Go Back on 350-701 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-701 Practice Test


Page 7 out of 126 Pages

Topic 2: Exam Pool B

What are two characteristics of Cisco DNA Center APIs? (Choose two)


A.

Postman is required to utilize Cisco DNA Center API calls.


B.

They do not support Python scripts.


C.

They are Cisco proprietary.


D.

They quickly provision new devices


E.

They view the overall health of the network





D.
  

They quickly provision new devices



E.
  

They view the overall health of the network



Which Dos attack uses fragmented packets to crash a target machine?


A.

smurf


B.

MITM


C.

teardrop


D.

LAND





C.
  

teardrop



A teardrop attack is a denial-of-service (DoS)
attack that involves sending fragmented packets to a targetmachine. Since the machine
receiving such packets cannot reassemble them due to a bug in TCP/IPfragmentation
reassembly, the packets overlap one another, crashing the target network device. This
generally happens on older operating systems such as Windows 3.1x, Windows 95,
Windows NT and versions of the Linux kernel prior to 2.1.63.

Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?


A.

1


B.

2


C.

6


D.

31





C.
  

6



https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identitybased-networkingservices/config_guide_c17-663759.html

Which attack type attempts to shut down a machine or network so that users are not able
to access it?


A.

smurf


B.

bluesnarfing


C.

MAC spoofing


D.

IP spoofing





A.
  

smurf



Denial-of-service (DDoS) aims at shutting down a
network or service, causing it to be inaccessible to itsintended users.The Smurf attack is a
DDoS attack in which large numbers of Internet Control Message Protocol (ICMP)packets
with the intended victim’s spoofed source IP are broadcast to a computer network using an
IPbroadcast address.

In an IaaS cloud services model, which security function is the provider responsible for
managing?


A.

Internet proxy


B.

firewalling virtual machines


C.

CASB


D.

hypervisor OS hardening





B.
  

firewalling virtual machines



In this IaaS model, cloud providers offer resources to
users/machines that include computers as virtualmachines, raw (block) storage, firewalls
, load balancers, and network devices.Note: Cloud access security broker (CASB) provides
visibility and compliance checks, protects data against misuse and exfiltration, and
provides threat protections against malware such as ransomware.


Page 7 out of 126 Pages
Previous