Free 350-701 Exam Braindumps (page: 6)

Page 5 of 153

Which type of attack is social engineering?

  1. trojan
  2. phishing
  3. malware
  4. MITM

Answer(s): B

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious web sites to solicit personal, often financial, information. Attackers may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem.



Which two key and block sizes are valid for AES? (Choose two)

  1. 64-bit block size, 112-bit key length
  2. 64-bit block size, 168-bit key length
  3. 128-bit block size, 192-bit key length
  4. 128-bit block size, 256-bit key length
  5. 192-bit block size, 256-bit key length

Answer(s): C,D

Explanation:

The AES encryption algorithm encrypts and decrypts data in blocks of 128 bits (block size). It can do this using 128-bit, 192-bit, or 256-bit keys



Which two descriptions of AES encryption are true? (Choose two)

  1. AES is less secure than 3DES.
  2. AES is more secure than 3DES.
  3. AES can use a 168-bit key for encryption.
  4. AES can use a 256-bit key for encryption.
  5. AES encrypts and decrypts a key three times in sequence.

Answer(s): B,D



Which algorithm provides encryption and authentication for data plane communication?

  1. AES-GCM
  2. SHA-96
  3. AES-256
  4. SHA-384

Answer(s): A

Explanation:

The data plane of any network is responsible for handling data packets that are transported across the network.
(The data plane is also sometimes called the forwarding plane.) Maybe this Qwants to ask about the encryption and authentication in the data plane of a SD-WAN network (but SD-WAN is not a topic of the SCOR 350-701 exam?). In the Cisco SD-WAN network for unicast traffic, data plane encryption is done by AES-256-GCM, a symmetrickey algorithm that uses the same key to encrypt outgoing packets and to decrypt incoming packets. Each router periodically generates an AES key for its data path (specifically, one key per TLOC) and transmits this key to the vSmart controller in OMP route packets, which are similar to IP route updates.


Reference:

https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/security- book/ security-overview.html






Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

350-701 Discussions & Posts