exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 71 discussion

Actual exam question from Cisco's 350-701
Question #: 71
Topic #: 1
[All 350-701 Questions]

What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?

  • A. authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
  • B. authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
  • C. authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
  • D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Ampersand
Highly Voted 4 years, 1 month ago
B is correct. When you use “address” it is referring to the remote peer you share the key with. If you want to add more than 1 ip add, you will have to use group key.
upvoted 17 times
nospampls
3 years, 8 months ago
C is correct did this ins GNS3 R1(config)#crypto isakmp key 123123 address 172.16.0.0 R1(config)#end R1#show crypto isakmp key Keyring Hostname/Address Preshared Key default 172.16.0.0 [255.255.0.0] 123123 same as Seawanderer did
upvoted 16 times
kwong328
2 years, 1 month ago
You are correct, I have verified in IOU. because the command "crypto isakmp key ciscXXXXXXXX address 172.16.0.0" did not specified the mask, the router will take is as /16, unless you specify the mask as "crypto isakmp key ciscXXXXXXXX address 172.16.0.0 255.255.255.0", the router will take it as /24.
upvoted 3 times
...
jaciro11
3 years, 4 months ago
Man this is not true....
upvoted 4 times
...
...
...
thefiresays
Highly Voted 4 years, 1 month ago
It's weird that they used a network address, but this command authenticates a single VPN peer. Leaving B correct.
upvoted 10 times
loiphin
3 years, 4 months ago
This is not always a network address.... for example on this subnet 172.16.4.0/23, 172.16.5.0 is a valid IP address, and nothing to do with network address. It just looks weird because people tend to subnet on /24's mostly.
upvoted 4 times
...
...
willroute
Most Recent 5 months, 1 week ago
C is correct. https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios/218432-configure-a-site-to-site-ipsec-ikev1-tun.html....ikev1 is key....no pun intended....ikev2 diff, see below. https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118652-configure-asa-00.html
upvoted 1 times
...
luismg
7 months, 3 weeks ago
Selected Answer: C
it is an IKE v1 command so the answer is C
upvoted 1 times
...
Rockbo47
8 months, 2 weeks ago
Selected Answer: C
isakmp command refers to IKEv1 and without specifying a mask it will use the default classful mask which in this case would be 255.255.0.0 for 172.16.0.0. So answer C is absolutely the correct answer. nospampls also demonstrates this with output.
upvoted 1 times
...
c3qu1
1 year, 1 month ago
C is correct, the command crypto isakmp key ciscXXXXXXXX address 172.16.0.0 0.0.255.255 authenticates IKEv1 peers in the 172.16.0.0/16 range by using the preshared key ciscXXXXXXXX.
upvoted 1 times
...
xziomal9
1 year, 5 months ago
Selected Answer: C
Answer C
upvoted 2 times
...
squirrel49
1 year, 6 months ago
Selected Answer: C
The command crypto isakmp key you provided is related to IKEv1, not IKEv2. IKEv1 (Internet Key Exchange version 1) is configured using crypto isakmp commands, whereas IKEv2 (Internet Key Exchange version 2) is configured using crypto ikev2 commands. If you want to configure a pre-shared key for IKEv1, the crypto isakmp key command is used as shown in your original question. If you want to configure a pre-shared key for IKEv2, you would use crypto ikev2 keyring and crypto ikev2 profile commands. The distinction is important because the two versions of IKE have different configurations and characteristics. So IMHO - C is the right answer!
upvoted 2 times
...
RafaelSTI
1 year, 8 months ago
C is correct, o IOS assumes a /16 mask if you omit the mask, like when you put at the and 0.0.0.0 and the IOS assumes a /0 mask (any). I test in the lab: ... Router(config)# crypto isakmp key Mudar@123 address 172.16.0.0 Router(config)#do show crypto isakmp key Keyring Hostname/Address Preshared Key default 172.16.0.0 [255.255.0.0] Mudar@123 Router(config)#
upvoted 3 times
...
nep1019
1 year, 8 months ago
Selected Answer: B
Some of you are overthinking this. Go here: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfike.html#wp1017897 Search: crypto isakmp key and read. When you enter the peer using address, the mask is optional if you want to specify the subnet. If you specify no subnet then the address is to a single peer. In this case, 172.16.0.0/32 leaving B the only correct answer.
upvoted 1 times
nep1019
1 year, 8 months ago
Explanation from the source: mask (Optional) Specify the subnet address of the remote peer. (The argument can be used only if the remote peer ISAKMP identity was set with its IP address.)
upvoted 1 times
...
...
fdl543
1 year, 9 months ago
Selected Answer: B
B Is always correct. Using IKEv1 or IKEv2. C will fail if I use IKEv2...
upvoted 1 times
...
wizzlewazzle
1 year, 10 months ago
With the address keyword, you can also use the mask argument to indicate the remote peer ISAKMP identity will be established using the preshared key only. If the mask argument is used, preshared keys are no longer restricted between two users. Note If you specify mask, you must use a subnet address. (The subnet address 0.0.0.0 is not recommended because it encourages group preshared keys, which allow all peers to have the same group key, thereby reducing the security of your user authentication.)
upvoted 1 times
...
G33
1 year, 10 months ago
C is correct Apart from reasons already given by other C campaigners ikev2 uses a different format for keys crypto ikev2 keyring IKEv2-KEYRING peer 1.2.3.4 address 1.2.3.4 pre-shared-key cisco123 apart from that whe you actually run the command in a lab it results in 172.16.0.0 [255.255.0.0] It assumes a subnet for anything that ends in .0
upvoted 2 times
...
Kromwall
1 year, 10 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
gc999
1 year, 11 months ago
Selected Answer: B
This question is tricky, it is testing the concept I believe. According to the CLI, it should be "peer". In Option B, it is 172.16.0.0/32 "peer", but in Option C, it is 172.16.0.0 "range". No matter then can be reachable, I will select the one with "peer".
upvoted 1 times
...
haiderzaid
2 years ago
B "If the mask argument is used, preshared keys are no longer restricted between two users" so its restricted to 172.16.0.0 https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfike.html
upvoted 1 times
haiderzaid
2 years ago
i tested it on a real router and the output was Keyring Hostname/Address Preshared Key default 172.16.0.0 [255.255.0.0] cisco but if i use 172.0.0.1 Keyring Hostname/Address Preshared Key default 172.16.0.1 cisco weird thing , not B
upvoted 2 times
...
...
angry
2 years, 1 month ago
C is the correct answer!
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago