Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

300-735 Cisco Automating and Programming Cisco Security Solutions (300-735 SAUTO) Free Practice Exam Questions (2025 Updated)

Prepare effectively for your Cisco 300-735 Automating and Programming Cisco Security Solutions (300-735 SAUTO) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Which URI string is used to create a policy that takes precedence over other applicable policies that are configured on Cisco Stealthwatch?

A.

/tenants/{tenantId}/policy/system/host-policy

B.

/tenants/{tenantId}/policy/system/role-policy

C.

/tenants/{tenantId}/policy/system

D.

/tenants/{tenantId}/policy/system/{policyId}

Drag and drop the items to complete the pxGrid script to retrieve all Adaptive Network Control policies. Assume that username, password, and base URL are correct. Not all options are used.

Refer to the exhibit.

Which expression prints the text "802.1x"?

A.

print(quiz[0]['choices']['b'])

B.

print(quiz['choices']['b'])

C.

print(quiz[0]['choices']['b']['802.1x'])

D.

print(quiz[0]['QUESTION NO:']['choices']['b'])

Which snippet is used to create an object for network 10.0.69.0/24 using Cisco Firepower Management Center REST APIs?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

What are two advantages of Python virtual environments? (Choose two.)

A.

Virtual environments can move compiled modules between different platforms.

B.

Virtual environments permit non-administrative users to install packages.

C.

The application code is run in an environment that is destroyed upon exit.

D.

Virtual environments allow for stateful high availability.

E.

Virtual environments prevent packaging conflicts between multiple Python projects.

A Python script is being developed to return the top 10 identities in an organization that have made a DNS request to "www.cisco.com ".

Drag and drop the code to complete the Cisco Umbrella Reporting API query to return the top identities. Not all options are used.

Drag and drop the items to complete the curl request to the ThreatGRID API. The API call should request the first 10 IP addresses that ThreatGRID saw samples communicate with during analysis, in the first two hours of January 18th (UTC time), where those communications triggered a Behavior Indicator that had a confidence equal to or higher than 75 and a severity equal to or higher than 95.

Drag and drop the code to complete the URL for the Cisco AMP for Endpoints API POST request so that it will add a sha256 to a given file_list using file_list_guid.

Which curl command lists all tags (host groups) that are associated with a tenant using the Cisco Stealthwatch Enterprise API?

A.

curl -X PUT"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/

{tenant_id}/tags

B.

curl -X POST -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/ tenants/tags

C.

curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/

{tenant_id}/tags

D.

curl -X GET -H"Cookie:{Cookie Data}"https://{stealthwatch_host}/smc-configuration/rest/v1/tenants/ tags

Which query parameter is required when using the reporting API of Cisco Security Management Appliances?

A.

device_type

B.

query_type

C.

filterValue

D.

startDate + endDate

Refer to the exhibit.

A network operator wants to add a certain IP to a DMZ tag.

Which code segment completes the script and achieves the goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

The script outputs too many results when it is queried against the Cisco Umbrella Reporting API.

Which two configurations restrict the returned result to only 10 entries? (Choose two.)

A.

Add params parameter in the get and assign in the {"return": "10"} value.

B.

Add ?limit=10 to the end of the URL string.

C.

Add params parameter in the get and assign in the {"limit": "10"} value.

D.

Add ?find=10 to the end of the URL string.

E.

Add ?return=10 to the end of the URL string.

Which API is used to query if the domain “example.com” has been flagged as malicious by the Cisco Security Labs team?

A.

https://s-platform.api.opendns.com/1.0/events?example.com

B.

https://investigate.api.umbrella.com/domains/categorization/example.com

C.

https://investigate.api.umbrella.com/domains/volume/example.com

D.

https://s-platform.api.opendns.com/1.0/domains?example.com

Refer to the exhibit.

A network operator must generate a daily flow report and learn how to act on or manipulate returned data. When the operator runs the script, it returns an enormous amount of information.

Which two actions enable the operator to limit returned data? (Choose two.)

A.

Add recordLimit. followed by an integer (key:value) to the flow_data.

B.

Add a for loop at the end of the script, and print each key value pair separately.

C.

Add flowLimit, followed by an integer (key:value) to the flow_data.

D.

Change the startDateTime and endDateTime values to include smaller time intervals.

E.

Change the startDate and endDate values to include smaller date intervals.

Which snippet describes the way to create an URL object in Cisco FDM using FDM REST APIs with curl?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Drag and drop the code to complete the script to search Cisco ThreatGRID and return all public submission records associated with cisco.com. Not all options are used.

Which two destinations are supported by the Cisco Security Management Appliance reporting APIs? (Choose two.)

A.

email

B.

Microsoft Word file

C.

FTP

D.

web

E.

csv file

Which header set should be sent with all API calls to the Cisco Stealthwatch Cloud API?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved