350-701 Dumps

350-701 Free Practice Test

Cisco 350-701: Implementing and Operating Cisco Security Core Technologies

QUESTION 56

- (Exam Topic 2)
Refer to the exhibit.
350-701 dumps exhibit
Which type of authentication is in use?

Correct Answer: A
Reference:
https://www.cisco.com/c/en/us/support/docs/security/email-security-appliance/118844-technoteesa-00.htmlThe exhibit in this Qshows a successful TLS connection from the remote host (reception) in the mail log.

QUESTION 57

- (Exam Topic 3)
Which industry standard is used to integrate Cisco ISE and pxGrid to each other and with other interoperable security platforms?

Correct Answer: B

QUESTION 58

- (Exam Topic 2)
What is the difference between Cross-site Scripting and SQL Injection, attacks?

Correct Answer: A
Answer B is not correct because Cross-site Scripting (XSS) is not a brute force attack.Answer C is not correct because the statement “Cross-site Scripting is when executives in a corporation are attacked” is not true. XSS is a client-side vulnerability that targets other application users.Answer D is not correct because the statement “Cross-site Scripting is an attack where code is executed from the server side”. In fact, XSS is a method that exploits website vulnerability by injecting scripts that will run at client’s side.Therefore only answer A is left. In XSS, an attacker will try to inject his malicious code (usually malicious links) into a database. When other users follow his links, their web browsers are redirected to websites whereattackers can steal data from them. In a SQL Injection, an attacker will try to inject SQL code (via his browser) into forms, cookies, or HTTP headers that do not use data sanitizing or validation methods of GET/POSTparameters.Note: The main difference between a SQL and XSS injection attack is that SQL injection attacks are used to steal information from databases whereas XSS attacks are used to redirect users to websites where attackers can steal data from them.

QUESTION 59

- (Exam Topic 3)
How does Cisco Umbrella protect clients when they operate outside of the corporate network?

Correct Answer: C

QUESTION 60

- (Exam Topic 3)
Refer to the exhibit.
350-701 dumps exhibit
Consider that any feature of DNS requests, such as the length off the domain name and the number of subdomains, can be used to construct models of expected behavior to which observed values can be compared. Which type of malicious attack are these values associated with?

Correct Answer: D