Download Implementing and Operating Cisco Security Core Technologies.CertDumps.350-701.2021-02-11.1e.160q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Implementing and Operating Cisco Security Core Technologies.CertDumps.350-701.2021-02-11.1e.160q.vcex
Size 1.55 Mb
Posted February 11, 2021
Downloads 19

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
Which attack is commonly associated with C and C++ programming languages?

  • A: cross-site scriptingwrong
  • B: DDoS
  • C: buffer overflow
  • D: water holing

Question 2
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

  • A: SMTPwrong
  • B: pxGrid
  • C: STIX
  • D: XMPP

Question 3
Which two preventive measures are used to control cross-site scripting? (Choose two)

  • A: Disable cookie inspection in the HTML inspection engine.wrong
  • B: Incorporate contextual output encoding/escaping
  • C: Enable client-side scripts on a per-domain basis
  • D: Run untrusted HTML input through an HTML sanitization engine.
  • E: Same Site cookie attribute should not be used.

Question 4
Which two mechanisms are used to control phishing attacks? (Choose two)

  • A: Use antispyware software.wrong
  • B: Implement email filtering techniques.
  • C: Revoke expired CRL of the websites. 
  • D: Enable browser alerts for fraudulent websites.
  • E: Define security group memberships.

Question 5
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A: rootkit exploitwrong
  • B: Smurf
  • C: distributed denial of service
  • D: cross-site scripting

Question 6
Which two behavioral patterns characterize a ping of death attack? (Choose two)

  • A: Malformed packets are used to crash systems.
  • B: The attack is fragmented into groups of 8 octets before transmission.
  • C: The attack is fragmented into groups of 16 octets before transmission.
  • D: Publicly accessible DNS servers are typically used to execute the attack.
  • E: Short synchronized bursts of traffic are used to disrupt TCP connections.

Question 7
What is the difference between deceptive phishing and spear phishing?

  • A: Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
  • B: A spear phishing campaign is aimed at a specific person versus a group of people.
  • C: Spear phishing is when the attack is aimed at the C-level executives of an organization.
  • D: Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.

Question 8
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two) 

  • A: Patch for cross-site scripting.
  • B: Perform backups to the private cloud.
  • C: Protect systems with an up-to-date antimalware program.
  • D: Protect against input validation and character escapes in the endpoint.
  • E: Install a spam and virus email filter.

Question 9
Which two capabilities does TAXII support? (Choose two)

  • A: Binding
  • B: Exchange
  • C: Mitigating
  • D: Pull messaging
  • E: Correlation

Question 10
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A: web page images
  • B: database
  • C: Linux and Windows operating systems
  • D: user input validation in a web page or web application


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files