Download Cisco.350-701.CertDumps.2021-02-11.160q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Cisco.350-701.CertDumps.2021-02-11.160q.vcex
Size 2 MB
Posted Feb 11, 2021
Download Cisco.350-701.CertDumps.2021-02-11.160q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which attack is commonly associated with C and C++ programming languages?


  1. cross-site scriptingwrong
  2. DDoS
  3. buffer overflow
  4. water holing
Correct answer: C



Question 2

What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?


  1. SMTPwrong
  2. pxGrid
  3. STIX
  4. XMPP
Correct answer: C



Question 3

Which two preventive measures are used to control cross-site scripting? (Choose two)


  1. Disable cookie inspection in the HTML inspection engine.wrong
  2. Incorporate contextual output encoding/escaping
  3. Enable client-side scripts on a per-domain basis
  4. Run untrusted HTML input through an HTML sanitization engine.
  5. Same Site cookie attribute should not be used.
Correct answer: BC



Question 4

Which two mechanisms are used to control phishing attacks? (Choose two)


  1. Use antispyware software.wrong
  2. Implement email filtering techniques.
  3. Revoke expired CRL of the websites. 
  4. Enable browser alerts for fraudulent websites.
  5. Define security group memberships.
Correct answer: BD



Question 5

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?


  1. rootkit exploitwrong
  2. Smurf
  3. distributed denial of service
  4. cross-site scripting
Correct answer: D



Question 6

Which two behavioral patterns characterize a ping of death attack? (Choose two)


  1. Malformed packets are used to crash systems.
  2. The attack is fragmented into groups of 8 octets before transmission.
  3. The attack is fragmented into groups of 16 octets before transmission.
  4. Publicly accessible DNS servers are typically used to execute the attack.
  5. Short synchronized bursts of traffic are used to disrupt TCP connections.
Correct answer: AB



Question 7

What is the difference between deceptive phishing and spear phishing?


  1. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
  2. A spear phishing campaign is aimed at a specific person versus a group of people.
  3. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  4. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
Correct answer: B



Question 8

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two) 


  1. Patch for cross-site scripting.
  2. Perform backups to the private cloud.
  3. Protect systems with an up-to-date antimalware program.
  4. Protect against input validation and character escapes in the endpoint.
  5. Install a spam and virus email filter.
Correct answer: CE



Question 9

Which two capabilities does TAXII support? (Choose two)


  1. Binding
  2. Exchange
  3. Mitigating
  4. Pull messaging
  5. Correlation
Correct answer: AD



Question 10

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?


  1. web page images
  2. database
  3. Linux and Windows operating systems
  4. user input validation in a web page or web application
Correct answer: D









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files