Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-735 Topic 3 Question 70 Discussion

Actual exam question for Cisco's 300-735 exam
Question #: 70
Topic #: 3
[All 300-735 Questions]

Which API is used to query if the domain ''example.com'' has been flagged as malicious by the Cisco Security Labs team?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Carlton
2 months ago
I hope the answer isn't A, that looks like it's just for event logging. B is my best bet for querying malicious domain status.
upvoted 0 times
Eugene
12 days ago
User 4: I would go with B as well, it sounds like the most relevant option.
upvoted 0 times
...
Georgene
15 days ago
User 3: I'm not sure, but A) https://s-platform.api.opendns.com/1.0/events?example.com doesn't seem right.
upvoted 0 times
...
Mattie
28 days ago
User 2: I agree, that seems like the right API to query malicious domain status.
upvoted 0 times
...
Lorean
1 months ago
User 1: I think the answer is B) https://investigate.api.umbrella.com/domains/categorization/example.com
upvoted 0 times
...
...
Tesha
2 months ago
Hmm, I'm a bit torn between B and C, but I think B makes the most sense. Time to put my cybersecurity skills to the test!
upvoted 0 times
Dong
26 days ago
User 3: Sounds good, let's see if we got it right.
upvoted 0 times
...
Audra
29 days ago
User 2: I agree, let's go with B.
upvoted 0 times
...
Tricia
2 months ago
I think B is the correct answer.
upvoted 0 times
...
...
Adelle
2 months ago
C seems a bit too specific, just looking at the domain volume. I'm confident B is the way to go here.
upvoted 0 times
Lore
29 days ago
User 3: Let's go with option B then, it seems like the most relevant choice.
upvoted 0 times
...
Gayla
1 months ago
Agreed, that API should give us the information we need about the domain.
upvoted 0 times
...
Carmen
1 months ago
I think B) https://investigate.api.umbrella.com/domains/categorization/example.com is the right API to use.
upvoted 0 times
...
...
Katie
2 months ago
Haha, I bet the answer is not D. 'example.com'? Really? That's way too obvious. I'm going with B.
upvoted 0 times
Gerald
29 days ago
User 4: D seems too general, I agree with A.
upvoted 0 times
...
Trina
1 months ago
User 3: C sounds like the right choice to me.
upvoted 0 times
...
Timothy
1 months ago
User 2: I'm going with B, it seems more specific.
upvoted 0 times
...
Denise
2 months ago
I think the answer is A.
upvoted 0 times
...
...
Lemuel
2 months ago
I'm not sure, but I think it could also be A) https://s-platform.api.opendns.com/1.0/events?example.com because OpenDNS is also a part of Cisco Security.
upvoted 0 times
...
Tamra
3 months ago
I agree with Catrice, because Umbrella is a product of Cisco Security and it makes sense to use their API for this query.
upvoted 0 times
...
Catrice
3 months ago
I think the answer is B) https://investigate.api.umbrella.com/domains/categorization/example.com
upvoted 0 times
...
Denny
3 months ago
I'm pretty sure the answer is B. Cisco's Investigate API is specifically designed for these kinds of security-related domain checks.
upvoted 0 times
...
Marya
3 months ago
Option B looks like the correct one. Cisco's Investigate API is used to check domain categorization, which includes malicious domain detection.
upvoted 0 times
Ivan
2 months ago
Exactly, it's a useful tool for security purposes.
upvoted 0 times
...
Chandra
2 months ago
So, we can use that API to check if a domain has been flagged as malicious by Cisco Security Labs.
upvoted 0 times
...
Carmela
2 months ago
Yes, you're correct. The Investigate API is used for domain categorization.
upvoted 0 times
...
Cheryl
2 months ago
I think option B is the right one.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77