試験の準備方法-効率的な350-701過去問無料試験-最新な350-701復習教材最高の350-701テストトレントを提供する世界的なリーダーとして、私たちは大多数の消費者に包括的なサービスを提供し、統合サービスの構築に努めています。さらに、350-701認定トレーニングアプリケーションだけでなく、インタラクティブな共有およびアフターサービスでもブレークスルーを達成しました。実際のところ、当社では、すべてのクライアントの適切なソリューションの問題を考慮しています。ヘルプが必要な場合は、350-701試験トレントに関する問題に対処するための即時サポートを提供し、350-701試験の合格を支援します。 Cisco Implementing and Operating Cisco Security Core Technologies 認定 350-701 試験問題 (Q273-Q278):質問 # 273
Which firewall mode does a Cisco Adaptive Security Appliance use to inspect Layer 2 traffic?
A. Passive
B. Transparent
C. Inline
D. Routed
正解:B
質問 # 274
A network administrator is configuring a switch to use Cisco ISE for 802.1X. An endpoint is failing authentication and is unable to access the network. Where should the administrator begin troubleshooting to verify the authentication details?
A. Accounting Reports
B. Adaptive Network Control Policy List
C. Context Visibility
D. RADIUS Live Logs
正解:D
解説:
Explanation:
How To Troubleshoot ISE Failed Authentications & Authorizations
Check the ISE Live Logs
Login to the primary ISE Policy Administration Node (PAN).
Go to Operations > RADIUS > Live Logs
(Optional) If the event is not present in the RADIUS Live Logs, go to Operations > Reports > Reports > Endpoints and Users > RADIUS Authentications Check for Any Failed Authentication Attempts in the Log
Reference: https://community.cisco.com/t5/s ... leshoot-ise-failed- authenticationsamp/ta-p/3630960
質問 # 275
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used.
However, the connection is failing. Which action should be taken to accomplish this goal?
A. Generate the RSA key using the crypto key generate rsa command.
B. Disable telnet using the no ip telnet command.
C. Configure the port using the ip ssh port 22 command.
D. Enable the SSH server using the ip ssh server command.
正解:A
解説:
ExplanationExplanationIn this question, the engineer was trying to secure the connection so maybe he was trying to allow SSH to the device. But maybe something went wrong so the connection was failing (the connection used to be good). So maybe he was missing the "crypto key generate rsa" command.
質問 # 276
What is the role of Cisco Umbrella Roaming when it is installed on an endpoint?
A. To enforce posture compliance and mandatory software
B. To protect the endpoint against malicious file transfers
C. To ensure that assets are secure from malicious links on and off the corporate network
D. To establish secure VPN connectivity to the corporate network
正解:C
解説:
Explanation
Umbrella Roaming is a cloud-delivered security service for Cisco's next-generation firewall. It protects your employees even when they are off the VPN.
質問 # 277
An attacker needs to perform reconnaissance on a target system to help gain access to it. The system has weak passwords, no encryption on the VPN links, and software bugs on the system's applications. Which vulnerability allows the attacker to see the passwords being transmitted in clear text?
A. unencrypted links for traffic
B. software bugs on applications
C. improper file security
D. weak passwords for authentication
正解:A
解説:
The vulnerability that allows the attacker to see the passwords being transmitted in clear text is the lack of encryption on the VPN links. Encryption is a process of transforming data into an unreadable form, so that only authorized parties can access it. VPN (Virtual Private Network) is a technology that creates a secure tunnel between two or more devices over a public network, such as the Internet. VPN links should be encrypted to prevent eavesdropping, tampering, or spoofing of the data that passes through them. If the VPN links are not encrypted, an attacker can use a packet sniffer to intercept and read the data, including the passwords, that are sent over the network. This is called a sniffing attack, and it can lead to credential theft, identity spoofing, or data manipulation. Therefore, VPN links should always use strong encryption protocols, such as IPsec or SSL/TLS, to protect the confidentiality and integrity of the data. References := Some possible references are:
* Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0 - Cisco: This is the official course page for the SCOR 350-701 exam, which covers the topics of implementing and operating Cisco security core technologies. It provides the course objectives, outline, duration, and prerequisites. It also offers various learning options, such as instructor-led training, e-learning, and practice exams.
* SCOR 350-701 Official Cert Guide - Cisco Press: This is the official study guide for the SCOR 350-701 exam, written by Omar Santos, a principal engineer at Cisco's Security Research and Operations group.
It covers all the exam topics in depth, with explanations, examples, exercises, and practice questions. It also includes a companion website with online resources, such as videos, quizzes, flashcards, and more.
* Cleartext submission of password - PortSwigger: This is a web security article that explains the vulnerability of transmitting passwords over unencrypted connections, and how to exploit it using Burp Suite, a web application testing tool. It also provides some remediation advice, such as using HTTPS and HSTS to enforce encryption.
* What Are Sniffing Attacks, and How Can You Protect Yourself? - EC-Council: This is a blog post that describes what sniffing attacks are, how they work, and what are the common types and tools of sniffing attacks. It also provides some tips on how to prevent or detect sniffing attacks, such as using encryption, VPN, firewall, IDS, and anti-sniffing software.
* OWASP Application Security FAQ | OWASP Foundation: This is a frequently asked questions page about application security, maintained by the Open Web Application Security Project (OWASP), a non-profit organization that promotes web security awareness and best practices. It covers various topics, such as authentication, authorization, session management, input validation, output encoding, cryptography, error handling, logging, and more.