Cisco 350-701 - Implementing and Operating Cisco Security Core Technologies Exam
Page: 2 / 141
Total 703 questions
Question #6 (Topic: Single Topic)
Which form of attack is launched using botnets?
A. TCP flood
B. DDOS
C. DOS
D. virus
Answer: B
Question #7 (Topic: Single Topic)
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
A. smurf
B. distributed denial of service
C. cross-site scripting
D. rootkit exploit
Answer: C
Question #8 (Topic: Single Topic)
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
A. user input validation in a web page or web application
B. Linux and Windows operating systems
C. database
D. web page images
Answer: A
Question #9 (Topic: Single Topic)
What is the difference between deceptive phishing and spear phishing?
A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
B. A spear phishing campaign is aimed at a specific person versus a group of people.
C. Spear phishing is when the attack is aimed at the C-level executives of an organization.
D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.
Answer: B
Question #10 (Topic: Single Topic)
Which two behavioral patterns characterize a ping of death attack? (Choose two.)
A. The attack is fragmented into groups of 16 octets before transmission.
B. The attack is fragmented into groups of 8 octets before transmission.
C. Short synchronized bursts of traffic are used to disrupt TCP connections.
D. Malformed packets are used to crash systems.
E. Publicly accessible DNS servers are typically used to execute the attack.
Answer: BD