Cisco® 350-701 Exam Practice Questions (P. 2)
- Full Access (704 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Which two mechanisms are used to control phishing attacks? (Choose two.)
- AEnable browser alerts for fraudulent websites.Most Voted
- BDefine security group memberships.
- CRevoke expired CRL of the websites.
- DUse antispyware software.
- EImplement email filtering techniques.Most Voted
Correct Answer:
AE
AE

Enabling browser alerts for fraudulent websites and utilizing email filtering techniques are fundamental strategies in countering phishing. These tools help by identifying and warning users of suspicious sites and by blocking phishing attempts through email before they reach the user's inbox. Both measures serve to prevent the disclosure of sensitive information by alerting users to potential threats and reducing the likelihood of harmful interactions. This dual approach is essential in a comprehensive phish prevention strategy.
send
light_mode
delete
Question #12
Which attack is commonly associated with C and C++ programming languages?
- Across-site scripting
- Bwater holing
- CDDoS
- Dbuffer overflow
Correct Answer:
D
Reference:
https://en.wikipedia.org/wiki/Buffer_overflow
D
Reference:
https://en.wikipedia.org/wiki/Buffer_overflow
send
light_mode
delete
Question #13
Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two.)
- ACheck integer, float, or Boolean string parameters to ensure accurate values.Most Voted
- BUse prepared statements and parameterized queries.Most Voted
- CSecure the connection between the web and the app tier.
- DWrite SQL code instead of using object-relational mapping libraries.
- EBlock SQL code execution in the web application database login.
Correct Answer:
AB
Reference:
https://en.wikipedia.org/wiki/SQL_injection
AB
Reference:
https://en.wikipedia.org/wiki/SQL_injection
send
light_mode
delete
Question #14
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
- AphishingMost Voted
- Bbrute forceMost Voted
- Cman-in-the-middle
- DDDOS
- Etear drop
Correct Answer:
AB
AB

Multifactor authentication (MFA) plays a critical role in enhancing cybersecurity by requiring multiple forms of verification to prove identity. This method is highly efficient in protecting against brute force attacks where attackers attempt multiple password combinations to gain unauthorized access. MFA also adds layers of defense against phishing attempts by making it considerably harder for attackers to exploit stolen credentials alone, as they would typically also need the second factor (like a code sent to a mobile device) which they are less likely to obtain. However, while MFA greatly increases security, it's not foolproof and users must remain vigilant.
send
light_mode
delete
Question #15
What are two rootkit types? (Choose two.)
- Aregistry
- Bbuffer mode
- Cuser modeMost Voted
- DbootloaderMost Voted
- Evirtual
Correct Answer:
CD
CD

User mode and bootloader rootkits are indeed two prevalent types of rootkits in cybersecurity threats. User mode rootkits operate at the application level, manipulating system calls and processes to hide their activities, essentially by masquerading as regular applications. On the other hand, bootloader rootkits, also known as bootkits, are more invasive. They embed themselves in the computer’s bootloader and activate before the operating system loads, which gives them the ability to control the system from the very start and remain hidden from typical detection methods. These characteristics make them a significant security challenge.
send
light_mode
delete
Question #16
How is DNS tunneling used to exfiltrate data out of a corporate network?
- AIt leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers
- BIt encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated dataMost Voted
- CIt redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network
- DIt corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks
Correct Answer:
B
B

DNS tunneling is a method to bypass network security by embedding data within DNS requests and responses. It is particularly effective because DNS traffic is generally permitted across most security perimeters. The data, once encoded into these DNS queries, often appears as benign DNS traffic. However, when the queries reach a domain controlled by the attacker, the data is reconstructed from the encoded information. This technique cleverly exploits DNS because of its ubiquitous and often less scrutinized nature in network environments, allowing attackers to extract data while avoiding detection.
send
light_mode
delete
Question #17
Which type of attack is social engineering?
- Atrojan
- BMITM
- Cphishing
- Dmalware
Correct Answer:
C
C

Phishing, categorically, is a prime example of a social engineering attack. It involves deceiving individuals through emails or other communications to divulge sensitive information or perform actions that compromise security. Unlike other options listed such as Trojans or malware, which pertain to malicious software, or MITM attacks that intercept data, phishing straightforwardly leverages the deceit of human psychology for unauthorized access, aligning perfectly with the essence of social engineering. This difference crucially distinguishes phishing as not just a byproduct but a direct methodology of social engineering.
send
light_mode
delete
Question #18
What are two DDoS attack categories? (Choose two.)
- Aprotocol
- Bsource-based
- Cdatabase
- Dsequential
- Evolume-based
Correct Answer:
AE
AE

Indeed, the correct categories of DDoS attacks specified in the question are 'protocol' and 'volume-based.' Protocol attacks focus on exploiting weaknesses in the layer where communication protocols operate, disrupting services by sending malicious, malformed, or oversized packets. On the other hand, volume-based attacks inundate the target with substantial traffic volume, exceeding the bandwidth capacity and leading to service disruptions. These categories highlight different strategies employed by attackers to compromise network integrity and functionality.
send
light_mode
delete
Question #19
In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?
- Aman-in-the-middle
- BLDAP injection
- Cinsecure API
- Dcross-site scripting
Correct Answer:
A
A

To effectively intercept and alter the communication between two parties unnoticed, a man-in-the-middle attack is orchestrated precisely for this purpose. In this type of attack, the intruder secretly relays and potentially alters the communication between two parties who believe they are directly communicating with each other. This choice aligns correctly with the described scenario in the security context, making it distinct from other types like LDAP injection or cross-site scripting, which have different objectives and mechanisms. Always ensure secure, authenticated, and encrypted connections to mitigate such risks.
send
light_mode
delete
Question #20
How does Cisco Advanced Phishing Protection protect users?
- AIt utilizes sensors that send messages securely.
- BIt uses machine learning and real-time behavior analytics.Most Voted
- CIt validates the sender by using DKIM.
- DIt determines which identities are perceived by the sender.
Correct Answer:
B
B

Cisco Advanced Phishing Protection employs machine learning to scrutinize patterns within email and other online communications precisely. This technology enables the detection and prevention of phishing attempts dynamically. It also integrates behavior analytics, allowing it to pinpoint anomalies and suspicious conducts swiftly. This dual approach is critical in building a robust defense against phishing attacks, proving how versatile and proactive Cisco's solutions are in safeguarding user data and privacy.
send
light_mode
delete
All Pages