Download Implementing and Operating Cisco Security Core Technologies.CertDumps.350-701.2021-08-05.4e.324q.vcex

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Implementing and Operating Cisco Security Core Technologies.CertDumps.350-701.2021-08-05.4e.324q.vcex
Size 7.87 Mb
Posted August 05, 2021
Downloads 37

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.


With discount: 20%


Demo Questions

Question 1
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?

  • A: Smurf
  • B: distributed denial of service
  • C: cross-site scripting
  • D: rootkit exploit

Question 2
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A: user input validation in a web page or web application
  • B: Linux and Windows operating systems
  • C: database
  • D: web page images

Question 3
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)

  • A: Check integer, float, or Boolean string parameters to ensure accurate values.
  • B: Use prepared statements and parameterized queries.
  • C: Secure the connection between the web and the app tier.
  • D: Write SQL code instead of using object-relational mapping libraries.
  • E: Block SQL code execution in the web application database login.

Question 4
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two)

  • A: Patch for cross-site scripting.
  • B: Perform backups to the private cloud.
  • C: Protect against input validation and character escapes in the endpoint.
  • D: Install a spam and virus email filter.
  • E: Protect systems with an up-to-date antimalware program.

Question 5
Which two mechanisms are used to control phishing attacks? (Choose two)

  • A: Enable browser alerts for fraudulent websites.
  • B: Define security group memberships.
  • C: Revoke expired CRL of the websites.
  • D: Use antispyware software.
  • E: Implement email filtering techniques.

Question 6
Which two behavioral patterns characterize a ping of death attack? (Choose two)

  • A: The attack is fragmented into groups of 16 octets before transmission.
  • B: The attack is fragmented into groups of 8 octets before transmission.
  • C: Short synchronized bursts of traffic are used to disrupt TCP connections.
  • D: Malformed packets are used to crash systems.
  • E: Publicly accessible DNS servers are typically used to execute the attack.

Question 7
Which two preventive measures are used to control cross-site scripting? (Choose two)

  • A: Enable client-side scripts on a per-domain basis.
  • B: Incorporate contextual output encoding/escaping.
  • C: Disable cookie inspection in the HTML inspection engine.
  • D: Run untrusted HTML input through an HTML sanitization engine.
  • E: Same Site cookie attribute should not be used.

Question 8
What is the difference between deceptive phishing and spear phishing?

  • A: Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  • B: A spear phishing campaign is aimed at a specific person versus a group of people.
  • C: Spear phishing is when the attack is aimed at the C-level executives of an organization.
  • D: Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.

Question 9
Which attack is commonly associated with C and C++ programming languages?

  • A: cross-site scripting
  • B: water holing
  • C: DDoS
  • D: buffer overflow

Question 10
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

  • A: STIX
  • B: XMPP
  • C: pxGrid
  • D: SMTP


You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files