Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-201 Topic 3 Question 68 Discussion

Actual exam question for Cisco's 350-201 exam
Question #: 68
Topic #: 3
[All 350-201 Questions]

A customer is using a central device to manage network devices over SNMPv2. A remote attacker caused a denial of service condition and can trigger this vulnerability by issuing a GET request for the ciscoFlashMIB OID on an affected device. Which should be disabled to resolve the issue?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Lina
1 months ago
This is a classic case of 'the problem is not the problem, the problem is your reaction to the problem.' Disable the whole network, that'll show them!
upvoted 0 times
Christene
2 days ago
D: Let's disable UDP small services as well just to be safe.
upvoted 0 times
...
Glory
9 days ago
C: We also need to disable port UDP 161 and 162.
upvoted 0 times
...
Kerrie
16 days ago
B: But what about TCP small services?
upvoted 0 times
...
Linwood
18 days ago
A: We should disable SNMPv2 to resolve the issue.
upvoted 0 times
...
...
Shannan
1 months ago
You know, if I were the attacker, I'd probably just try to use a different OID to trigger the vulnerability. Disabling the MIB seems like a Band-Aid solution.
upvoted 0 times
...
Noah
1 months ago
I disagree. Disabling the specific ports used by SNMP, 161 and 162, would be the most targeted approach. That way, you don't have to completely disable the protocol.
upvoted 0 times
Cassie
12 days ago
Agreed, disabling the ports would be a targeted approach to address the vulnerability.
upvoted 0 times
...
Leslie
15 days ago
I think disabling the specific ports used by SNMP, 161 and 162, would be more effective.
upvoted 0 times
...
Rosalyn
20 days ago
Disabling SNMPv2 would be the best option to resolve the issue.
upvoted 0 times
...
...
Cathrine
2 months ago
I'm not sure about that. Disabling TCP small services or UDP small services might be a better option. Those could also be contributing to the problem.
upvoted 0 times
Bettyann
1 months ago
User 3: What about disabling TCP small services or UDP small services? Could that also help?
upvoted 0 times
...
Eun
2 months ago
User 2: I agree, disabling SNMPv2 could help prevent the denial of service.
upvoted 0 times
...
Paris
2 months ago
User 1: I think we should disable SNMPv2 to resolve the issue.
upvoted 0 times
...
...
Xenia
2 months ago
Hmm, I think disabling SNMPv2 would be the best way to resolve this issue. It's the root cause of the vulnerability, so that's the logical solution.
upvoted 0 times
Annice
1 months ago
User 2: Yeah, that's the root cause of the vulnerability.
upvoted 0 times
...
Ceola
1 months ago
User 1: I agree, disabling SNMPv2 is the way to go.
upvoted 0 times
...
...
Mila
3 months ago
I'm not sure, but I think SNMPv2 should also be disabled to prevent further attacks.
upvoted 0 times
...
Truman
3 months ago
I agree with Denny, disabling those ports should resolve the issue.
upvoted 0 times
...
Denny
3 months ago
I think the answer is C) port UDP 161 and 162.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77