Questions for the 350-701 were updated on : Jan 11 ,2025
Topic 1
Which functions of an SDN architecture require southbound APIs to enable communication?
A
Topic 1
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
A C
Explanation:
Reference: https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
Topic 1
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a
network?
D
Topic 1
What is a feature of the open platform capabilities of Cisco DNA Center?
C
Topic 1
Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
D
Topic 1
Which form of attack is launched using botnets?
B
Topic 1
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
C
Topic 1
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
C
Explanation:
Reference: https://tools.cisco.com/security/center/resources/sql_injection
Topic 1
What is the difference between deceptive phishing and spear phishing?
B
Topic 1
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
B D
Explanation:
Reference: https://en.wikipedia.org/wiki/Ping_of_death
Topic 1
Which two mechanisms are used to control phishing attacks? (Choose two.)
A E
Topic 1
Which attack is commonly associated with C and C++ programming languages?
D
Explanation:
Reference: https://en.wikipedia.org/wiki/Buffer_overflow
Topic 1
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
A B
Explanation:
Reference: https://en.wikipedia.org/wiki/SQL_injection
Topic 1
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
B C
Topic 1
What are two rootkit types? (Choose two.)
C D