Free 350-701 Exam Braindumps (page: 80)

Page 80 of 153

When choosing an algorithm to us, what should be considered about Diffie Hellman and RSA for key establishment?

  1. RSA is an asymmetric key establishment algorithm intended to output symmetric keys
  2. RSA is a symmetric key establishment algorithm intended to output asymmetric keys
  3. DH is a symmetric key establishment algorithm intended to output asymmetric keys
  4. DH is an asymmetric key establishment algorithm intended to output symmetric keys

Answer(s): D

Explanation:

Diffie Hellman (DH) uses a private-public key pair to establish a shared secret, typically a symmetric key. DH is not a symmetric algorithm ­ it is an asymmetric algorithm used to establish a shared secret for a symmetric key algorithm.



Which type of DNS abuse exchanges data between two computers even when there is no direct connection?

  1. Malware installation
  2. Command-and-control communication
  3. Network footprinting
  4. Data exfiltration

Answer(s): D

Explanation:

Malware installation: This may be done by hijacking DNS queries and responding with malicious IP addresses.
Command & Control communication: As part of lateral movement, after an initial compromise, DNS communications is abused to communicate with a C2 server. This typically involves making periodic DNS
queries from a computer in the target network for a domain controlled by the adversary. The responses contain encoded messages that may be used to perform unauthorized actions in the target network.
Network footprinting: Adversaries use DNS queries to build a map of the network. Attackers live off the terrain so developing a map is important to them.

Data theft (exfiltration): Abuse of DNS to transfer data; this may be performed by tunneling other protocols like FTP, SSH through DNS queries and responses. Attackers make multiple DNS queries from a compromised computer to a domain owned by the adversary. DNS tunneling can also be used for executing commands and transferring malware into the target network.


Reference:

https://www.netsurion.com/articles/5-types-of-dns-attacks-and-how-to-detect-them



What is a difference between GETVPN and IPsec?

  1. GETVPN reduces latency and provides encryption over MPLS without the use of a central hub
  2. GETVPN provides key management and security association management
  3. GETVPN is based on IKEv2 and does not support IKEv1
  4. GETVPN is used to build a VPN network with multiple sites without having to statically configure all devices

Answer(s): C



What is a benefit of using telemetry over SNMP to configure new routers for monitoring purposes?

  1. Telemetry uses a pull mehod, which makes it more reliable than SNMP
  2. Telemetry uses push and pull, which makes it more scalable than SNMP
  3. Telemetry uses push and pull which makes it more secure than SNMP
  4. Telemetry uses a push method which makes it faster than SNMP

Answer(s): D

Explanation:

SNMP polling can often be in the order of 5-10 minutes, CLIs are unstructured and prone to change which can often break scripts.
The traditional use of the pull model, where the client requests data from the network does not scale when what you want is near real-time data.
Moreover, in some use cases, there is the need to be notified only when some data changes, like interfaces status, protocol neighbors change etc.
Model-Driven Telemetry is a new approach for network monitoring in which data is streamed from network devices continuously using a push model and provides near real-time access to operational statistics. Referfence: https://developer.cisco.com/docs/ios-xe/#!streaming-telemetry-quick-start- guide/streaming telemetry



Page 80 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote