Which type of attack is social engineering?
Answer(s): B
Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.
Which two key and block sizes are valid for AES? (Choose two)
Answer(s): C,D
The AES encryption algorithm encrypts and decrypts data in blocks of 128 bits (block size). It can do this using 128-bit, 192-bit, or 256-bit keys
Which two descriptions of AES encryption are true? (Choose two)
Answer(s): B,D
Which algorithm provides encryption and authentication for data plane communication?
Answer(s): A
The data plane of any network is responsible for handling data packets that are transported across the network.(The data plane is also sometimes called the forwarding plane.) Maybe this Qwants to ask about the encryption and authentication in the data plane of a SD-WAN network (but SD-WAN is not a topic of the SCOR 350-701 exam?). In the Cisco SD-WAN network for unicast traffic, data plane encryption is done by AES-256-GCM, a symmetrickey algorithm that uses the same key to encrypt outgoing packets and to decrypt incoming packets. Each router periodically generates an AES key for its data path (specifically, one key per TLOC) and transmits this key to the vSmart controller in OMP route packets, which are similar to IP route updates.
https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security- book/ security-overview.html
Post your Comments and Discuss Cisco® 350-701 exam with other Community members:
David A Commented on January 16, 2024 Good Colombia Anonymous
Kim Commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES