environment and secure traffic between sites?9 O+ s1 \, [7 `( l6 u, H/ H
A. SSL VPN
. q( r9 ^( p2 `/ y* \B. GET VPN
, }* N- g: a4 s/ HC. FlexVPN
; y# u' j0 P4 k# |7 s+ |D. DMVPN
  @* M* z- B- \, ^4 lCorrect Answer: B
+ O' Y3 y0 o+ h" E3 }  ~QUESTION 26
  z/ P  c" M: W( lA network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not
% Q& ^+ k' x8 P) _being established to hostB. What action is needed to authenticate the VPN?
" c0 ?; T, ]. d# M2 o9 I/ Z0 Q% oA. Change isakmp to ikev2 in the command on hostA.
/ O, B* Y' x. x) w/ B/ aB. Enter the command with a different password on hostB.
$ e" a% t3 B  S  e4 J  iC. Enter the same command on hostB.  u. a, i: k7 p- D5 X
D. Change the password on hostA to the default password.; b- o1 R- Q/ Q& [2 W  M. H$ v
Correct Answer: C( |; b9 i+ ^5 h; t' b7 `
QUESTION 27
- E! l( f. _8 ^2 z  w* @Refer to the exhibit.) o/ B6 r5 O( X3 f$ P# n3 ?
A network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of$ U$ T5 ?' i! B: j) ~. }
VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command% Z( @( _; @9 |2 z; ?1 _
output?
% C) R5 y& G' tA. hashing algorithm mismatch- j0 @* K* C6 a2 F4 }9 }. w
B. encryption algorithm mismatch
) E  r$ q9 |# g3 [C. authentication key mismatch* K0 g/ z4 |1 N( r. m$ H- [5 j
D. interesting traffic was not applied' b* {/ c: R4 H  e, k
Correct Answer: C3 V  W0 e- r& Q( a3 f6 `" K; n5 Y7 k
QUESTION 280 |' M  d; ]1 \- m( y0 T& k4 z
What is a difference between FlexVPN and DMVPN?( _+ N% P, H, M9 }
A. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1! D  x2 s/ h1 l
B. DMVPN uses only IKEv1 FlexVPN uses only IKEv2$ s5 v$ s9 [0 f3 ~/ t0 @
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2
  D" J9 l* B3 ]D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2
& \' q7 U& E/ UCorrect Answer: C
/ y, h5 z* L5 R' M! V$ j
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 299 i5 ^: \5 X. f+ W9 F& ?+ ]/ C
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
+ A% N8 x1 X+ u3 ]4 RA. TLSv1.2
2 g: H# q' P( M# N( @: FB. TLSv1.1
: v% i' ^( H+ I: e: XC. BJTLSv1
: u: a. T, X$ ~D. DTLSv1
* Q$ Q: H6 n& f% E7 H" tCorrect Answer:8 P- T; {# Y9 B
D
! \+ ~' I2 O; F  s& i% tQUESTION 30
# l1 q" l* d0 Z5 o" W, N7 aWhat is a commonality between DMVPN and FlexVPN technologies?
; \! n% u* n: t  m. {A. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes( L: W1 @( r3 X7 Y/ E
B. FlexVPN and DMVPN use the new key management protocol2 P  v6 M+ E( o" r2 g+ L
C. FlexVPN and DMVPN use the same hashing algorithms2 S" ^5 C- [7 y& O9 O! Y& p" A# ~
D. IOS routers run the same NHRP code for DMVPN and FlexVPN& }: |2 T% g4 V: r( [& N4 e; ~
Correct Answer: D
# q9 }& t% }  {QUESTION 31
  b4 w' D" b9 q+ `9 }Which functions of an SDN architecture require southbound APIs to enable communication?- h; k% y# `+ R/ O! f4 l
A. management console and the cloud+ x( J) M* A. y+ |) j. `0 m
B. management console and the SDN controller, R# {# p* M! y( ]! v& ^* x
C. SDN controller and the cloud9 Z  H$ h/ r- |- J& N
D. SDN controller and the network elements
, }$ ]# u6 e) O9 i4 F) R1 XCorrect Answer: D
2 C; U$ C7 P; Z- ZQUESTION 32
8 q: N/ m+ t( P3 P$ PWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)6 ^, {$ W8 A# d" S: j; m% \0 h
A. accounting
  l3 Z/ {8 n4 Y" ]* mB. encryption1 x3 t+ d, Y/ \9 |- |% b: ?: Q( X
C. assurance0 f) G  k9 q4 |% `* F# ]
D. automation
. [: i0 I1 a1 l& YE. authentication, E- m( V7 t% b" m3 _# T  o- R
Correct Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33. E- T$ f5 }- i  C* R/ K' }- {
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?( p. t* R1 T' I) S8 C) f
A. SDN controller and the cloud/ G4 ~; T8 D  N1 s
B. management console and the cloud
  @+ I& W+ v' v, x5 vC. management console and the SDN controller# X- p4 r) @4 P% Z! g+ `3 }7 E
D. SDN controller and the management solution
0 t# q; {6 w2 e9 J  K8 LCorrect Answer: D: e7 }+ C7 i6 h1 v
QUESTION 349 U3 h1 B5 P# d: f
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
- O: _$ c, V2 j# A' o2 x/ ~A. push
, L9 _0 A. x$ {1 PB. options9 V0 \, d" {5 i
C. connect& c$ `  Q" N8 h' S3 ?, H0 R1 a
D. put" u) L$ ~6 h1 |! M
E. get1 }7 E8 _+ v6 b
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.$ A6 l; X- E5 \' F& _( }

% ~! J( T8 `) w5 ]) b* F) ~2 cWhat does the API do when connected to a Cisco security appliance?
  L4 q1 S) y. Q+ g& nA. create an SNMP pull mechanism for managing AMP
) l, {' P2 N0 b2 r2 q) HB. gather network telemetry information from AMP for endpoints
* Y- P. g* D" j) {. _C. get the process and PID information from the computers in the network
$ u" z* i$ [( H9 z  E4 X0 wD. gather the network interface information about the computers AMP sees" u( S2 ]0 C$ k! `
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 36
5 U. f) `! X" L- qRefer to the exhibit.0 D' g2 z! ?& `4 q2 l2 B3 Q! b
What is the result of this Python script of the Cisco DNA Center API?
  c8 B0 v) g) o" Q% {A. adds a switch to Cisco DNA Center0 b1 j+ x# `6 W" }# V% G
B. adds authentication to a switch
1 D. a' N( p  k. N) kC. receives information about a switch8 s' q1 z8 C/ o3 P
Correct Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 37
' l3 T9 e: V6 D9 U4 G+ HWhich API is used for Content Security?+ W3 W, S+ y  ~# a* W$ A8 y
A. OpenVuln API
3 e: o; f  C6 F# k4 fB. IOS XR API9 E; F6 e/ n9 h2 S2 V  s  X
C. NX-OS API7 h$ L5 M9 N( {! q
D. AsyncOS API! l/ e1 u9 W0 i; l) h2 _
Correct Answer: D
# M, ]2 s* @9 k, f" _QUESTION 38( _" q( F2 G. Z9 }
Which option is the main function of Cisco Firepower impact flags?
' m' R0 z2 `1 F( m( ?# T4 vA. They alert administrators when critical events occur.
6 k5 T+ Y& m0 l  K0 sB. They identify data that the ASA sends to the Firepower module.
1 T1 _0 e" x8 |# I) `C. They correlate data about intrusions and vulnerability.6 m* u' d+ p1 h! a! Y' Q* C
D. They highlight known and suspected malicious IP addresses in reports.
; O1 v' B/ V1 B$ p$ D: vCorrect Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 389 W7 v, b* {' D
Which option is the main function of Cisco Firepower impact flags?# r) w$ u2 C/ y8 J& N: _, V" l1 p2 {
A. They alert administrators when critical events occur.
$ t5 [* h2 g8 b* fB. They identify data that the ASA sends to the Firepower module.
9 y" d! n# y) d( fC. They correlate data about intrusions and vulnerability.
" ~1 H# q& w4 y: S; X! Z$ o) Y" z) _D. They highlight known and suspected malicious IP addresses in reports.% Z1 ]/ J4 D, }2 Y
Correct Answer:
; k# _5 v! {' ^" Y1 W# w! @C! s6 E$ N% Q  I" O; Z6 f  Z, Z7 f
QUESTION 39+ h5 C0 D$ ^+ w; e& u
Which two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)( u; l& ]- Y( _  I; \
A. Cisco FTDv configured in routed mode and IPv6 configured0 u- K8 s. v6 V6 J
B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises* m5 Z% t& G5 s9 n( Z  C4 G
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS
+ g5 Q' k, F4 A8 k1 wD. Cisco FTDv with two management interfaces and one traffic interface configured5 K% S; `& y/ z5 K( F
E. Cisco FTDv with one management interface and two traffic interfaces configured# F4 A4 X7 c8 P7 }
Correct Answer:, j  Y' R$ a/ m4 }! b3 R
BC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41' w) s9 Z+ K( I& `; Y' D* Q
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
& x0 I: i+ r- @* b+ N: m) Z: NA. routed mode
# u# Y2 I5 X& v, ?  L/ u+ xB. active mode8 ?# K8 }% ?8 \' R+ W& _* L
C. transparent mode- u4 H6 x! h6 H7 c  o) S
D. inline mode
& c1 ~6 U# Z0 w7 y* LE. passive monitor-only mode
& q. w' o3 J. b! J. XCorrect Answer:. s3 O  f1 |- Z* }" T4 }
DE6 R4 Y+ V& x$ g0 ~
QUESTION 42
' R- u1 t' _$ Q! y7 c, ^' _% AWhich feature is configured for managed devices in the device platform settings of the Firepower Management Center?3 R  t+ X$ S5 Y( [2 v6 h
A. time synchronization
6 z3 f! Y7 ?) [- @  N0 u% {B. network address translations5 M4 k+ M8 |; E6 z' f: g
C. quality of service
6 R3 b7 W0 k8 lD. intrusion policy
( ~! H1 B0 m+ f$ \Correct Answer:
/ D/ ]4 T: v# `; t% d0 W/ }A
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-4 04:09 , Processed in 0.095170 second(s), 21 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表