Download Cisco.350-701.CertDumps.2025-01-19.446q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Cisco.350-701.CertDumps.2025-01-19.446q.vcex
Size 12 MB
Posted Jan 19, 2025
Download Cisco.350-701.CertDumps.2025-01-19.446q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which functions of an SDN architecture require southbound APIs to enable communication?


  1. SDN controller and the network elements
  2. management console and the SDN controller
  3. management console and the cloud
  4. SDN controller and the cloud
Correct answer: A
Explanation:
SDN controller and the network elements
SDN controller and the network elements



Question 2

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)


  1. put
  2. options
  3. get
  4. push
  5. connect
Correct answer: AC
Explanation:
Reference:https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html



Question 3

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?


  1. SDN controller and the cloud
  2. management console and the SDN controller
  3. management console and the cloud
  4. SDN controller and the management solution
Correct answer: D



Question 4

What is a feature of the open platform capabilities of Cisco DNA Center?


  1. application adapters
  2. domain integration
  3. intent-based APIs
  4. automation adapters
Correct answer: C
Explanation:
intent-based APIs is a correct answer.
intent-based APIs is a correct answer.



Question 5

 
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?


  1. create an SNMP pull mechanism for managing AMP
  2. gather network telemetry information from AMP for endpoints
  3. get the process and PID information from the computers in the network
  4. gather the network interface information about the computers AMP sees
Correct answer: D
Explanation:
gather the network interface information about the computers AMP sees
gather the network interface information about the computers AMP sees



Question 6

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?


  1. smurf
  2. distributed denial of service
  3. cross-site scripting
  4. rootkit exploit
Correct answer: C
Explanation:
cross-site scripting is a correct answer.
cross-site scripting is a correct answer.



Question 7

What is the difference between deceptive phishing and spear phishing?


  1. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  2. A spear phishing campaign is aimed at a specific person versus a group of people.
  3. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  4. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a falsewebpage.
Correct answer: B
Explanation:
A spear phishing campaign is aimed at a specific person versus a group of people.
A spear phishing campaign is aimed at a specific person versus a group of people.



Question 8

Which two behavioral patterns characterize a ping of death attack? (Choose two.)


  1. The attack is fragmented into groups of 16 octets before transmission.
  2. The attack is fragmented into groups of 8 octets before transmission.
  3. Short synchronized bursts of traffic are used to disrupt TCP connections.
  4. Malformed packets are used to crash systems.
  5. Publicly accessible DNS servers are typically used to execute the attack.
Correct answer: BD
Explanation:
Reference:https://en.wikipedia.org/wiki/Ping_of_death
Reference:
https://en.wikipedia.org/wiki/Ping_of_death



Question 9

Which two mechanisms are used to control phishing attacks? (Choose two.)


  1. Enable browser alerts for fraudulent websites.
  2. Define security group memberships.
  3. Revoke expired CRL of the websites.
  4. Use antispyware software.
  5. Implement email filtering techniques.
Correct answer: AE
Explanation:
Enable browser alerts for fraudulent websites.Implement email filtering techniques.
Enable browser alerts for fraudulent websites.
Implement email filtering techniques.



Question 10

Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)


  1. phishing
  2. brute force
  3. man-in-the-middle
  4. DDOS
  5. tear drop
Correct answer: AB
Explanation:
phishingbrute force
phishing
brute force









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files