Cisco 350-701 Real Exam Questions
The questions for 350-701 were last updated at Nov 21,2024.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Nov 21,2024
An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?
- A . Cisco Identity Services Engine and AnyConnect Posture module
- B . Cisco Stealthwatch and Cisco Identity Services Engine integration
- C . Cisco ASA firewall with Dynamic Access Policies configured
- D . Cisco Identity Services Engine with PxGrid services enabled
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
- A . hypervisor
- B . virtual machine
- C . network
- D . application
Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?
- A . It allows the endpoint to authenticate with 802.1x or MAB.
- B . It verifies that the endpoint has the latest Microsoft security patches installed.
- C . It adds endpoints to identity groups dynamically.
- D . It allows CoA to be applied if the endpoint status is compliant.
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.
Which task can you perform to determine where each message was lost?
- A . Configure the trackingconfig command to enable message tracking.
- B . Generate a system report.
- C . Review the log files.
- D . Perform a trace.
The Cisco ASA must support TLS proxy for encrypted Cisco Unified Communications traffic. Where must the ASA be added on the Cisco UC Manager platform?
- A . Certificate Trust List
- B . Endpoint Trust List
- C . Enterprise Proxy Service
- D . Secured Collaboration Proxy
Which form of attack is launched using botnets?
- A . EIDDOS
- B . virus
- C . DDOS
- D . TCP flood
What is the function of Cisco Cloudlock for data security?
- A . data loss prevention
- B . controls malicious cloud apps
- C . detects anomalies
- D . user and entity behavior analytics
Which two descriptions of AES encryption are true? (Choose two)
- A . AES is less secure than 3DES.
- B . AES is more secure than 3DES.
- C . AES can use a 168-bit key for encryption.
- D . AES can use a 256-bit key for encryption.
- E . AES encrypts and decrypts a key three times in sequence.
Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?
- A . user input validation in a web page or web application
- B . Linux and Windows operating systems
- C . database
- D . web page images
Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware? (Choose two)
- A . Sophos engine
- B . white list
- C . RAT
- D . outbreak filters
- E . DLP