Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

Cisco 350-701 Exam Actual Questions

The questions for 350-701 were last updated on March 15, 2024.
  • Viewing page 1 out of 58 pages.
  • Viewing questions 1-10 out of 584 questions

Topic 1 - Single Topic

Question #1 Topic 1

Which functions of an SDN architecture require southbound APIs to enable communication?

  • A. SDN controller and the network elements
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the cloud
Reveal Solution Hide Solution   Discussion   6

Correct Answer: A 🗳️

Question #2 Topic 1

Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)

  • A. put
  • B. options
  • C. get
  • D. push
  • E. connect
Reveal Solution Hide Solution   Discussion   9

Correct Answer: AC 🗳️
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html

Question #3 Topic 1

The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?

  • A. SDN controller and the cloud
  • B. management console and the SDN controller
  • C. management console and the cloud
  • D. SDN controller and the management solution
Reveal Solution Hide Solution   Discussion   11

Correct Answer: D 🗳️

Question #4 Topic 1

What is a feature of the open platform capabilities of Cisco DNA Center?

  • A. application adapters
  • B. domain integration
  • C. intent-based APIs
  • D. automation adapters
Reveal Solution Hide Solution   Discussion   2

Correct Answer: C 🗳️

Question #5 Topic 1


Refer to the exhibit. What does the API do when connected to a Cisco security appliance?

  • A. create an SNMP pull mechanism for managing AMP
  • B. gather network telemetry information from AMP for endpoints
  • C. get the process and PID information from the computers in the network
  • D. gather the network interface information about the computers AMP sees
Reveal Solution Hide Solution   Discussion   1

Correct Answer: D 🗳️

Question #6 Topic 1

Which form of attack is launched using botnets?

  • A. TCP flood
  • B. DDOS
  • C. DOS
  • D. virus
Reveal Solution Hide Solution   Discussion   5

Correct Answer: B 🗳️

Question #7 Topic 1

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A. smurf
  • B. distributed denial of service
  • C. cross-site scripting
  • D. rootkit exploit
Reveal Solution Hide Solution   Discussion   9

Correct Answer: C 🗳️

Question #8 Topic 1

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A. user input validation in a web page or web application
  • B. Linux and Windows operating systems
  • C. database
  • D. web page images
Reveal Solution Hide Solution   Discussion   27

Correct Answer: A 🗳️
Reference:
https://tools.cisco.com/security/center/resources/sql_injection

Question #9 Topic 1

What is the difference between deceptive phishing and spear phishing?

  • A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  • B. A spear phishing campaign is aimed at a specific person versus a group of people.
  • C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  • D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
Reveal Solution Hide Solution   Discussion   9

Correct Answer: B 🗳️

Question #10 Topic 1

Which two behavioral patterns characterize a ping of death attack? (Choose two.)

  • A. The attack is fragmented into groups of 16 octets before transmission.
  • B. The attack is fragmented into groups of 8 octets before transmission.
  • C. Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D. Malformed packets are used to crash systems.
  • E. Publicly accessible DNS servers are typically used to execute the attack.
Reveal Solution Hide Solution   Discussion   5

Correct Answer: BD 🗳️
Reference:
https://en.wikipedia.org/wiki/Ping_of_death

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...