Which Talos reputation center allows for tracking the reputation of IP addresses for email and web traffic?
Answer(s): A
An engineer is configuring IPsec VPN and needs an authentication protocol that is reliable and supports ACKand sequence.Which protocol accomplishes this goal?
Answer(s): D
An administrator is establishing a new site-to-site VPN connection on a Cisco IOS router. The organization needs to ensure that the ISAKMP key on the hub is used only for terminating traffic from the IP address of172.19.20.24.Which command on the hub will allow the administrator to accomplish this?
Answer(s): B
The command "crypto isakmp identity address 172.19.20.24" is not valid. We can only use "crypto isakmp identity {address | hostname}. The following example uses preshared keys at two peers and sets both theirISAKMP identities to the IP address.At the local peer (at 10.0.0.1) the ISAKMP identity is set and the preshared key is specified:crypto isakmp identity address crypto isakmp key sharedkeystring address 192.168.1.33 At the remote peer (at 192.168.1.33) the ISAKMP identity is set and the same preshared key is specified:crypto isakmp identity address crypto isakmp key sharedkeystring address 10.0.0.1
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec- crc4.html#wp3880782430The command "crypto enrollment peer address" is not valid either. The command "crypto ca identity ..." is only used to declare a trusted CA for the router and puts you in the caidentity configuration mode. Also it should be followed by a name, not an IP address. For example: "crypto ca identity CA-Server" -> Answer A is not correct.Only answer B is the best choice left.
What is a difference between an XSS attack and an SQL injection attack?
Answer(s): C
In XSS, an attacker will try to inject his malicious code (usually malicious links) into a database.When other users follow his links, their web browsers are redirected to websites where attackers can steal data from them. In a SQL Injection, an attacker will try to inject SQL code (via his browser) into forms, cookies, or HTTP headers that do not use data sanitizing or validation methods of GET/POST parameters.
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A commented on January 16, 2024 Good Colombia Anonymous upvote
Kim commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES upvote
Our website is free, but we have to fight against bots and content theft. We're sorry for the inconvenience caused by these security measures. You can access the rest of the 350-701 content, but please register or login to continue.