Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 1 out of 52 pages Questions 1-10 out of 515 questions
Question#1

Which functions of an SDN architecture require southbound APIs to enable communication?

  • A. SDN controller and the network elements
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the cloud
Discover Answer Hide Answer

A

Question#2

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

  • A. put
  • B. options
  • C. get
  • D. push
  • E. connect
Discover Answer Hide Answer

AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html

Question#3

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

  • A. SDN controller and the cloud
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the management solution
Discover Answer Hide Answer

D

Question#4

What is a feature of the open platform capabilities of Cisco DNA Center?

  • A. application adapters
  • B. domain integration
  • C. intent-based APIs
  • D. automation adapters
Discover Answer Hide Answer

C

Question#5


Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

  • A. create an SNMP pull mechanism for managing AMP
  • B. gather network telemetry information from AMP for endpoints
  • C. get the process and PID information from the computers in the network
  • D. gather the network interface information about the computers AMP sees
Discover Answer Hide Answer

D

Question#6

Which form of attack is launched using botnets?

  • A. TCP flood
  • B. DDOS
  • C. DOS
  • D. virus
Discover Answer Hide Answer

B

Question#7

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A. smurf
  • B. distributed denial of service
  • C. cross-site scripting
  • D. rootkit exploit
Discover Answer Hide Answer

C

Question#8

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A. user input validation in a web page or web application
  • B. Linux and Windows operating systems
  • C. database
  • D. web page images
Discover Answer Hide Answer

A
Reference:
https://tools.cisco.com/security/center/resources/sql_injection

Question#9

What is the difference between deceptive phishing and spear phishing?

  • A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  • B. A spear phishing campaign is aimed at a specific person versus a group of people.
  • C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  • D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
Discover Answer Hide Answer

B

Question#10

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

  • A. The attack is fragmented into groups of 16 octets before transmission.
  • B. The attack is fragmented into groups of 8 octets before transmission.
  • C. Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D. Malformed packets are used to crash systems.
  • E. Publicly accessible DNS servers are typically used to execute the attack.
Discover Answer Hide Answer

BD
Reference:
https://en.wikipedia.org/wiki/Ping_of_death

chevron rightPrevious Nextchevron right