Exams > Cisco > 350-701: Implementing and Operating Cisco Security Core Technologies
350-701: Implementing and Operating Cisco Security Core Technologies
Page 12 out of 52 pages Questions 111-120 out of 515 questions
Question#111

Which two mechanisms are used to control phishing attacks? (Choose two.)

  • A. Enable browser alerts for fraudulent websites.
  • B. Define security group memberships.
  • C. Revoke expired CRL of the websites.
  • D. Use antispyware software.
  • E. Implement email filtering techniques.
Discover Answer Hide Answer

AE

Question#112

Which attack is commonly associated with C and C++ programming languages?

  • A. cross-site scripting
  • B. water holing
  • C. DDoS
  • D. buffer overflow
Discover Answer Hide Answer

D
Reference:
https://en.wikipedia.org/wiki/Buffer_overflow

Question#113

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)

  • A. Check integer, float, or Boolean string parameters to ensure accurate values.
  • B. Use prepared statements and parameterized queries.
  • C. Secure the connection between the web and the app tier.
  • D. Write SQL code instead of using object-relational mapping libraries.
  • E. Block SQL code execution in the web application database login.
Discover Answer Hide Answer

AB
Reference:
https://en.wikipedia.org/wiki/SQL_injection

Question#114

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)

  • A. phishing
  • B. brute force
  • C. man-in-the-middle
  • D. DDOS
  • E. tear drop
Discover Answer Hide Answer

AB

Question#115

What are two rootkit types? (Choose two.)

  • A. registry
  • B. buffer mode
  • C. user mode
  • D. bootloader
  • E. virtual
Discover Answer Hide Answer

CD

Question#116

How is DNS tunneling used to exfiltrate data out of a corporate network?

  • A. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers
  • B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data
  • C. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network
  • D. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks
Discover Answer Hide Answer

B

Question#117

Which type of attack is social engineering?

  • A. trojan
  • B. MITM
  • C. phishing
  • D. malware
Discover Answer Hide Answer

C

Question#118

What are two DDoS attack categories? (Choose two.)

  • A. protocol
  • B. source-based
  • C. database
  • D. sequential
  • E. volume-based
Discover Answer Hide Answer

AE

Question#119

In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

  • A. man-in-the-middle
  • B. LDAP injection
  • C. insecure API
  • D. cross-site scripting
Discover Answer Hide Answer

A

Question#120

How does Cisco Advanced Phishing Protection protect users?

  • A. It utilizes sensors that send messages securely.
  • B. It uses machine learning and real-time behavior analytics.
  • C. It validates the sender by using DKIM.
  • D. It determines which identities are perceived by the sender.
Discover Answer Hide Answer

B

chevron rightPrevious Nextchevron right