Cisco® 350-701 Exam Practice Questions (P. 3)
- Full Access (704 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
How does DNS Tunneling exfiltrate data?
- AAn attacker registers a domain that a client connects to based on DNS records and sends malware through that connection.Most Voted
- BAn attacker opens a reverse DNS shell to get into the client's system and install malware on it.
- CAn attacker sends an email to the target with hidden DNS resolvers in it to redirect them to a malicious domain.
- DAn attacker uses a non-standard DNS port to gain access to the organization's DNS servers in order to poison the resolutions.
Correct Answer:
A
A

The process of DNS tunneling for data exfiltration involves utilizing DNS queries and responses to covertly transfer data. Attackers establish a server and register a domain. Once malware is installed on a victim's computer, it uses DNS queries to communicate with the attacker-controlled server. These DNS requests, normally allowed through firewalls, carry encoded data to the domain where the server decodes it. This method effectively bypasses standard network defenses, making detection challenging. Essentially, it turns DNS into a channel for data leakage without establishing direct connections that can be easily traced.
send
light_mode
delete
Question #22
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
- Aunencrypted links for trafficMost Voted
- Bweak passwords for authentication
- Cimproper file security
- Dsoftware bugs on applications
Correct Answer:
A
A
send
light_mode
delete
Question #23
A user has a device in the network that is receiving too many connection requests from multiple machines. Which type of attack is the device undergoing?
send
light_mode
delete
Question #24
Which two preventive measures are used to control cross-site scripting? (Choose two.)
- AEnable client-side scripts on a per-domain basis.
- BIncorporate contextual output encoding/escaping.Most Voted
- CDisable cookie inspection in the HTML inspection engine.
- DRun untrusted HTML input through an HTML sanitization engine.Most Voted
- ESameSite cookie attribute should not be used.
Correct Answer:
BD
BD
send
light_mode
delete
Question #25
Which threat involves software being used to gain unauthorized access to a computer system?
send
light_mode
delete
Question #26
Which two capabilities does TAXII support? (Choose two.)
- AexchangeMost Voted
- Bpull messagingMost Voted
- Cbinding
- Dcorrelation
- Emitigating
Correct Answer:
AB
AB
send
light_mode
delete
Question #27
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
- AOnly the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.
- BThe active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
- CThe IPsec configuration that is set up on the active device must be duplicated on the standby device.Most Voted
- DOnly the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
- EThe active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.Most Voted
Correct Answer:
CE
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html
CE
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html
send
light_mode
delete
Question #28
Which algorithm provides encryption and authentication for data plane communication?
send
light_mode
delete
Question #29
DRAG DROP -
Drag and drop the capabilities from the left onto the correct technologies on the right.
Select and Place:

Drag and drop the capabilities from the left onto the correct technologies on the right.
Select and Place:

send
light_mode
delete
Question #30
Which two key and block sizes are valid for AES? (Choose two.)
- A64-bit block size, 112-bit key length
- B64-bit block size, 168-bit key length
- C128-bit block size, 192-bit key lengthMost Voted
- D128-bit block size, 256-bit key lengthMost Voted
- E192-bit block size, 256-bit key length
Correct Answer:
CD
Reference:
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
CD
Reference:
https://en.wikipedia.org/wiki/Advanced_Encryption_Standard
send
light_mode
delete
All Pages