Free 350-701 Exam Braindumps (page: 5)

Page 4 of 153

Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?

  1. url
  2. terminal
  3. profile
  4. selfsigned

Answer(s): C

Explanation:

A trustpoint enrollment mode, which also defines the trustpoint authentication mode, can be performed via 3 main methods:
1. Terminal Enrollment ­ manual method of performing trustpoint authentication and certificate enrolment using copy-paste in the CLI terminal.
2. SCEP Enrollment ­ Trustpoint authentication and enrollment using SCEP over HTTP.
3. Enrollment Profile ­ Here, authentication and enrollment methods are defined separately. Along with terminal and SCEP enrollment methods, enrollment profiles provide an option to specify HTTP/TFTP commands to perform file retrieval from the Server, which is defined using an authentication or enrollment url under the profile.


Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/211333-IOSPKI-Deployment-Guide-Initial-Design.html



What are two rootkit types? (Choose two)

  1. registry
  2. virtual
  3. bootloader
  4. user mode
  5. buffer mode

Answer(s): C,D

Explanation:

The term `rootkit' originally comes from the Unix world, where the word `root' is used to describe a user with the highest possible level of access privileges, similar to an `Administrator' in Windows. The word `kit' refers to the software that grants root-level access to the machine. Put the two together and you get `rootkit', a program that gives someone ­ with legitimate or malicious intentions ­ privileged access to a computer. There are four main types of rootkits: Kernel rootkits, User mode rootkits, Bootloader rootkits, Memory rootkits



Which form of attack is launched using botnets?

  1. EIDDOS
  2. virus
  3. DDOS
  4. TCP flood

Answer(s): C

Explanation:

A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them.
Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.



Which threat involves software being used to gain unauthorized access to a computer system?

  1. virus
  2. NTP amplification
  3. ping of death
  4. HTTP flood

Answer(s): A






Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

350-701 Discussions & Posts