Cisco 350-701 Exam Questions
Implementing and Operating Cisco Security Core Technologies (Page 3 )

Updated On: 21-Feb-2026

Which two behavioral patterns characterize a ping of death attack? (Choose two)

  1. The attack is fragmented into groups of 16 octets before transmission.
  2. The attack is fragmented into groups of 8 octets before transmission.
  3. Short synchronized bursts of traffic are used to disrupt TCP connections.
  4. Malformed packets are used to crash systems.
  5. Publicly accessible DNS servers are typically used to execute the attack.

Answer(s): B,D

Explanation:

Ping of Death (PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command.
A correctly-formed ping packet is typically 56 bytes in size, or 64 bytes when the ICMP header is considered, and 84 including Internet Protocol version 4 header. However, any IPv4 packet (including pings) may be as large as 65,535 bytes. Some computer systems were never designed to properly handle a ping packet larger than the maximum packet size because it violates the Internet Protocol documented Like other large but well-formed packets, a ping of death is fragmented into groups of 8 octets before transmission. However, when the target computer reassembles the malformed packet, a buffer overflow can occur, causing a system crash and potentially allowing the injection of malicious code.



Which two preventive measures are used to control cross-site scripting? (Choose two)

  1. Enable client-side scripts on a per-domain basis.
  2. Incorporate contextual output encoding/escaping.
  3. Disable cookie inspection in the HTML inspection engine.
  4. Run untrusted HTML input through an HTML sanitization engine.
  5. Same Site cookie attribute should not be used.

Answer(s): A,B



What is the difference between deceptive phishing and spear phishing?

  1. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.
  2. A spear phishing campaign is aimed at a specific person versus a group of people.
  3. Spear phishing is when the attack is aimed at the C-level executives of an organization.
  4. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.

Answer(s): B

Explanation:

In deceptive phishing, fraudsters impersonate a legitimate company in an attempt to steal people's personal data or login credentials. Those emails frequently use threats and a sense of urgency to scare users into doing what the attackers want.
Spear phishing is carefully designed to get a single recipient to respond. Criminals select an individual target within an organization, using social media and other public information ­ and craft a fake email tailored for that person.



Which attack is commonly associated with C and C++ programming languages?

  1. cross-site scripting
  2. water holing
  3. DDoS
  4. buffer overflow

Answer(s): D

Explanation:

A buffer overflow (or buffer overrun) occurs when the volume of data exceeds the storage capacity of the memory buffer. As a result, the program attempting to write the data to the buffer overwrites adjacent memory locations.
Buffer overflow is a vulnerability in low level codes of C and C++. An attacker can cause the program to crash, make data corrupt, steal some private information or run his/her own code. It basically means to access any buffer outside of it's alloted memory space. This happens quite frequently in the case of arrays.



What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?

  1. STIX
  2. XMPP
  3. pxGrid
  4. SMTP

Answer(s): A

Explanation:

TAXII (Trusted Automated Exchange of Indicator Information) is a standard that provides a transport






Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members:

Join the 350-701 Discussion