Wednesday, 31 August 2016

Pass4sure 350-050 Question Answer

Corporation XYZ just underwent a third-party security audit. The auditors have required that the corporation implements 802.1x on its wireless network and disable all pre-shared key WLANs as soon as possible. XYZ does not have an internal CA installed to provide server certificates today. However, it wishes to implement an EAP method that requires clients to use server authentication in the future. XYZ also needs an EAP method that will allow both Active Directory user authentication and time-based tokens. What is the best EAP method for XYZ to implement? 

A. TTLS
B. PEAP
C. FAST
D. TLS

Answer: C

    Cisco 350-050 Test    350-029 Exam Questions    Cisco Practice Test Exams

Monday, 11 July 2016

Cisco Talos ties Angler disappearance to Russian arrests

Researchers at Cisco Talos believe the disappearance of the Angler exploit kit (EK) from the threat landscape may be a long-term situation and that its absence is most likely tied to the take down of a Russian gang by law enforcement in early June.

The reason Biasini believes Angler's disappearance this time is more permanent than when the EK fell of radar screens earlier this year is the fact that other criminal organizations have shifted over to using Neutrino, Rig and other EKs to deliver malware, something that did not happen the first time. These kits have also seen their rental price rise, a sign that demand has increased.

Talos also believes the recent fall off in use of the Necurs botnet, along with its associated Locky and Dridex malware, was also tied to the arrests.

“During the research back in February, we uncovered a couple of C2 domains associated with Necurs that were owned by this same John Bruggink registrant account. Around the same time Lurk went away and Angler disappeared so did the Necurs botnet,” Biasini said.

However, after a three week layoff Necurs is back in business delivering Locky and Dridex.

While admitting he is basing his conclusions on circumstantial evidence, Biasini believes the smoking gun is the Bruggink account.

“If this one group was running all of these activities this will likely go down as one of the most significant arrests in the history of cybercrime with a criminal organization that was easily earning hundreds of millions of dollars,” he said.

There is an unfortunate downside to this situation. Criminal activity abhors a vacuum and there is an excellent chance these threats will again raise their ugly heads as has happened in the past.

“The best evidence of this was the author of Blackhole exploit kit being arrested, for a time there was an arms race between exploit kits to see who would take the top spot. We expect the same thing to occur now as Angler and possibly Nuclear leave the threat landscape,” he concluded.

Wednesday, 8 June 2016

Pass4sure 350-050 Question Answer

Which of the following are required components for Client MFP? (Choose two.)

A. CCXv4
B. CCXv5
C. 802.11n
D. WPA2 w/TKIP or AES-CCMP
E. AnyConnect 3.0


Answer: B, D



Which of the following statements are true regarding RLDP? (Choose two) 

A. RLDP works only on APs configured in Open Authentication mode.
B. RLDP only works if the AP is in Monitor Mode.
C. RLDP will attempt to identify each Rogue AP only once.
D. RLDP only works if the Rogue AP is connected to a VLAN that is reachable by the WLC.
E. RLDP only works if the AP is in Local Mode.

Answer: A, D

Sunday, 8 May 2016

Pass4sure 350-050 Question Answer

Which three security threats require the Cisco Adaptive wIPS service for mitigation? (Choose three.) 

A. on/off-channel rogue
B. spectrum intelligence
C. man-in-the-middle attack
D. rogue switch-port tracing
E. zero-day attack
F. network reconnaissance

Answer: C, E, F

Tuesday, 5 April 2016

Pass4sure 350-050 Question Answer

You are designing an autonomous wireless network for an office building that is located near a local airport. The customer requires the use of 802.11a/n clients only, and the APs must never change their channel after they are configured. Which two UNII bands and channels should you restrict the APs to use on the 5 GHz radios? (Choose two.) 

A. UNII-1 and UNII-3
B. UNII-1 and UNII-2 extended
C. 36-52 and 149-161
D. 36-48 and 100-140
E. 52-64 and 149-161
F. 36-48 and 149-161

Answer: A, F                                                     


You have been hired to install an outdoor wireless network for a small city. The design must provide 360 degrees of coverage from a central location and at least 33 Mb/s of aggregate bandwidth for clause 18 radio clients. How do you design this solution? 

A. Three or more patch antennas installed in a circular pattern on the same supporting structure
B. One high-gain omni-directional antenna
C. Three or more parabolic dish antennas installed in a circular pattern on the same supporting structure
D. Three or more sector array antennas installed in a circular pattern on the same supporting structure
E. Three or more Yagi antennas installed in a circular pattern on the same supporting structure

Answer: D

Tuesday, 1 March 2016

Pass4sure 350-050 Question Answer

A clause 15 radio uses ___________ and supports data rates of ___________.
A. FHSS or DSSS, 1 Mb/s up to 11 Mb/s
B. DSSS, 1 Mb/s and 2 Mb/s
C. FHSS, 1 Mb/s and 2 Mb/s
D. DSSS, 1 Mb/s up to 11 Mb/s

Answer: B



_________ is classified as an 802.11i RSN with _________ as the mandatory encryption protocol.

A. WEP, TKIP
B. WPA2, TKIP
C. WPA, AES
D. WPA2, AES

Answer: D

Thursday, 28 January 2016

Pass4sure 350-050 Question Answer

You are converting your wireless infrastructure from a data-only design to a location services design. 
Which task do you need to complete?

A. Disable the DSSS speeds for RFID compatibility.
B. Use fewer APs to avoid RFID 3D imaging.
C. Set APs to maximum power for RF fingerprinting.
D. Locate APs at the edges of your coverage area for trilateration.

Answer: D

Which statement about heat maps on Cisco WCS is true?

A. They are predictive and rely only on the accuracy of the information that is provided with the map.
B. They are based on real-time actual values if Cisco Compatible Extensions is enabled on the APs.
C. They are predictive but can be converted to real values by using the Refresh from network button.
D. They are based on real-time actual values because of fingerprinting.

Answer: A