Cisco 350-701 Exam
Implementing and Operating Cisco Security Core Technologies (Page 71 )

Updated On: 7-Feb-2026

Refer to the exhibit.



A network administrator configures command authorization for the admin5 user.
What is the admin5

user able to do on HQ_Router after this configuration?

  1. set the IP address of an interface
  2. complete no configurations
  3. complete all configurations
  4. add subinterfaces

Answer(s): B

Explanation:

The user "admin5" was configured with privilege level 5. In order to allow configuration (enter global configuration mode), we must type this command:
(config)#privilege exec level 5 configure terminal
Without this command, this user cannot do any configuration.
Note: Cisco IOS supports privilege levels from 0 to 15, but the privilege levels which are used by default are privilege level 1 (user EXEC) and level privilege 15 (privilege EXEC)



A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.
Which command achieves this goal?

  1. snmp-server host inside 10.255.254.1 version 3 andy
  2. snmp-server host inside 10.255.254.1 version 3 myv3
  3. snmp-server host inside 10.255.254.1 snmpv3 andy
  4. snmp-server host inside 10.255.254.1 snmpv3 myv3

Answer(s): A

Explanation:

The command "snmp-server user user-name group-name [remote ip-address [udp-port port]] {v1 | v2c | v3 [encrypted] [auth {md5 | sha} auth-password]} [access access-list]" adds a new user (in this case "andy") to an SNMPv3 group (in this case group name "myv3") and configures a password for the user.
In the "snmp-server host" command, we need to:
+ Specify the SNMP version with key word "version {1 | 2 | 3}" + Specify the username ("andy"), not group name ("myv3").
Note: In "snmp-server host inside ..." command, "inside" is the interface name of the ASA interface through which the NMS (located at 10.255.254.1) can be reached.



Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?

  1. interpacket variation
  2. software package variation
  3. flow insight variation
  4. process details variation

Answer(s): A

Explanation:

The telemetry information consists of three types of data:
+ Flow information: This information contains details about endpoints, protocols, ports, when the flow started,
how long the flow was active, etc.
+ Interpacket variation: This information captures any interpacket variations within the flow.
Examples include variation in Time To Live (TTL), IP and TCP flags, payload length, etc + Context details: Context information is derived outside the packet header. It includes details about variation in buffer utilization, packet drops within a flow, association with tunnel endpoints, etc.


Reference:

https://www.cisco.com/c/dam/global/en_uk/products/switches/ cisco_nexus_9300_ex_platform_switches_white_paper_uki.pdf



How is ICMP used an exfiltration technique?

  1. by flooding the destination host with unreachable packets
  2. by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address
  3. by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host
  4. by overwhelming a targeted host with ICMP echo-request packets

Answer(s): C



Which exfiltration method does an attacker use to hide and encode data inside DNS requests and queries?

  1. DNS tunneling
  2. DNSCrypt
  3. DNS security
  4. DNSSEC

Answer(s): A

Explanation:

DNS Tunneling is a method of cyber attack that encodes the data of other programs or protocols in DNS
queries and responses. DNS tunneling often includes data payloads that can be added to an attacked DNS
server and used to control a remote server and applications.



Viewing page 71 of 123
Viewing questions 351 - 355 out of 727 questions



Post your Comments and Discuss Cisco 350-701 exam prep with other Community members:

Join the 350-701 Discussion