Cisco® 350-701 Exam Practice Questions (P. 1)
- Full Access (704 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Which functions of an SDN architecture require southbound APIs to enable communication?
- ASDN controller and the network elementsMost Voted
- Bmanagement console and the SDN controller
- Cmanagement console and the cloud
- DSDN controller and the cloud
Correct Answer:
A
A

Southbound APIs in an SDN architecture primarily facilitate direct communication between the SDN controller and network elements such as switches and routers. This setup allows the SDN controller to distribute commands and configurations across the network while simultaneously receiving status updates and other pertinent information from network devices. This communication is crucial for the SDN controller's ability to centrally manage and dynamically adjust network operations based on real-time conditions.
send
light_mode
delete
Question #2
Which two request methods of REST API are valid on the Cisco ASA Platform? (Choose two.)
- AputMost Voted
- Boptions
- CgetMost Voted
- Dpush
- Econnect
Correct Answer:
AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
AC
Reference:
https://www.cisco.com/c/en/us/td/docs/security/asa/api/qsg-asa-api.html
send
light_mode
delete
Question #3
The main function of northbound APIs in the SDN architecture is to enable communication between which two areas of a network?
- ASDN controller and the cloud
- Bmanagement console and the SDN controller
- Cmanagement console and the cloud
- DSDN controller and the management solutionMost Voted
Correct Answer:
D
D

Northbound APIs primarily function to facilitate communication between the SDN controller and the applications driving the management solutions over a network. These APIs are vital for allowing software-level requests to manipulate network behaviors, providing a comprehensive interface for the orchestration and automation of network resources in alignment with application needs. While it's a close argument whether the correct configuration involves the cloud, typically the direct communication is between the SDN controller and the management applications directly interfacing with it, not the abstract cloud infrastructure.
send
light_mode
delete
Question #4
What is a feature of the open platform capabilities of Cisco DNA Center?
- Aapplication adapters
- Bdomain integration
- Cintent-based APIsMost Voted
- Dautomation adapters
Correct Answer:
C
C

Intent-based APIs are a notable feature of Cisco DNA Center's open platform capabilities, allowing for extended programmability and interaction with third-party applications. These APIs facilitate the translation of business intent into network policies and ensure network configurations are consistently aligned with business requirements, thus supporting a highly adaptive and responsive network infrastructure.
send
light_mode
delete
Question #5

Refer to the exhibit. What does the API do when connected to a Cisco security appliance?
- Acreate an SNMP pull mechanism for managing AMP
- Bgather network telemetry information from AMP for endpoints
- Cget the process and PID information from the computers in the network
- Dgather the network interface information about the computers AMP sees
Correct Answer:
D
D
send
light_mode
delete
Question #6
Which form of attack is launched using botnets?
- ATCP flood
- BDDOSMost Voted
- CDOS
- Dvirus
Correct Answer:
B
B

DDoS attacks, which stand for Distributed Denial of Service, effectively utilize botnets - networks of compromised computers controlled by attackers. These botnets are orchestrated to flood targeted systems with overwhelming traffic, causing disruptions by exceeding the targeted system's capacity to handle user requests. This method significantly amplifies the attack's scale compared to individual attacks, making botnets a preferred tool for such extensive disruptions. Thus, DDoS is indeed the correct answer associated with the use of botnets in cyberattacks.
send
light_mode
delete
Question #7
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
- Asmurf
- Bdistributed denial of service
- Ccross-site scriptingMost Voted
- Drootkit exploit
Correct Answer:
C
C

Cross-site scripting (XSS) attacks often employ various forms of alternate encoding, such as hexadecimal representation, to obfuscate malicious script elements embedded in web pages. This encoding helps disguise the nature of the attack, making it challenging for both users and security systems to recognize the malicious content. As the attack leverages encoded scripts activated when a user interacts with compromised elements (e.g., clicking a link), understanding and identifying these encoding strategies are crucial in maintaining web security. This method is a hallmark of XSS attacks, where attackers aim to bypass conventional detection mechanisms effectively.
send
light_mode
delete
Question #8
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
- Auser input validation in a web page or web applicationMost Voted
- BLinux and Windows operating systems
- Cdatabase
- Dweb page images
Correct Answer:
A
Reference:
https://tools.cisco.com/security/center/resources/sql_injection
A
Reference:
https://tools.cisco.com/security/center/resources/sql_injection
send
light_mode
delete
Question #9
What is the difference between deceptive phishing and spear phishing?
- ADeceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
- BA spear phishing campaign is aimed at a specific person versus a group of people.Most Voted
- CSpear phishing is when the attack is aimed at the C-level executives of an organization.
- DDeceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
Correct Answer:
B
B

Spear phishing, in contrast to deceptive phishing, is highly targeted. While general phishing campaigns might cast a wide net, attempting to fool as many people as possible, spear phishing zeros in on specific individuals. This targeted approach not only increases the likelihood of success but also allows attackers to tailor their methods and messages based on the personal or professional information of the target, adding a layer of authenticity and urgency to their fraudulent communications. This precision in targeting is what makes spear phishing particularly dangerous and effective.
send
light_mode
delete
Question #10
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
- AThe attack is fragmented into groups of 16 octets before transmission.
- BThe attack is fragmented into groups of 8 octets before transmission.
- CShort synchronized bursts of traffic are used to disrupt TCP connections.
- DMalformed packets are used to crash systems.
- EPublicly accessible DNS servers are typically used to execute the attack.
Correct Answer:
BD
Reference:
https://en.wikipedia.org/wiki/Ping_of_death
BD
Reference:
https://en.wikipedia.org/wiki/Ping_of_death
send
light_mode
delete
All Pages