Free 350-701 Exam Braindumps (page: 3)

Page 3 of 153

Which attack is commonly associated with C and C++ programming languages?

  1. cross-site scripting
  2. water holing
  3. DDoS
  4. buffer overflow

Answer(s): D

Explanation:

A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.
Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash, make data corrupt, steal some private information or run his/her own code. It basically means to access any buffer outside of it's alloted memory space. This happens quite frequently in the case of arrays.



What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

  1. STIX
  2. XMPP
  3. pxGrid
  4. SMTP

Answer(s): A

Explanation:

TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport



Which two capabilities does TAXII support? (Choose two)

  1. Exchange
  2. Pull messaging
  3. Binding
  4. Correlation
  5. Mitigating

Answer(s): A,B

Explanation:

The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to those interested in sharing structured cyber threat information.
TAXII Capabilities are the highest level at which TAXII actions can be described. There are three capabilities that this version of TAXII supports: push messaging, pull messaging, and discovery. Although there is no "binding" capability in the list but it is the best answer here.



Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)

  1. exploits
  2. ARP spoofing
  3. denial-of-service attacks
  4. malware
  5. eavesdropping

Answer(s): A,D

Explanation:

Malware means "malicious software", is any software intentionally designed to cause damage to a computer, server, client, or computer network. The most popular types of malware includes viruses, ransomware and spyware. Virus Possibly the most common type of malware, viruses attach their malicious code to clean code and wait to be run.

Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. Spyware is spying software that can secretly record everything you enter, upload, download, and store on your computers or mobile devices. Spyware always tries to keep itself hidden. An exploit is a code that takes advantage of a software vulnerability or security flaw. Exploits and malware are two risks for endpoints that are not up to date. ARP spoofing and eavesdropping are attacks against the network while denial-of-service attack is based on the flooding of IP packets.



Page 3 of 153



Post your Comments and Discuss Cisco® 350-701 exam with other Community members:

David A commented on January 16, 2024
Good Colombia
Anonymous
upvote

Kim commented on May 25, 2023
I just purchased and downloaded my files. Everything looks good so far.
UNITED STATES
upvote