设为首页收藏本站language 语言切换
12
返回列表 发新帖
楼主: 姜洪涛
收起左侧

[其他] Do you want to study on cisco 350-701 together?

[复制链接]
发表于 2020-11-17 22:25:30 | 显示全部楼层
学习了,感谢楼主分享!!!
16# 2020-11-17 22:25:30 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-17 22:35:26 | 显示全部楼层
QUESTION 148 _; |+ [; W5 l- s) j. W. A$ T
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP- l  x0 x: X# t9 \+ d3 [" v
commands to perform file retrieval from the server?- B6 ?- G2 y" \7 p4 z6 x
A. profile
9 D0 S* K1 S, M& O0 c) y8 _$ ?B. url$ M2 B- ?4 p, M# F( L% \
C. terminal
& H* H3 k$ y3 T- ?& p$ HD. selfsigned+ F+ ?2 j2 ~& S9 D
Correct Answer: A
4 A: _/ [# i& W$ P1 Y' O/ nQUESTION 15# w0 ~  u8 e; r! a4 N
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
+ a, L8 P7 q6 c- QA. ARP spoofing  c5 i4 H8 H& [  \) j
B. exploits& A  C2 m0 p7 }6 C
C. malware4 m% _+ N. i( m. A: h# k) h
D. eavesdropping
" j& D, F- h% ?! ~' l' O  ZE. denial-of-service attacks
3 x- B) y# N, ^0 UCorrect Answer: BC( n7 E, i5 C  B* [$ P- v, Q
QUESTION 16
2 F  b$ ]* a8 b, Y. }5 [What are two rootkit types? (Choose two)! o" J1 f. a' T5 Z2 F7 m8 y
A. bootloader  Q5 i% n1 E+ F) `% g7 b
B. buffer mode
& _* S5 x0 F* WC. registry
) j5 I$ ^  |! s8 g! ^D. virtual! s$ x& C2 @9 e6 A) u
E. user mode' I2 o) e% {8 S' X+ l3 `4 a( l
Correct Answer: A
0 ~1 I& m' A! G5 {8 x  e" H# cQUESTION 17  K% ?/ \! _2 Q7 a+ {. i1 b7 B
Which threat involves software being used to gain unauthorized access to a computer system?
- }0 Q8 s: S9 o; P9 hA. ping of death
! X! I7 g1 c0 g  CB. HTTP flood5 o1 s8 [0 d- P$ X. k3 |0 {0 C
C. virus
1 _6 l, d3 c# {- L$ S3 KD. NTP amplification3 J' O) C3 M8 l
Correct Answer: C
: P! U2 V, P8 A0 ?  ZQUESTION 18
" h2 _& s$ G  H, ZElliptic curve cryptography is a stronger more efficient cryptography method meant to replace which current encryption technology?" g- A) ^7 M& M" r( }3 [9 J
A. 3DES
  m4 y3 P+ f- M/ L8 w' S  P. AB. DES5 `* e7 R' W  H8 V6 X  n9 y  J+ a
C. RSA
: P* N( h# h3 E3 J4 LD. AES! q  [/ L% ~, d$ S0 ?8 ?
Correct Answer: C
17# 2020-11-17 22:35:26 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-18 04:01:11 | 显示全部楼层
QUESTION 191 g, I  y3 K, C/ @+ ?6 Y6 j
Which two descriptions of AES encryption are true? (Choose two)
& ]1 I& d2 W3 i5 {8 W% i! ~* fA. AES is more secure than 3DES.8 c! C9 ?" m. t4 G/ A) G* T
B. AES can use a 168-bit key for encryption.& X2 J; y& F) E
C. AES can use a 256-bit key for encryption.
  _! g3 p* I, m. pD. AES encrypts and decrypts a key three times in sequence." X' W& O- o; _  G
E. AES is less secure than 3DES.7 p8 g% [7 t. ]- P
Correct Answer: AC4 G* `& Q7 _* S5 q2 q! s9 k/ h7 ]
QUESTION 20+ s& s0 ~% t0 d  L/ N1 O& ], [7 n: @
Which algorithm provides encryption and authentication for data plane communication?1 W% ?4 r, f1 Q9 H( q4 |/ T
A. SHA-96
, j9 I( y% O  g  ]7 n: Z. q3 tB. SHA-384: ~* @+ H/ ^" p: o% k
C. AES-GCM5 h8 L1 O9 l0 N8 r' C  N
D. AES-2566 y. R9 o# D2 w" M5 B
Correct Answer: C9 B! F/ ?' t7 D5 D5 B! J7 z/ Q
QUESTION 21
$ s$ `8 {% V4 ?' iWhich two key and block sizes are valid for AES? (Choose two)
- X$ F' r- _; h8 _: tA. 128-bit block size, 192-bit key length
0 H0 ^: h% K' o! Y/ oB. 128-bit block size, 256-bit key length/ w! _! c! Y; _4 ^, p5 m9 `
C. 64-bit block size, 168-bit key length7 Y# u- g' U& w. M
D. 192-bit block size, 256-bit key length8 y- h- z  P% c: t8 ~: O
E. 64-bit block size, 112-bit key length7 X' N9 B* S6 P
Correct Answer: AB
18# 2020-11-18 04:01:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-19 06:17:13 | 显示全部楼层
QUESTION 22/ p8 a7 V9 l4 P# Z8 W0 m
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?. C, A1 w' ~4 m# Z5 V5 m6 @8 D- y
A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
+ K: h7 O5 f# ?* v4 O  r4 QB. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX  ~2 s9 q! G0 S( @+ r, i$ R' b
C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX& \' r& o( e* z
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX& m4 g" j& j( s
Correct Answer: B$ M0 e2 w+ _* M6 o7 y
QUESTION 23: G" b1 d' n# v1 [
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable
, U2 J/ s& L5 O% q, t- vconnectivity?. ]7 E0 m- T( C! R3 Z6 n( D
A. DMVPN1 j& Y. @0 H; q6 c: W/ o* C
B. FlexVPN* L. W3 i( t, O8 X
C. IPsec DVTI+ I" b6 n& o. r! j4 B% h1 Q: l' X
D. GET VPN
+ o7 b2 t( _' ]9 ECorrect Answer: D& t% y. @" W% h5 |( a9 T
QUESTION 245 f5 b# N7 g! a* m0 {1 P" p
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)1 M7 W% A- ~- E% V+ T
A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied
7 S: \+ N8 }4 q5 c- P( e, Sautomatically  c5 j1 A$ J( p
B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
$ z; Q2 w/ {- E* x- V" u, @, o4 GC. The IPsec configuration that is set up on the active device must be duplicated on the standby device
5 V; z, f) h$ m: B1 _D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied7 h9 g; z$ {& f* R3 I8 V4 g+ [' [
automatically.8 [6 d7 ?" K; M: V% q1 @) S! w
E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
6 q& }; q% M4 [; LCorrect Answer: CE
19# 2020-11-19 06:17:13 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-11-22 08:35:33 | 显示全部楼层
QUESTION 258 q7 v6 ~# ~  N8 ^; L9 ~3 X
Which VPN technology can support a multivendor environment and secure traffic between sites?
1 L" Q/ u( Q* X! bA. SSL VPN4 }4 K6 U3 z# v6 R& ]0 g2 V
B. GET VPN
, I/ d5 f9 l! Z5 x8 {C. FlexVPN
' R& n: r7 X+ lD. DMVPN1 Y: U  x: ~8 a: h+ Z! U1 ~
Correct Answer: B
5 Y& q5 U" F4 C* ^$ M+ C/ f1 tQUESTION 26
0 F% |# i: K0 u1 ~2 E( A6 fA network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on hostA. The tunnel is not' d' ?: `* i5 Z+ ]' h* g
being established to hostB. What action is needed to authenticate the VPN?0 k9 u  p$ ?# F& d  g% U. u
A. Change isakmp to ikev2 in the command on hostA./ b/ I/ o: ~$ c  U1 L0 e$ p
B. Enter the command with a different password on hostB.1 F% E4 _# `# K
C. Enter the same command on hostB.
1 ~2 w% ~: o9 {; v. V* {$ E  dD. Change the password on hostA to the default password.
# ]6 m$ {; V2 F* n4 e, H, Y3 Z" NCorrect Answer: C
1 a" u# r& _" _' h/ VQUESTION 278 g* y& B$ o& a7 z
Refer to the exhibit.
) w' A7 r1 N& B2 AA network administrator configured a site-to-site VPN tunnel between two Cisco IOS routers, and hosts are unable to communicate between two sites of; `  G$ K# ~0 w8 ?7 F. @" J
VPN. The network administrator runs the debug crypto isakmp sa command to track VPN status. What is the problem according to this command  }' l. k9 c* j7 Z% ~
output?
6 D% I4 S4 K0 G. HA. hashing algorithm mismatch" @) e% q* k) i4 c8 y; ]; g
B. encryption algorithm mismatch
' K: [6 |( G  f( Y5 c$ X5 ^C. authentication key mismatch
! f: ?) U( H5 M* F/ v3 }D. interesting traffic was not applied
! F1 G+ {9 P% r( c+ o- X# ^Correct Answer: C4 l: Y/ p/ l4 e5 V& X
QUESTION 283 `4 {4 \* R6 D  Y8 w* K* Z
What is a difference between FlexVPN and DMVPN?
; N4 Q3 v# K# n3 v0 uA. DMVPN uses IKEv1 or IKEv2, FlexVPN only uses IKEv1
8 z3 l/ i/ q1 e, t; aB. DMVPN uses only IKEv1 FlexVPN uses only IKEv25 I9 ?! l4 n/ q- w
C. FlexVPN uses IKEv2, DMVPN uses IKEv1 or IKEv2- P& \$ v: e9 x8 w! R
D. FlexVPN uses IKEv1 or IKEv2, DMVPN uses only IKEv2( G# v! {6 {1 J  J4 g  Y( H; N
Correct Answer: C4 Y6 i) R, ]$ i' ~
20# 2020-11-22 08:35:33 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:16:32 | 显示全部楼层
QUESTION 296 Y4 v: T0 w3 _% ~: x2 T5 w8 B0 M
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?$ _0 Z$ C2 n4 X& x0 p' l
A. TLSv1.27 v0 R- C* J# D0 E8 f' W
B. TLSv1.1
& d# f0 c7 T! Y$ P' y4 o% V( GC. BJTLSv1/ I: o' X# O1 @% T. h# y. n
D. DTLSv1  g4 J! P' a& J# D; U4 O
Correct Answer:
9 c+ [" r! i5 q. s0 B. u5 P; GD
) e+ h. V; R7 |6 Y! _QUESTION 30$ r5 Z, v( t3 q& C  z
What is a commonality between DMVPN and FlexVPN technologies?
$ I7 k0 Q* E) ?0 c8 lA. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes& K+ w$ |4 O( x6 C  h2 J0 T
B. FlexVPN and DMVPN use the new key management protocol* ^2 A/ b; _3 {3 E3 ^
C. FlexVPN and DMVPN use the same hashing algorithms
# i# l) i2 a* [D. IOS routers run the same NHRP code for DMVPN and FlexVPN
! q; Z0 R: P5 r4 PCorrect Answer: D
+ s9 E+ o7 ?/ u: }, XQUESTION 31
6 I; H# E& o: v7 G+ z  E/ JWhich functions of an SDN architecture require southbound APIs to enable communication?$ H( _2 S0 E& U+ Y- ^! i5 t- m" z
A. management console and the cloud
0 E% J7 [. G7 a: I" Q! w( hB. management console and the SDN controller' k. S5 }9 ^- z( A, M& H6 |1 a/ Z7 F9 `
C. SDN controller and the cloud
: T$ Y- [: \9 u$ z7 v% R. FD. SDN controller and the network elements3 i- H3 \+ s7 _9 A$ @
Correct Answer: D
, K; V6 N# g% W0 WQUESTION 32
, t: T' ]& _+ C+ @; bWhich two features of Cisco DNA Center are used in a Software Defined Network solution? (Choose two)
/ J2 e* K  y* ^A. accounting. p" B/ k4 o& U
B. encryption) Y- ~3 i( R: u- e% ?# `2 @/ r  H
C. assurance, V# U+ B3 p- J+ a
D. automation7 [' u" b$ ^! y  E- d
E. authentication
8 a  K: z; Q. ~8 SCorrect Answer: CD
21# 2020-12-4 23:16:32 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-4 23:17:25 | 显示全部楼层
QUESTION 33( W* q6 v' L  ^# Y/ A2 N
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?1 Z' b' v7 |% |8 {! i6 }3 N, h
A. SDN controller and the cloud% U2 E* h2 ]8 Y: f1 A7 a
B. management console and the cloud
: a$ a" }' A; zC. management console and the SDN controller
' e# R8 ?, K$ I6 g( ]- |5 `. AD. SDN controller and the management solution5 @% T  l& i- U/ z. v
Correct Answer: D
3 }* r% @8 V* s: _QUESTION 34" U1 j; W) ]: X! q3 U
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)! Z1 q, e2 f  N' `$ {
A. push; r2 i  e5 v. V
B. options
' u7 w" Y8 c  YC. connect
" b- b0 w' w0 T9 p& V7 RD. put
7 \8 C% x  g. o9 u+ N' M& bE. get* b7 t1 A! U2 l& G9 Y3 z  R
Correct Answer: AD
22# 2020-12-4 23:17:25 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:46:40 | 显示全部楼层
35. Refer to the exhibit.
& R4 a5 M9 l) }  p) z+ D, [% r" X: x2 y( z5 q9 \9 `" B
What does the API do when connected to a Cisco security appliance?
7 P* v& E, S, C# L7 Z5 jA. create an SNMP pull mechanism for managing AMP( t, Q% g; ?% k3 G
B. gather network telemetry information from AMP for endpoints# x( W4 X, r3 x9 e9 h1 v: q* ]
C. get the process and PID information from the computers in the network2 C! d. a% C' {, f8 s
D. gather the network interface information about the computers AMP sees# X* t. x6 E7 B" ~
Correct Answer: D
question-35.png
23# 2020-12-9 10:46:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:11 | 显示全部楼层
QUESTION 363 {3 N& b' r( o! p0 k
Refer to the exhibit.
/ E0 j' i! f! t: b6 A0 X* v: K- g8 B  WWhat is the result of this Python script of the Cisco DNA Center API?8 c0 O) U( c+ z5 G
A. adds a switch to Cisco DNA Center/ E# R/ s2 T) y2 F. @
B. adds authentication to a switch
/ b5 Q! s) l8 r* C% R- xC. receives information about a switch* J" p( O- r& O- G' d. B4 i
Correct Answer: A
question-36.png
24# 2020-12-9 10:48:11 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-9 10:48:40 | 显示全部楼层
QUESTION 371 E+ ~) f7 _2 R% A: z7 @( S; l
Which API is used for Content Security?1 H! g6 k" F+ o2 w# v7 U
A. OpenVuln API: m8 I/ U- e3 A& o
B. IOS XR API
% M: v1 C- }- N( r, d* o( t7 WC. NX-OS API
% x2 N6 e; u/ U! W/ HD. AsyncOS API, c' L' J& R/ m9 O* w
Correct Answer: D6 c% B8 h7 M1 S4 _
QUESTION 38
7 \8 h3 E# B3 H- O9 ?/ ~  T( jWhich option is the main function of Cisco Firepower impact flags?
, \7 S, u& v" H0 QA. They alert administrators when critical events occur.
$ }2 L5 ]+ M5 h5 KB. They identify data that the ASA sends to the Firepower module.
) }& f* z1 \  ?4 V/ O* |5 U. r3 W6 eC. They correlate data about intrusions and vulnerability.
* p# X+ ~& i2 K6 J) P  KD. They highlight known and suspected malicious IP addresses in reports.
9 _. M, Z: u/ mCorrect Answer: C
25# 2020-12-9 10:48:40 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:10 | 显示全部楼层
QUESTION 38
3 M0 l% Y1 j/ |: ZWhich option is the main function of Cisco Firepower impact flags?# d9 q6 O! ?! Q( v5 w. e0 X2 P! i
A. They alert administrators when critical events occur.
4 a9 E( G" m; uB. They identify data that the ASA sends to the Firepower module.
& H8 E# s6 N* r! E$ B6 rC. They correlate data about intrusions and vulnerability.
' m* u' f  o4 j3 ~" q& a6 SD. They highlight known and suspected malicious IP addresses in reports.& n. f3 m5 M8 o# A0 Q5 e& g
Correct Answer:. b- T) O2 Y. T( E2 ]% X
C
+ |9 O4 L! ^: kQUESTION 39
! u2 @1 J4 [  ^$ h/ i4 SWhich two deployment model configurations are supported for Cisco FTDv in AWS? (Choose two)
' B+ c* Q7 o# h- q2 q& `A. Cisco FTDv configured in routed mode and IPv6 configured
: t- w& Z$ l0 C$ s9 @B. Cisco FTDv configured in routed mode and managed by a physical FMC appliance on premises4 v5 c! N( X4 a; y0 U7 H
C. Cisco FTDv configured in routed mode and managed by an FMCv installed in AWS7 m5 B+ m6 G7 H4 [5 y. n
D. Cisco FTDv with two management interfaces and one traffic interface configured
; }1 y, E) z- f* P: I0 EE. Cisco FTDv with one management interface and two traffic interfaces configured
. l1 P$ q6 ?1 T6 r/ g, E3 N' VCorrect Answer:# X( l6 F: q1 t
BC
26# 2020-12-22 23:44:10 回复 收起回复
回复 支持 反对

使用道具 举报

 楼主| 发表于 2020-12-22 23:44:41 | 显示全部楼层
QUESTION 41: H7 W" P& w2 u# Z. R
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)/ o1 u8 G7 e/ `8 K! t/ T& y* K
A. routed mode
+ Y1 w% I2 u( xB. active mode
/ K4 H. R1 A# ?, sC. transparent mode
  E- U( B5 Y" x3 iD. inline mode
" J8 K4 `$ |2 E9 O, mE. passive monitor-only mode
+ X+ B, h5 u5 e# j3 @, u0 eCorrect Answer:
6 l% I$ L9 g; ?! x- @DE; ]# x0 b, ~( K6 B8 l, y
QUESTION 42% i6 M. H8 l  K( \
Which feature is configured for managed devices in the device platform settings of the Firepower Management Center?
0 s$ M5 V3 h7 D- I) yA. time synchronization1 K! G! o2 t8 w' e
B. network address translations
0 S3 F9 f' L9 e; ZC. quality of service
- A& f- ]2 M1 |% B5 S# lD. intrusion policy
& d. T; c" a4 C& O/ `4 T+ d5 ~Correct Answer:4 Q; f$ h* T# L
A
27# 2020-12-22 23:44:41 回复 收起回复
回复 支持 反对

使用道具 举报

发表于 2021-2-2 15:43:10 | 显示全部楼层
i want to study
30# 2021-2-2 15:43:10 回复 收起回复
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 论坛注册

本版积分规则

QQ|Archiver|手机版|小黑屋|sitemap|鸿鹄论坛 ( 京ICP备14027439号 )  

GMT+8, 2025-4-27 01:25 , Processed in 0.268972 second(s), 22 queries , Redis On.  

  Powered by Discuz!

  © 2001-2025 HH010.COM

快速回复 返回顶部 返回列表