Refer to the exhibit.A network administrator configures command authorization for the admin5 user.What is the admin5user able to do on HQ_Router after this configuration?
Answer(s): B
The user "admin5" was configured with privilege level 5. In order to allow configuration (enter global configuration mode), we must type this command:(config)#privilege exec level 5 configure terminalWithout this command, this user cannot do any configuration. Note: Cisco IOS supports privilege levels from 0 to 15, but the privilege levels which are used by default are privilege level 1 (user EXEC) and level privilege 15 (privilege EXEC)
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.Which command achieves this goal?
Answer(s): A
The command "snmp-server user user-name group-name [remote ip-address [udp-port port]] {v1 | v2c | v3 [encrypted] [auth {md5 | sha} auth-password]} [access access-list]" adds a new user (in this case "andy") to an SNMPv3 group (in this case group name "myv3") and configures a password for the user.In the "snmp-server host" command, we need to:+ Specify the SNMP version with key word "version {1 | 2 | 3}" + Specify the username ("andy"), not group name ("myv3"). Note: In "snmp-server host inside ..." command, "inside" is the interface name of the ASA interface through which the NMS (located at 10.255.254.1) can be reached.
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
The telemetry information consists of three types of data:+ Flow information: This information contains details about endpoints, protocols, ports, when the flow started,how long the flow was active, etc.+ Interpacket variation: This information captures any interpacket variations within the flow.Examples include variation in Time To Live (TTL), IP and TCP flags, payload length, etc + Context details: Context information is derived outside the packet header. It includes details about variation in buffer utilization, packet drops within a flow, association with tunnel endpoints, etc.
https://www.cisco.com/c/dam/global/en_uk/products/switches/ cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf
How is ICMP used an exfiltration technique?
Answer(s): C
Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?
DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNSqueries and responses. DNS tunneling often includes data payloads that can be added to an attacked DNSserver and used to control a remote server and applications.
Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members:
Our website is free, but we have to fight against AI bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.