Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 8 out of 126 Pages

Topic 1: Exam Pool A

Which network monitoring solution uses streams and pushes operational data to provide a near real-time view of activity?


A.

SNMP


B.

SMTP


C.

syslog


D.

model-driven telemetry





D.
  

model-driven telemetry



https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start-guide

Which algorithm provides asymmetric encryption?


A.

RC4


B.

AES


C.

RSA


D.

3DES





C.
  

RSA



Which two cryptographic algorithms are used with IPsec? (Choose two)


A.

AES-BAC


B.

AES-ABC


C.

HMAC-SHA1/SHA2


D.

Triple AMC-CBC


E.

AES-CBC





C.
  

HMAC-SHA1/SHA2



E.
  

AES-CBC



Cryptographic algorithms defined for use with
IPsec include:+ HMAC-SHA1/SHA2 for integrity protection and authenticity.+ TripleDESCBC
for confidentiality+ AES-CBC and AES-CTR for confidentiality.+ AES-GCM and
ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.

Which two behavioral patterns characterize a ping of death attack? (Choose two)


A.

The attack is fragmented into groups of 16 octets before transmission.


B.

The attack is fragmented into groups of 8 octets before transmission.


C.

Short synchronized bursts of traffic are used to disrupt TCP connections.


D.

Malformed packets are used to crash systems.


E.

Publicly accessible DNS servers are typically used to execute the attack.





B.
  

The attack is fragmented into groups of 8 octets before transmission.



D.
  

Malformed packets are used to crash systems.



ExplanationPing of Death (PoD) is a type of Denial of Service (DoS) attack in
which an attacker attempts to crash,destabilize, or freeze the targeted computer or service
by sending malformed or oversized packets using a simple ping command.A correctlyformed
ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is
considered,and 84 including Internet Protocol version 4 header. However, any IPv4 packet
(including pings) may be as large as 65,535 bytes. Some computer systems were never
designed to properly handle a ping packet larger than the maximum packet size because it
violates the Internet Protocol documentedLike other large but well-formed packets, a ping
of death is fragmented into groups of 8 octets beforetransmission. However, when the
target computer reassembles the malformed packet, a buffer overflow can occur, causing a
system crash and potentially allowing the injection of malicious code.

An engineer is configuring 802.1X authentication on Cisco switches in the network and is using CoA as a mechanism. Which port on the firewall must be opened to allow the CoA traffic to traverse the network?


A.

TCP 6514


B.

UDP 1700


C.

TCP 49


D.

UDP 1812





B.
  

UDP 1700



CoA Messages are sent on two different udp ports depending on the platform. Cisco standardizes on UDP port1700, while the actual RFC calls out using UDP port 3799.


Page 8 out of 126 Pages
Previous