Free 350-701 Exam Braindumps (page: 78)

Page 78 of 153

What is a difference between a DoS attack and a DDoS attack?

  1. A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where multiple systems target a single system with a DoS attack
  2. A DoS attack is where a computer is used to flood a server with TCP and UDP packets whereas a DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN
  3. A DoS attack is where a computer is used to flood a server with UDP packets whereas a DDoS attack is where a computer is used to flood a server with TCP packets
  4. A DoS attack is where a computer is used to flood a server with TCP packets whereas a DDoS attack is where a computer is used to flood a server with UDP packets

Answer(s): A



Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choose two)

  1. Upgrade software on switches and routers
  2. Third party reporting
  3. Connect to ITSM platforms
  4. Create new SSIDs on a wireless LAN controller
  5. Automatically deploy new virtual routers

Answer(s): B,C


Reference:

https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-platform- overview/integration-api-westbound



Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?

  1. Integration
  2. Intent
  3. Event
  4. Multivendor

Answer(s): B



What is the purpose of CA in a PKI?

  1. To issue and revoke digital certificates
  2. To validate the authenticity of a digital certificate
  3. To create the private key for a digital certificate
  4. To certify the ownership of a public key by the named subject

Answer(s): A

Explanation:

A trusted CA is the only entity that can issue trusted digital certificates. This is extremely important because while PKI manages more of the encryption side of these certificates, authentication is vital to understanding which entities own what keys. Without a trusted CA, anyone can issue their own keys, authentication goes out the window and chaos ensues.


Reference:

https://cheapsslsecurity.com/blog/understanding-the-role-of-certificate-authorities-in- pki/



Page 78 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote