exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 159 discussion

Actual exam question from Cisco's 350-701
Question #: 159
Topic #: 1
[All 350-701 Questions]

Which risk is created when using an Internet browser to access cloud-based service?

  • A. misconfiguration of Infra, which allows unauthorized access
  • B. intermittent connection to the cloud connectors
  • C. vulnerabilities within protocol
  • D. insecure implementation of API
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
zheka
Highly Voted 3 years, 4 months ago
Disagree with protocol vulnerabilities. The answer is about insecure implementation of API https://www.imperva.com/blog/top-10-cloud-security-concerns/
upvoted 8 times
dummyy
3 years, 2 months ago
API and Internet Browser? Definetly not!
upvoted 4 times
[Removed]
1 year, 2 months ago
REST API and Internet Browser with Javascript and JSON? Definitely yes!
upvoted 2 times
...
Iarn
2 years, 12 months ago
Agreed as stated the user is using a Web browser thus it cannot be API, the correct answer is C
upvoted 5 times
...
...
...
madboy2
Most Recent 1 month, 1 week ago
Selected Answer: C
When using an Internet browser to access cloud-based services, the primary risk is vulnerabilities within the communication protocols (e.g., HTTP, HTTPS, TLS, or WebSockets). Attackers can exploit these vulnerabilities through man-in-the-middle (MITM) attacks, SSL/TLS weaknesses, or browser-based exploits.
upvoted 1 times
...
kloug
6 months ago
Answer c
upvoted 1 times
...
Premium_Pils
8 months, 2 weeks ago
Selected Answer: D
I think it is about securing APIs. A web API can be accessed via web browser. https://stackoverflow.com/questions/29105007/how-to-make-basic-rest-api-calls-using-a-browser
upvoted 1 times
...
4pelos
1 year, 1 month ago
Correct answer C. Checked with securitytut
upvoted 1 times
...
xziomal9
1 year, 5 months ago
Answer D
upvoted 1 times
...
zamkljo
1 year, 10 months ago
Selected Answer: D
insecure API: A malicious user gained access to an organization's database from a cloud-base application programming interface that lacked strong authentication control. (from 350 - 701 practice exam)
upvoted 2 times
...
stalkr3
2 years ago
another showcase question why Cisco exams are utter garbage.
upvoted 3 times
...
Tuxzinator
2 years, 2 months ago
Selected Answer: C
Vulnerabilities within protocol: Cross-site scripting (XSS) vulnerabilities: These allow attackers to inject malicious scripts into web pages viewed by other users.
upvoted 4 times
...
Zatingke
2 years, 2 months ago
Selected Answer: D
Should be D. A poorly designed or implemented API could allow users accessing confidential data unintentionally, e.g. with a typo in the address box of a browser. A. Wrong. Misconfiged infra, not specificly vulnerable to browsers B. Wrong. not that significant, although it is an availability issue in security perspective, but also nothing to do with a browser. C. Wrong, vulnerable within protocol? then which protocol? specific to a browser? then should be http or https, however, that also affects non-cloud-based services as well, right?
upvoted 2 times
...
Emlia1
2 years, 4 months ago
I prefer C
upvoted 1 times
...
FortiSherlock
2 years, 8 months ago
Selected Answer: A
VM might be publicly reachable and WebUI is weakly protected by a default password like Cisco123.
upvoted 1 times
...
NikoNiko
2 years, 9 months ago
A - Misconfiguration of Infra, which leads to unauthorized access is CORRECT for me --> it joins 2 most often security issues of public cloud in one answer (see link below) Question states BROWSER so API is probably not an option (D). Vulnerabilities within protocol (C) - this is not specific to cloud, PROTOCOLS are being used everywhere and they are years old tuned standards with minimum vulnerabilities. Option B - connection stability (?) --> means service availability, which is also security aspect but it is not such a big issue as option A and networks are reliable today (risk is DoS / DDoS but they are not asking about it). A is correct. https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/top-cloud-security-issues-threats-and-concerns/
upvoted 3 times
FortiSherlock
2 years, 8 months ago
That is also my answer. You are responsible for configuring users and authentication / authorization for your Cloud, so if you do that in a dumb way it is insecure. Your AWS instances might be publicly reachable for SSL with a Cisco123 password - what do you think ?
upvoted 2 times
...
...
Sparrsh
3 years ago
Answer is D Vulnerabilities within protocols that can expose confidential data
upvoted 2 times
Iarn
2 years, 12 months ago
Vulnerabilities within protocols that can expose confidential data. That is C! not D
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago