PrepAway - Latest Free Exam Questions & Answers

Category: 300-735

Exam 300-735: Automating Cisco Security Solutions (SAUTO)

Which of the following could be best described as an advanced persistent attack? (Select the best answer.)

Which of the following could be best described as an advanced persistent attack? (Select the best answer.) A. a DDoS attack B. Operation Aurora C. the Heartbleed vulnerability D. POODLE Explanation: Of the available choices, Operation Aurora could be best described as an advanced persistent threat. An advanced persistent threat is an intrusion in which […]

Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match t

Which of the following is most likely to indicate that the configured main mode ISAKMP policy does not match the policy proposed by the remote peer? (Select the best answer.) A. AG_NO_STATE B. MM_NO_STATE C. AG_AUTH D. MM_KEY_AUTH E. QM_IDLE Explanation: Of the available choices, the MM_NO_STATE state is most likely to indicate that the […]

Which of the following is true? (Select the best answer.)

You issue the show ntp associations detail command on Router2 and receive the following output: Router2#show ntp associations detail 10.0.12.1 configured, authenticated, our_master, sane, valid, stratum 3 ref ID 127.127.1.1, time BF6C06E0.55040FD5 (09:02:04.717 UTC Thu Jul 25 2013) Which of the following is true? (Select the best answer.) A. Router2 has successfully authenticated the NTP […]

EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the bes

EAPFASTv2 implemented a requirement to support which of the following cryptographic protocols? (Select the best answer.) A. TLS 1.0 B. TLS 1.1 C. TLS 1.2 D. TLS 1.3 Explanation: Extensible Authentication ProtocolFlexible Authentication via Secure Tunneling Version 2 (EAPFASTv2) implemented a requirement to support Transport Layer Security (TLS) 1.2. EAPFAST is an authentication protocol that […]

The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You i

The Serial 0/0 interfaces on Router1 and Router2 are directly connected on the 192.168.51.48/30 network. You issue the following commands on Router1: interface serial 0/0 ip ospf authenticationkey b0s0n router ospf 1 routerid 1.1.1.1 network 10.10.10.0 0.0.0.255 area 1 network 192.168.51.48 0.0.0.3 area 1 area 0 authentication You issue the following commands on Router2: interface […]

Which of the following is a type of phishing attack that specifically targets highranking corporate executives

Which of the following is a type of phishing attack that specifically targets highranking corporate executives? (Select the best answer.) A. vishing B. pharming C. whaling D. dumpster diving Explanation: Whaling is a type of spear phishing attack used to retrieve sensitive information from highranking executives of a corporation. Phishing is a social engineering technique […]

Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.)

Which of the following traffic can be statefully inspected by Cisco IOS ZFW? (Select the best answer.) A. IPv6 unicast traffic B. IPv6 multicast traffic C. IPv4 unicast traffic D. IPv4 multicast traffic Explanation: In a Cisco IOS zonebased policy firewall (ZFW) configuration, IP version 4 (IPv4) unicast traffic can be statefully inspected. As of […]


Page 1 of 3123