Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Questions Free

300-735 Practice Questions Free

Table of Contents

Toggle
  • 300-735 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
  • Free Access Full 300-735 Practice Questions Free

300-735 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills

Are you preparing for the 300-735 certification exam? Kickstart your success with our 300-735 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.

Practicing with 300-735 practice questions free gives you a powerful edge by allowing you to:

  • Understand the exam structure and question formats
  • Discover your strong and weak areas
  • Build the confidence you need for test day success

Below, you will find 50 free 300-735 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.

Question 1

Which two statements describe the characteristics of API styles for REST and RPC? (Choose two.)

A. REST-based APIs function in a similar way to procedures.

B. REST-based APIs are used primarily for CRUD operations.

C. REST and RPC API styles are the same.

D. RPC-based APIs function in a similar way to procedures.

E. RPC-based APIs are used primarily for CRUD operations.

 


Suggested Answer: BD

 

Question 2

DRAG DROP -
Drag and drop the code to complete the Cisco Umbrella Investigate WHOIS query that returns a list of domains that are associated with the email address
"
admin@example.com
". Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

https://docs.umbrella.com/investigate-api/docs/whois-information-for-a-domain-1

Question 3

Which two URI parameters are needed for the Cisco Stealthwatch Top Alarm Host v1 API? (Choose two.)

A. startAbsolute

B. externalGeos

C. tenantId

D. intervalLength

E. tagID

 


Suggested Answer: CE

 

Question 4

If the goal is to create an access policy with the default action of blocking traffic, using Cisco Firepower Management Center REST APIs, which snippet is used?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: D

 

Question 5

Image
Refer to the exhibit. A security engineer attempts to query the Cisco Security Management appliance to retrieve details of a specific message.
What must be added to the script to achieve the desired result?

A. Add message ID information to the URL string as a URI.

B. Run the script and parse through the returned data to find the desired message.

C. Add message ID information to the URL string as a parameter.

D. Add message ID information to the headers.

 


Suggested Answer: C

 

Question 6

Which query parameter is required when using the reporting API of Cisco Security Management Appliances?

A. device_type

B. query_type

C. filterValue

D. startDate + endDate

 


Suggested Answer: D

 

Question 7

Which two event types can the eStreamer server transmit to the requesting client from a managed device and a management center? (Choose two.)

A. user activity events

B. intrusion events

C. file events

D. intrusion event extra data

E. malware events

 


Suggested Answer: BD

 

Question 8

After changes are made to the Cisco Firepower Threat Defense configuration using the Cisco Firepower Device Manager API, what must be done to ensure that the new policy is activated?

A. Submit a POST to the /api/fdm/latest/operational/deploy URI.

B. Submit a GET to the /api/fdm/latest/operational/deploy URI.

C. Submit a PUT to the /api/fdm/latest/devicesettings/pushpolicy URI.

D. Submit a POST to the /api/fdm/latest/devicesettings/pushpolicy URI.

 


Suggested Answer: A

 

Question 9

Which two APIs are available from Cisco ThreatGRID? (Choose two.)

A. Access

B. User Scope

C. Data

D. Domains

E. Curated Feeds

 


Suggested Answer: CE

 

Question 10

Image
Refer to the exhibit.
Which URL returned the data?

A. https://api.amp.cisco.com/v1/computers

B. https://api.amp.cisco.com/v0/computers

C. https://amp.cisco.com/api/v0/computers

D. https://amp.cisco.com/api/v1/computers

 


Suggested Answer: A

 

Question 11

Image
Refer to the exhibit.
Which expression prints the text "802.1x"?

A. print(quiz[0][‘choices’][‘b’])

B. print(quiz[‘choices’][‘b’])

C. print(quiz[0][‘choices’][‘b’][‘802.1x’])

D. print(quiz[0][‘question’][‘choices’][‘b’])

 


Suggested Answer: A

 

Question 12

Image
Refer to the exhibit.
What must be present in a Cisco Web Security Appliance before the script is run?

A. reporting group with the name web_malware_category_malware_name_user_detail

B. data for specified dates

C. reporting group with the name blocked_malware

D. data in the queried category

 


Suggested Answer: A

 

Question 13

What are two capabilities of Cisco Firepower Management Center eStreamer? (Choose two.)

A. eStreamer is used to get sources for intelligence services.

B. eStreamer is used to send malware event data.

C. eStreamer is used to get a list of access control policies.

D. eStreamer is used to send policy data.

E. eStreamer is used to send intrusion event data.

 


Suggested Answer: BE

 

Question 14

DRAG DROP -
Drag and drop the code to complete the curl command to query the Cisco Umbrella Investigate API for the umbrella popularity list. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.umbrella.com/investigate-api/reference

Question 15

What are two benefits of Ansible when managing security platforms? (Choose two.)

A. End users can be identified and tracked across a network.

B. Network performance issues can be identified and automatically remediated.

C. Policies can be updated on multiple devices concurrently, which reduces outage windows.

D. Anomalous network traffic can be detected and correlated.

E. The time that is needed to deploy a change is reduced, compared to manually applying the change.

 


Suggested Answer: CE

 

Question 16

Which description of synchronous calls to an API is true?

A. They can be used only within single-threaded processes.

B. They pause execution and wait for the response.

C. They always successfully return within a fixed time.

D. They can be used only for small requests.

 


Suggested Answer: B

 

Question 17

DRAG DROP -
Drag and drop the code to complete the API call to query all Cisco Stealthwatch Cloud observations. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 18

Which snippet describes the way to create an URL object in Cisco FDM using FDM REST APIs with curl?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: B

 

Question 19

DRAG DROP -
 Image
Refer to the exhibit.
Drag and drop the elements from the left onto the script on the right that queries Cisco ThreatGRID for indications of compromise.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://community.cisco.com/t5/endpoint-security/amp-threat-grid-api/m-p/3538319

Question 20

DRAG DROP -
Drag and drop the code to complete the URL for the Cisco AMP for Endpoints API POST request so that it will add a sha256 to a given file_list using file_list_guid.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://api-docs.amp.cisco.com/api_actions/details?api_action=POST+%2Fv1%2Ffile_lists%2F%7B%3Afile_list_guid%7D%2Ffiles%2F%7B%3Asha256%

7D&api_host=api.eu.amp.cisco.com&api_resource=File+List+Item&api_version=v1

Question 21

What are two advantages of Python virtual environments? (Choose two.)

A. Virtual environments can move compiled modules between different platforms.

B. Virtual environments permit non-administrative users to install packages.

C. The application code is run in an environment that is destroyed upon exit.

D. Virtual environments allow for stateful high availability.

E. Virtual environments prevent packaging conflicts between multiple Python projects.

 


Suggested Answer: CE

 

Question 22

Image
Refer to the exhibit. A network operator wants to add a certain IP to a DMZ tag.
Which code segment completes the script and achieves the goal?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: A

 

Question 23

Image
Refer to the exhibit. A security engineer created a script and successfully executed it to retrieve all currently open alerts.
Which print command shows the first returned alert?

A. print(response[data][0])

B. print(response[results][0])

C. print(response.json()[data][0])

D. print(response.json()[results][0])

 


Suggested Answer: A

 

Question 24

Which API capability is available on Cisco Firepower devices?

A. Firepower Management Center – Sockets API

B. Firepower Management Center – eStreamer API

C. Firepower Management Center – Camera API

D. Firepower Management Center – Host Output API

 


Suggested Answer: B

 

Question 25

Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: A

 

Question 26

What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?

A. Report on flow data during a customizable time period.

B. Operate and return alerts discovered from infrastructure observations.

C. Return current configuration data of Cisco Stealthwatch Cloud infrastructure.

D. Create snapshots of supported Cisco Stealthwatch Cloud infrastructure.

 


Suggested Answer: B

 

Question 27

DRAG DROP -
 Image
Refer to the exhibit. A Python function named "query" has been developed, and will be used to query the service "com.cisco.ise.session" via Cisco pxGrid 2.0
APIs.
Drag and drop the code to construct a Python call to the "query" function to identify the user groups that are associated with the user "fred". Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

Question 28

DRAG DROP -
A Python script is being developed to return the top 10 identities in an organization that have made a DNS request to "www.cisco.com".
Drag and drop the code to complete the Cisco Umbrella Reporting API query to return the top identities. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.umbrella.com/umbrella-api/docs/reporting-destinations-most-recent-requests

Question 29

When the URI "/api/fmc_config/v1/domain/e276abec-e0f2-11e3-8169-6d9ed49b625f/policy/accesspolicies" is used to make a POST request, what does
"e276abec-e0f2-11e3-8169-6d9ed49b625f" represent?

A. API token

B. domain UUID

C. access policy UUID

D. object UUID

 


Suggested Answer: B

 

Question 30

Which two API capabilities are available on Cisco Identity Services Engine? (Choose two.)

A. Platform Configuration APIs

B. Monitoring REST APIs

C. Performance Management REST APIs

D. External RESTful Services APIs

E. Internal RESTful Services APIs

 


Suggested Answer: BD

 

Question 31

Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?
A.
 Image
B.
 Image
C.
 Image
D.
 Image

 


Suggested Answer: B

 

Question 32

Image
Refer to the exhibit.
What does the response from the API contain when this code is executed?

A. error message and status code of 403

B. newly created domains in Cisco Umbrella Investigate

C. updated domains in Cisco Umbrella Investigate

D. status and security details for the domains

 


Suggested Answer: D

 

Question 33

Image
Refer to the exhibit. The script outputs too many results when it is queried against the Cisco Umbrella Reporting API.
Which two configurations restrict the returned result to only 10 entries? (Choose two.)

A. Add params parameter in the get and assign in the {“return”: “10”} value.

B. Add ?limit=10 to the end of the URL string.

C. Add params parameter in the get and assign in the {“limit”: “10”} value.

D. Add ?find=10 to the end of the URL string.

E. Add ?return=10 to the end of the URL string.

 


Suggested Answer: BC

 

Question 34

DRAG DROP -
Drag and drop the code to complete the script to search Cisco ThreatGRID and return all public submission records associated with cisco.com. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://community.cisco.com/t5/endpoint-security/amp-threat-grid-api/m-p/3538319

Question 35

Image
Refer to the exhibit. A network operator must create a Python script that makes an API request to Cisco Umbrella to do a pattern search and return all matched
URLs with category information.
Which code completes the script?

A. URL = BASE_URL + “/find/exa[a-z]ple.com” PARAMS = { “categoryinclude” : “true”}

B. URL = BASE_URL + “/find/exa[a-z]ple.com” PARAMS = { “returncategory” : “true”}

C. URL = BASE_URL + “/find/exa[a-z]ple.com” PARAMS = { “includeCategory” : “true”}

D. URL = BASE_URL + “/find/exa[a-z]ple.com” PARAMS = { “returnCategory” : “true”}

 


Suggested Answer: D

 

Question 36

The Cisco Security Management Appliance API is used to make a GET call using the URI /sma/api/v2.0/reporting/mail_incoming_traffic_summary/ detected_amp?startDate=2016-09-10T19:00:00.000Z&endDate=2018-09-24T23:00:00.000Z&device_type=esa&device_name=esa01.
What does this GET call return?

A. values of all counters of a counter group, with the device group name and device type for web

B. value of a specific counter from a counter group, with the device name and type for email

C. value of a specific counter from a counter group, with the device name and type for web

D. values of all counters of a counter group, with the device group name and device type for email

 


Suggested Answer: D

 

Question 37

Which request searches for a process window in Cisco ThreatGRID that contains the word "secret"?

A. /api/v2/search/submissions?term=processwindow&title=secret

B. /api/v2/search/submissions?term=processwindow&q=secret

C. /api/v2/search/submissions?term=window&title=secret

D. /api/v2/search/submissions?term=process&q=secret

 


Suggested Answer: D

 

Question 38

DRAG DROP -
Drag and drop the items to complete the curl request to the ThreatGRID API. The API call should request the first 10 IP addresses that ThreatGRID saw samples communicate with during analysis, in the first two hours of January 18
(UTC time), where those communications triggered a Behavior Indicator that had a th confidence equal to or higher than 75 and a severity equal to or higher than 95.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://support.umbrella.com/hc/en-us/articles/231248768-Cisco-Umbrella-Cisco-AMP-Threat-Grid-Cloud-Integration-Setup-Guide

Question 39

In Cisco AMP for Endpoints, which API queues to find the list of endpoints in the group "Finance Hosts," which has a GUID of 6c3c2005-4c74-4ba7-8dbb- c4d5b6bafe03?

A. https://api.amp.cisco.com/v1/endpoints?group[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03

B. https://api.amp.cisco.com/v1/computers?group_guid[]=6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03

C. https://api.amp.cisco.com/v1/computers?group_guid-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03

D. https://api.amp.cisco.com/v1/endpoints?group-6c3c2005-4c74-4ba7-8dbb-c4d5b6bafe03

 


Suggested Answer: B

 

Question 40

Refer to the exhibit. A network operator wrote a Python script to retrieve events from Cisco AMP.
 Image
Against which API gateway must the operator make the request?

A. BASE_URL = “https://api.amp.cisco.com”

B. BASE_URL = “https://amp.cisco.com/api”

C. BASE_URL = “https://amp.cisco.com/api/”

D. BASE_URL = “https://api.amp.cisco.com/”

 


Suggested Answer: A

 

Question 41

Image
Refer to the exhibit.
What is the purpose of the API represented by this URL?

A. Getting or setting intrusion policies in FMC

B. Creating an intrusion policy in FDM

C. Updating access policies

D. Getting the list of intrusion policies configured in FDM

 


Suggested Answer: D

 

Question 42

Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

A. /tenants/{tenantId}/policy/system/host-policy

B. /tenants/{tenantId}/policy/system/role-policy

C. /tenants/{tenantId}/policy/system

D. /tenants/{tenantId}/policy/system/{policyId}

 


Suggested Answer: A

 

Question 43

Which step is required by Cisco pxGrid providers to expose functionality to consumer applications that are written in Python?

A. Look up the existing service using the /pxgrid/control/ServiceLookup endpoint.

B. Register the service using the /pxgrid/control/ServiceRegister endpoint.

C. Configure the service using the /pxgrid/ise/config/profiler endpoint.

D. Expose the service using the /pxgrid/ise/pubsub endpoint.

 


Suggested Answer: D

 

Question 44

Image
Refer to the exhibit. A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information.
Which two actions enable the operator to limit returned data? (Choose two.)

A. Add recordLimit. followed by an integer (key:value) to the flow_data.

B. Add a for loop at the end of the script, and print each key value pair separately.

C. Add flowLimit, followed by an integer (key:value) to the flow_data.

D. Change the startDateTime and endDateTime values to include smaller time intervals.

E. Change the startDate and endDate values to include smaller date intervals.

 


Suggested Answer: AB

 

Question 45

For which two programming languages does Cisco offer an SDK for Cisco pxGrid 1.0? (Choose two.)

A. Python

B. Perl

C. Java

D. C

E. JavaScript

 


Suggested Answer: CD

 

Question 46

Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)

A. email

B. Microsoft Word file

C. FTP

D. web

E. csv file

 


Suggested Answer: AD

 

Question 47

DRAG DROP -
Drag and drop the items to complete the pxGrid script to retrieve all Adaptive Network Control policies. Assume that username, password, and base URL are correct. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://developer.cisco.com/docs/pxgrid/#!retreiving-all-anc-polices/java-sample-code

Question 48

DRAG DROP -
Drag and drop the code to complete the curl query to the Cisco Umbrella Investigate API for the Latest Malicious Domains for the IP address 10.10.20.50. Not all options are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

Reference:
https://docs.umbrella.com/investigate-api/reference#about-the-api-and-authentication

Question 49

A security network engineer must implement intrusion policies using the Cisco Firepower Management Center API.
Which action does the engineer take to achieve the goal?

A. Make a PATCH request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.

B. Make a POST request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.

C. Intrusion policies can be read but not configured using the Cisco Firepower Management Center API.

D. Make a PUT request to the URI /api/fmc_config/v1/domain/{DOMAIN_UUID}/policy/intrusionpolicies.

 


Suggested Answer: C

 

Question 50

Image
Refer to the exhibit. The security administrator must temporarily disallow traffic that goes to a production web server using the Cisco FDM REST API. The administrator sends an API query as shown in the exhibit.
What is the outcome of that action?

A. The given code does not execute because the mandatory parameters, source, destination, and services are missing.

B. The given code does not execute because it uses the HTTP method “PUT”. It should use the HTTP method “POST”.

C. The appropriate rule is updated with the source, destination, services, and other fields set to “Any” and the action set to “DENY”. Traffic to the production web server is disallowed, as expected.

D. A new rule is created with the source, destination, services, and other fields set to “Any” and the action set to “DENY”. Traffic to the production web server is disallowed, as expected.

 


Suggested Answer: C

 

Free Access Full 300-735 Practice Questions Free

Want more hands-on practice? Click here to access the full bank of 300-735 practice questions free and reinforce your understanding of all exam objectives.

We update our question sets regularly, so check back often for new and relevant content.

Good luck with your 300-735 certification journey!

Share18Tweet11
Previous Post

300-730 Practice Questions Free

Next Post

300-810 Practice Questions Free

Next Post

300-810 Practice Questions Free

300-815 Practice Questions Free

300-820 Practice Questions Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.