Questions for the 300-735 were updated on : Dec 06 ,2025
A developer has just completed the configuration of an API that connects sensitive internal systems.
Based on company policies, the security of the data is a high priority.
Which approach must be taken to secure API keys and passwords?
D
Which two methods are API security best practices? (Choose two.)
AC
DRAG DROP
Drag and drop the items to complete the curl request to the ThreatGRID API. The API call should
request the first 10 IP addresses that ThreatGRID saw samples communicate with during analysis, in
the first two hours of January 18th (UTC time), where those communications triggered a Behavior
Indicator that had a confidence equal to or higher than 75 and a severity equal to or higher than 95.

Reference:
https://support.umbrella.com/hc/en-us/articles/231248768-Cisco-Umbrella-Cisco-AMP-Threat-Grid-
Cloud
- Integration-Setup-Guide
DRAG DROP
Drag and drop the code to complete the URL for the Cisco AMP for Endpoints API POST request so
that it will add a sha256 to a given file_list using file_list_guid.

Reference:
https://api-docs.amp.cisco.com/api_actions/details?api_action=POST+%2Fv1%2Ffile_lists%2F%7B%
3Afile_list_guid%7D%2Ffiles%2F%7B%3Asha256%7D&api_host=api.eu.amp.cisco.com&api_resource
=File
+List+Item&api_version=v1
DRAG DROP
Drag and drop the code to complete the curl query to the Cisco Umbrella Investigate API for the
Latest Malicious Domains for the IP address 10.10.20.50. Not all options are used.

Reference:
https://docs.umbrella.com/investigate-api/reference#about-the-api-and-authentication
Which URI string is used to create a policy that takes precedence over other applicable policies that
are configured on Cisco Stealthwatch?
A
Which step is required by Cisco pxGrid providers to expose functionality to consumer applications
that are written in Python?
D
Which query parameter is required when using the reporting API of Cisco Security Management
Appliances?
D
Refer to the exhibit.
What is the purpose of the API represented by this URL?
D
DRAG DROP
Drag and drop the items to complete the pxGrid script to retrieve all Adaptive Network Control
policies. Assume that username, password, and base URL are correct. Not all options are used.

Reference:
https://developer.cisco.com/docs/pxgrid/#!retreiving-all-anc-polices/java-sample-code
What is the purpose of the snapshot APIs exposed by Cisco Stealthwatch Cloud?
B
Refer to the exhibit. A network operator wrote a Python script to retrieve events from Cisco AMP.
Against which API gateway must the operator make the request?
A
Which request searches for a process window in Cisco ThreatGRID that contains the word “secret”?
D
Which snippet describes the way to create an URL object in Cisco FDM using FDM REST APIs with
curl?
A)
B)
C)
D)
B
Which API is used to query if the domain “example.com” has been flagged as malicious by the Cisco
Security Labs team?
A.
https://s-platform.api.opendns.com/1.0/events?example.com
B.
https://investigate.api.umbrella.com/domains/categorization/example.com
C.
https://investigate.api.umbrella.com/domains/volume/example.com
D.
https://s-platform.api.opendns.com/1.0/domains?example.com
B