Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 27 out of 126 Pages

Topic 1: Exam Pool A

Refer to the exhibit.

Which statement about the authentication protocol used in the configuration is true?


A.

The authentication request contains only a password


B.

The authentication request contains only a username


C.

The authentication and authorization requests are grouped in a single packet


D.

There are separate authentication and authorization request packets





C.
  

The authentication and authorization requests are grouped in a single packet



ExplanationThis command uses RADIUS which combines authentication
and authorization in one function (packet).

Which cloud model is a collaborative effort where infrastructure is shared and jointly
accessed by several
organizations from a specific group?


A.

Hybrid


B.

Community


C.

Private


D.

Public





B.
  

Community



Community Cloud allows system and services to be accessible
by group of organizations. It shares theinfrastructure between several organizations from a
specific community. It may be managed internally byorganizations or by the third-party.

A switch with Dynamic ARP Inspection enabled has received a spoofed ARP response on
a trusted interface.
How does the switch behave in this situation?


A.

It forwards the packet after validation by using the MAC Binding Table.


B.

It drops the packet after validation by using the IP & MAC Binding Table


C.

It forwards the packet without validation


D.

It drops the packet without validation





C.
  

It forwards the packet without validation



What are two DDoS attack categories? (Choose two)


A.

sequential


B.

protocol


C.

database


D.

volume-based


E.

screen-based





B.
  

protocol



D.
  

volume-based



There are three basic categories of attack:+
volume-based attacks, which use high traffic to inundate the network bandwidth+ protocol attacks, which focus on exploiting server resources+ application attacks, which focus on
web applications and are considered the most sophisticated and serious type of attacks
Reference: https://www.esecurityplanet.com/networks/types-of-ddos-attacks/

An administrator is configuring a DHCP server to better secure their environment. They
need to be able to ratelimit the traffic and ensure that legitimate requests are not dropped.
How would this be accomplished?


A.

Set a trusted interface for the DHCP server


B.

Set the DHCP snooping bit to 1


C.

Add entries in the DHCP snooping database


D.

Enable ARP inspection for the required VLAN





A.
  

Set a trusted interface for the DHCP server



To understand DHCP snooping we need to learn about DHCP
spoofing attack first.


Page 27 out of 126 Pages
Previous