Cisco (300-735-SAUTO) Exam Questions And Answers page 4
Which algorithms are asymmetric? (Choose 3 options)
Multiple Choice
Which of the following are asymmetric algorithms? (Select 3 choices.)
AES
3DES
ECC
RC4
RSA
Understanding Security Automation and Programmability
Python Programming for Security Automation
Which of the following are not considered NGE cryptographic algorithms and should be avoided according to Cisco? (Select 2 choices.)
DH768
SHA256
ECDH384
SHA512
DH1024
Understanding Security Automation and Programmability
Automating Cisco Security Solutions with APIs
Which of the following are not default values in an IKE policy on an ASA running software version 8.4 or higher? (Select 2 choices.)
PSKbased authentication method
168bit DES encryption algorithm
1024bit DH group
MD5 hash algorithm
14,400second lifetime
Automating Cisco Security Solutions with APIs
Automating Security Policies and Network Device Configurations
Which encryption algorithms are symmetric? (Choose 3 options)
Multiple Choice
Which of the following are symmetric encryption algorithms? (Select 3 choices.)
AES
RC4
3DES
ECC
DH
DSA
Understanding Security Automation and Programmability
Python Programming for Security Automation
Which of the following authentication methods are supported by both RADIUS and TACACS+ server groups on a Cisco ASA firewall? (Select 3 choices.)
ASCII
CHAP
MSCHAPv1
MSCHAPv2
PAP
Automating Cisco Security Solutions with APIs
Automating Security Policies and Network Device Configurations
Which authentication method is not used with OSPFv3?
Single Choice
Which of the following authentication methods is not used with OSPFv3? (Select the best answer.)
plaintext
MD5
SHA1
IPv6 IPSec
Understanding Security Automation and Programmability
Python Programming for Security Automation
What is the best description of a MAC spoofing attack?
Single Choice
Which of the following best describes a MAC spoofing attack? (Select the best answer.)
using GARP messages to associate an attacker's MAC address with the IP address of a valid host on the network
sending forged frames with the intention of overwhelming a switch's CAM table
replacing the IP address of a legitimate website with the IP address of a malicious website
using the MAC address of another host on the network in order to bypass port security measures
Understanding Security Automation and Programmability
Python Programming for Security Automation
What is the best description of an external cloud?
Single Choice
Which of the following best describes an external cloud? (Select the best answer.)
decentralized computer resources that can be accessed over the Internet
a network zone between the Internet and a private or trusted network
a portion of a private or trusted network that can be accessed by a business partner
websites available only to users inside a private network
Understanding Security Automation and Programmability
Automating Security Policies and Network Device Configurations
What is the purpose of SNMP?
Single Choice
Which of the following best describes the purpose of SNMP? (Select the best answer.)
to manage network devices
to send email
to create VPNs
to transfer files
Automating Security Policies and Network Device Configurations
Automating Security Monitoring and Incident Response
Which of the following can be configured on the General screen of the Add Internal Group Policy dialog box in ASDM when creating a group policy for clientless SSL VPN users? (Select 3 choices.)
a banner message for VPN clients
the bookmark list to apply to VPN clients
the tunneling protocols that clients can use to establish a VPN connection
the name of the group policy
a group URL that VPN users can access
the portal customization object to apply to VPN connections
Python Programming for Security Automation
Automating Cisco Security Solutions with APIs
Comments