Download Implementing and Operating Cisco Security Core Technologies.350-701.CertDumps.2024-12-18.328q.vcex

Vendor: Cisco
Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies
Date: Dec 18, 2024
File Size: 7 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
  1. put
  2. options
  3. get
  4. push
  5. connect
Correct answer: AC
Explanation:
Reference:https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Question 2
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
  1. SDN controller and the cloud
  2. management console and the SDN controller
  3. management console and the cloud
  4. SDN controller and the management solution
Correct answer: D
Question 3
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
  1. smurf
  2. distributed denial of service
  3. cross-site scripting
  4. rootkit exploit
Correct answer: C
Explanation:
cross-site scripting is a correct answer.
cross-site scripting is a correct answer.
Question 4
What is the difference between deceptive phishing and spear phishing?
  1. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  2. A spear phishing campaign is aimed at a specific person versus a group of people.
  3. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  4. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a falsewebpage.
Correct answer: B
Explanation:
A spear phishing campaign is aimed at a specific person versus a group of people.
A spear phishing campaign is aimed at a specific person versus a group of people.
Question 5
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
  1. The attack is fragmented into groups of 16 octets before transmission.
  2. The attack is fragmented into groups of 8 octets before transmission.
  3. Short synchronized bursts of traffic are used to disrupt TCP connections.
  4. Malformed packets are used to crash systems.
  5. Publicly accessible DNS servers are typically used to execute the attack.
Correct answer: BD
Explanation:
Reference:https://en.wikipedia.org/wiki/Ping_of_death
Reference:
https://en.wikipedia.org/wiki/Ping_of_death
Question 6
Which two mechanisms are used to control phishing attacks? (Choose two.)
  1. Enable browser alerts for fraudulent websites.
  2. Define security group memberships.
  3. Revoke expired CRL of the websites.
  4. Use antispyware software.
  5. Implement email filtering techniques.
Correct answer: AE
Explanation:
Enable browser alerts for fraudulent websites.Implement email filtering techniques.
Enable browser alerts for fraudulent websites.
Implement email filtering techniques.
Question 7
What are two rootkit types? (Choose two.)
  1. registry
  2. buffer mode
  3. user mode
  4. bootloader
  5. virtual
Correct answer: CD
Explanation:
1. Kernel rootkit2. Hardware or firmware rootkit3. Hyper-V rootkits4. Bootloader rootkit or bootkit5. Memory rootkit6. User-mode or application rootkit
1. Kernel rootkit
2. Hardware or firmware rootkit
3. Hyper-V rootkits
4. Bootloader rootkit or bootkit
5. Memory rootkit
6. User-mode or application rootkit
Question 8
How is DNS tunneling used to exfiltrate data out of a corporate network?
  1. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers
  2. It encodes the payload with random characters that are broken into short strings and the DNS server rebuildsthe exfiltrated data
  3. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damageand theft on the network
  4. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information orstart other attacks
Correct answer: B
Explanation:
It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data
It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data
Question 9
Which type of attack is social engineering?
  1. trojan
  2. MITM
  3. phishing
  4. malware
Correct answer: C
Explanation:
phishing is a correct answer.
phishing is a correct answer.
Question 10
What are two DDoS attack categories? (Choose two.)
  1. protocol
  2. source-based
  3. database
  4. sequential
  5. volume-based
Correct answer: AE
Explanation:
Answer A and E. There are three different general categories of DDoS attacks:Volume-based DDoS attacksApplication DDoS attacksLow-rate DoS (LDoS) attackshttps://tools.cisco.com/security/center/resources/guide_ddos_defense.html
Answer A and E. 
There are three different general categories of DDoS attacks:
Volume-based DDoS attacks
Application DDoS attacks
Low-rate DoS (LDoS) attacks
https://tools.cisco.com/security/center/resources/guide_ddos_defense.html
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!