Free 350-701 Exam Braindumps (page: 52)

Page 52 of 153

Which two cryptographic algorithms are used with IPsec? (Choose two)

  1. AES-BAC
  2. AES-ABC
  3. HMAC-SHA1/SHA2
  4. Triple AMC-CBC
  5. AES-CBC

Answer(s): C,E

Explanation:

Cryptographic algorithms defined for use with IPsec include:

+ HMAC-SHA1/SHA2 for integrity protection and authenticity.
+ TripleDES-CBC for confidentiality
+ AES-CBC and AES-CTR for confidentiality.
+ AES-GCM and ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.



In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

  1. LDAP injection
  2. man-in-the-middle
  3. cross-site scripting
  4. insecure API

Answer(s): B



Which Dos attack uses fragmented packets to crash a target machine?

  1. smurf
  2. MITM
  3. teardrop
  4. LAND

Answer(s): C

Explanation:

A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation reassembly, the packets overlap one another, crashing the target network device. This generally happens on older operating systems such as Windows 3.1x, Windows 95, Windows NT and versions of the Linux kernel prior to 2.1.63.



Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

  1. to prevent theft of the endpoints
  2. because defense-in-depth stops at the network
  3. to expose the endpoint to more threats
  4. because human error or insider threats will still exist

Answer(s): D



Page 52 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote