Which two capabilities does TAXII support? (Choose two)
Answer(s): A,B
The Trusted Automated eXchangeof Indicator Information (TAXII) specifies mechanisms for exchanging structured cyber threat information between parties over the network. TAXII exists to provide specific capabilities to those interested in sharing structured cyber threat information.TAXII Capabilities are the highest level at which TAXII actions can be described. There are three capabilities that this version of TAXII supports: push messaging, pull messaging, and discovery. Although there is no "binding" capability in the list but it is the best answer here.
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
Answer(s): A,D
Malware means "malicious software", is any software intentionally designed to cause damage to a computer, server, client, or computer network. The most popular types of malware includes viruses, ransomware and spyware. Virus Possibly the most common type of malware, viruses attach their malicious code to clean code and wait to be run.Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. Spyware is spying software that can secretly record everything you enter, upload, download, and store on your computers or mobile devices. Spyware always tries to keep itself hidden. An exploit is a code that takes advantage of a software vulnerability or security flaw. Exploits and malware are two risks for endpoints that are not up to date. ARP spoofing and eavesdropping are attacks against the network while denial-of-service attack is based on the flooding of IP packets.
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
Answer(s): C
A trustpoint enrollment mode, which also defines the trustpoint authentication mode, can be performed via 3 main methods:1. Terminal Enrollment manual method of performing trustpoint authentication and certificate enrolment using copy-paste in the CLI terminal.2. SCEP Enrollment Trustpoint authentication and enrollment using SCEP over HTTP.3. Enrollment Profile Here, authentication and enrollment methods are defined separately. Along with terminal and SCEP enrollment methods, enrollment profiles provide an option to specify HTTP/TFTP commands to perform file retrieval from the Server, which is defined using an authentication or enrollment url under the profile.
https://www.cisco.com/c/en/us/support/docs/security-vpn/public-key-infrastructure-pki/211333-IOSPKI-Deployment-Guide-Initial-Design.html
What are two rootkit types? (Choose two)
Answer(s): C,D
The term `rootkit' originally comes from the Unix world, where the word `root' is used to describe a user with the highest possible level of access privileges, similar to an `Administrator' in Windows. The word `kit' refers to the software that grants root-level access to the machine. Put the two together and you get `rootkit', a program that gives someone with legitimate or malicious intentions privileged access to a computer. There are four main types of rootkits: Kernel rootkits, User mode rootkits, Bootloader rootkits, Memory rootkits
Which form of attack is launched using botnets?
A botnet is a collection of internet-connected devices infected by malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet attacks, which include malicious activities such as credentials leaks, unauthorized access, data theft and DDoS attacks.
Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members:
Casper Commented on March 02, 2026 q219 and q 220 the same Anonymous
Mikser Commented on February 27, 2026 Question 26 and 36 are not correct shows Anonymous
saira Commented on September 05, 2025 great quality Anonymous
DEVENDRA Commented on September 04, 2025 HOW CAN I USE Simulator software (.EXM) FOR pRACTICE UNITED STATES
sac Commented on August 07, 2025 reveiew q 36 UNITED STATES
Sasco Commented on July 31, 2025 This site is accurate UNITED STATES
Phany Commented on July 07, 2025 A network engineer is configuring DMVPN and entered the crypto isakmp key cisc0380739941 address 0.0.0.0 command on host Should be the same on hostB POLAND
Phany Commented on July 07, 2025 Really usefull POLAND
Anonymous Commented on May 12, 2025 Q130 the correct answer is aaa new-model. This command enable AAA UNITED STATES
David A Commented on January 16, 2024 Good Colombia Anonymous
Kim Commented on May 25, 2023 I just purchased and downloaded my files. Everything looks good so far. UNITED STATES