Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 23 out of 52 pages Questions 221-230 out of 515 questions
Question#221

How does DNS Tunneling exfiltrate data?

  • A. An attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.
  • B. An attacker opens a reverse DNS shell to get into the client's system and install malware on it.
  • C. An attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
  • D. An attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
Discover Answer Hide Answer

A

Question#222

An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?

  • A. unencrypted links for traffic
  • B. weak passwords for authentication
  • C. improper file security
  • D. software bugs on applications
Discover Answer Hide Answer

A

Question#223

A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?

  • A. SYN flood
  • B. slowloris
  • C. phishing
  • D. pharming
Discover Answer Hide Answer

A

Question#224

Which two preventive measures are used to control cross-site scripting? (Choose two.)

  • A. Enable client-side scripts on a per-domain basis.
  • B. Incorporate contextual output encoding/escaping.
  • C. Disable cookie inspection in the HTML inspection engine.
  • D. Run untrusted HTML input through an HTML sanitization engine.
  • E. SameSite cookie attribute should not be used.
Discover Answer Hide Answer

BD

Question#225

Which threat involves software being used to gain unauthorized access to a computer system?

  • A. ping of death
  • B. HTTP flood
  • C. NTP amplification
  • D. virus
Discover Answer Hide Answer

D

Question#226

Which two capabilities does TAXII support? (Choose two.)

  • A. exchange
  • B. pull messaging
  • C. binding
  • D. correlation
  • E. mitigating
Discover Answer Hide Answer

AB

Question#227

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

  • A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
  • B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
  • C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.
  • D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
  • E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.
Discover Answer Hide Answer

CE
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html

Question#228

Which algorithm provides encryption and authentication for data plane communication?

  • A. AES-GCM
  • B. SHA-96
  • C. AES-256
  • D. SHA-384
Discover Answer Hide Answer

A

Question#229

DRAG DROP -
Drag and drop the capabilities from the left onto the correct technologies on the right.
Select and Place:

Discover Answer Hide Answer


Question#230

Which two key and block sizes are valid for AES? (Choose two.)

  • A. 64-bit block size, 112-bit key length
  • B. 64-bit block size, 168-bit key length
  • C. 128-bit block size, 192-bit key length
  • D. 128-bit block size, 256-bit key length
  • E. 192-bit block size, 256-bit key length
Discover Answer Hide Answer

CD
Reference:
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard

chevron rightPrevious Nextchevron right