350-701 Actual Exam Questions

Last updated on Dec. 10, 2024.
Vendor:Cisco
Exam Code:350-701
Exam Name:Implementing and Operating Cisco Security Core Technologies
Exam Questions:703
 

Topic 1 - Single Topic

Question #1 Topic 1

Which functions of an SDN architecture require southbound APIs to enable communication?

  • A. SDN controller and the network elements
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the cloud
Reveal Solution Hide Solution   Discussion   6

Correct Answer: A 🗳️

Question #2 Topic 1

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

  • A. put
  • B. options
  • C. get
  • D. push
  • E. connect
Reveal Solution Hide Solution   Discussion   9

Correct Answer: AC 🗳️

Question #3 Topic 1

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

  • A. SDN controller and the cloud
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the management solution
Reveal Solution Hide Solution   Discussion   11

Correct Answer: D 🗳️

Question #4 Topic 1

What is a feature of the open platform capabilities of Cisco DNA Center?

  • A. application adapters
  • B. domain integration
  • C. intent-based APIs
  • D. automation adapters
Reveal Solution Hide Solution   Discussion   3

Correct Answer: C 🗳️

Question #5 Topic 1


Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

  • A. create an SNMP pull mechanism for managing AMP
  • B. gather network telemetry information from AMP for endpoints
  • C. get the process and PID information from the computers in the network
  • D. gather the network interface information about the computers AMP sees
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #6 Topic 1

Which form of attack is launched using botnets?

  • A. TCP flood
  • B. DDOS
  • C. DOS
  • D. virus
Reveal Solution Hide Solution   Discussion   6

Correct Answer: B 🗳️

Question #7 Topic 1

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A. smurf
  • B. distributed denial of service
  • C. cross-site scripting
  • D. rootkit exploit
Reveal Solution Hide Solution   Discussion   9

Correct Answer: C 🗳️

Question #8 Topic 1

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A. user input validation in a web page or web application
  • B. Linux and Windows operating systems
  • C. database
  • D. web page images
Reveal Solution Hide Solution   Discussion   28

Correct Answer: A 🗳️

Question #9 Topic 1

What is the difference between deceptive phishing and spear phishing?

  • A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  • B. A spear phishing campaign is aimed at a specific person versus a group of people.
  • C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  • D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
Reveal Solution Hide Solution   Discussion   10

Correct Answer: B 🗳️

Question #10 Topic 1

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

  • A. The attack is fragmented into groups of 16 octets before transmission.
  • B. The attack is fragmented into groups of 8 octets before transmission.
  • C. Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D. Malformed packets are used to crash systems.
  • E. Publicly accessible DNS servers are typically used to execute the attack.
Reveal Solution Hide Solution   Discussion   8

Correct Answer: BD 🗳️
Reference:
https://en.wikipedia.org/wiki/Ping_of_death

file Viewing page 1 out of 71 pages.
Viewing questions 1-10 out of 703 questions
Next Questions
Browse atleast 50% to increase passing rate cup
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago