Cisco 350-701 dumps

Cisco 350-701 Exam Dumps

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
699 Reviews

Exam Code 350-701
Exam Name Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)
Questions 630 Questions Answers With Explanation
Update Date July 07,2025
Price Was : $88.2 Today : $49 Was : $106.2 Today : $59 Was : $124.2 Today : $69

Pass the 350-701 Exam on Your First Try – 100% Guaranteed Study Material

Struggling to find the right resources to prepare for the Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) certification? Your search ends here. At Certionary, we offer real exam-based dumps and expertly crafted study guides that mirror the actual exam format — giving you everything you need to pass with confidence.

Why Choose Certionary for 350-701?

  • Verified Exam Questions & Answers – Straight from real exam patterns
  • Accurate & Updated Content – Covers the latest 350-701 syllabus
  • Downloadable PDF Format – Study offline anytime, anywhere
  • Designed for Fast Learning – No filler, just what you need to know
  • 100% Pass Guarantee – Or your money back

We don’t just help you prepare — we guarantee your success.

What’s Inside?

  • Full collection of 350-701 real questions & verified answers
  • Practice materials that reflect actual exam difficulty
  • Clear explanations to help you understand, not just memorize
  • Easy-to-navigate PDF files — use on your phone, tablet, or desktop
  • Lifetime access & free future updates

Our dumps are trusted by thousands of IT professionals around the world. You study less, learn more, and pass faster. Why take risks with outdated material or generic practice questions? With Certionary, you get precisely what you need to pass — no guesswork, no stress.

Cisco 350-701 Exam Reviews

Cisco 350-701 Sample Questions

Question # 1

What is the difference between EPP and EDR?

A. EPP focuses primarily on threats that have evaded front-line defenses that entered theenvironment. 
B. Having an EPP solution allows an engineer to detect, investigate, and remediatemodern threats. 
C. EDR focuses solely on prevention at the perimeter. 
D. Having an EDR solution gives an engineer the capability to flag offending files at the firstsign of malicious behavior. 



Question # 2

Cisco Umbrella is a cloud-delivered network security service that provides DNSlayer security, secure web gateway, cloud-delivered firewall, cloud access securitybroker, and threat intelligence3. It does not offer data security features such asDLP, data inspection, and data blocking4.Cisco AppDynamics Cloud Monitoring is a cloud-native application performancemanagement solution that helps you monitor, troubleshoot, and optimize yourcloud applications. It does not offer user security, data security, or app securityfeatures as a CASB solution.Cisco Stealthwatch is a network traffic analysis solution that provides visibility andthreat detection across your network, endpoints, and cloud. It does not offer datasecurity features such as DLP, data inspection, and data blocking.References: 3: Cisco Umbrella Packages - Cisco Umbrella 1: Cisco Cloudlock - Cisco 2:Cisco Cloudlock Cisco Cloudlock: Secure Cloud Data 4: Easy to Deploy & Simple toManage CASB Solution - Cisco Umbrella : Cisco AppDynamics Cloud Monitoring : CiscoStealthwatch - Cisco

A. signature-based endpoint protection on company endpoints 
B. macro-based protection to keep connected endpoints safe 
C. continuous monitoring of all files that are located on connected endpoints 
D. email integration to protect endpoints from malicious content that is located in email 
E. real-time feeds from global threat intelligence centers 



Question # 3

An engineer is trying to decide whether to use Cisco Umbrella, Cisco CloudLock, CiscoStealthwatch, or Cisco AppDynamics Cloud Monitoring for visibility into data transfers aswell as protection against data exfiltration Which solution best meets these requirements?

A. Cisco CloudLock 
B. Cisco AppDynamics Cloud Monitoring 
C. Cisco Umbrella 
D. Cisco Stealthwatch



Question # 4

An engineer needs to detect and quarantine a file named abc424400664 zip based on theMD5 signature of the file using the Outbreak Control list feature within Cisco AdvancedMalware Protection (AMP) for Endpoints The configured detection method must work onfiles of unknown disposition Which Outbreak Control list must be configured to providethis?

A. Blocked Application 
B. Simple Custom Detection 
C. Advanced Custom Detection 
D. Android Custom Detection 



Question # 5

Which Cisco network security device supports contextual awareness?

A. Firepower 
B. CISCO ASA 
C. Cisco IOS 
D. ISE 



Question # 6

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices. Thedefault managementport conflicts with other communications on the network and must be changed. What mustbe done to ensurethat all devices can communicate together?

A. Manually change the management port on Cisco FMC and all managed Cisco FTD devices
B. Set the tunnel to go through the Cisco FTD
C. Change the management port on Cisco FMC so that it pushes the change to allmanaged Cisco FTD devices
D. Set the tunnel port to 8305 



Question # 7

Which configuration method provides the options to prevent physical and virtual endpoint devices that are in the same base EPG or uSeg from being able to communicate with each other with Vmware VDS or Microsoft vSwitch?

A. inter-EPG isolation 
B. inter-VLAN security 
C. intra-EPG isolation 
D. placement in separate EPGs 



Question # 8

Which role is a default guest type in Cisco ISE?

A. Monthly 
B. Yearly 
C. Contractor 
D. Full-Time



Question # 9

An engineer is implementing DHCP security mechanisms and needs the ability to addadditional attributes to profiles that are created within Cisco ISE Which action accomplishesthis task?

A. Define MAC-to-lP address mappings in the switch to ensure that rogue devices cannotget an IP address 
B. Use DHCP option 82 to ensure that the request is from a legitimate endpoint and sendthe information to Cisco ISE 
C. Modify the DHCP relay and point the IP address to Cisco ISE. 
D. Configure DHCP snooping on the switch VLANs and trust the necessary interfaces



Question # 10

Which threat intelligence standard contains malware hashes?

A. advanced persistent threat 
B. open command and control  
C. structured threat information expression 
D. trusted automated exchange of indicator information



Question # 11

What are two functions of IKEv1 but not IKEv2? (Choose two)

A. NAT-T is supported in IKEv1 but rot in IKEv2. 
B. With IKEv1, when using aggressive mode, the initiator and responder identities arepassed cleartext 
C. With IKEv1, mode negotiates faster than main mode  
D. IKEv1 uses EAP authentication 
E. IKEv1 conversations are initiated by the IKE_SA_INIT message



Question # 12

A network administrator is setting up Cisco FMC to send logs to Cisco Security Analyticsand Logging (SaaS). The network administrator is anticipating a high volume of loggingevents from the firewalls and wants lo limit the strain on firewall resources. Which methodmust the administrator use to send these logs to Cisco Security Analytics and Logging?

A. SFTP using the FMCCLI  
B. syslog using the Secure Event Connector 
C. direct connection using SNMP traps 
D. HTTP POST using the Security Analytics FMC plugin



Question # 13

Which open standard creates a framework for sharing threat intelligence in a machine digestible format?

A. OpenC2 
B. OpenlOC 
C. CybOX 
D. STIX 



Question # 14

Which two actions does the Cisco identity Services Engine posture module provide thatensures endpoint security?(Choose two.)

A. The latest antivirus updates are applied before access is allowed. 
B. Assignments to endpoint groups are made dynamically, based on endpoint attributes. 
C. Patch management remediation is performed.  
D. A centralized management solution is deployed. 
E. Endpoint supplicant configuration is deployed.



Question # 15

How does the Cisco WSA enforce bandwidth restrictions for web applications?

A. It implements a policy route to redirect application traffic to a lower-bandwidth link. 
B. It dynamically creates a scavenger class QoS policy and applies it to each client thatconnects through the WSA. 
C. It sends commands to the uplink router to apply traffic policing to the application traffic. 
D. It simulates a slower link by introducing latency into application traffic. 



Question # 16

An engineer is configuring Cisco WSA and needs to deploy it in transparent mode. Whichconfiguration component must be used to accomplish this goal?

A. MDA on the router 
B. PBR on Cisco WSA 
C. WCCP on switch 
D. DNS resolution on Cisco WSA



Question # 17

An engineer is configuring cloud logging using a company-managed Amazon S3 bucket forCisco Umbrella logs. What benefit does this configuration provide for accessing log data?

A. It is included m the license cost for the multi-org console of Cisco Umbrella 
B. It can grant third-party SIEM integrations write access to the S3 bucket 
C. No other applications except Cisco Umbrella can write to the S3 bucket 
D. Data can be stored offline for 30 days



Question # 18

An engineer is configuring IPsec VPN and needs an authentication protocol that is reliableand supports ACKand sequence. Which protocol accomplishes this goal?

A. AES-192 
B. IKEv1 
C. AES-256 
D. ESP



Question # 19

With regard to RFC 5176 compliance, how many IETF attributes are supported by theRADIUS CoA feature?

A. 3 
B. 5 
C. 10 
D. 12 



Question # 20

Which Cisco security solution gives the most complete view of the relationships andevolution of Internet domains IPs, and flies, and helps to pinpoint attackers' infrastructuresand predict future threat?

A. Cisco Secure Network Analytics 
B. Cisco Secure Cloud Analytics  
C. Cisco Umbrella Investigate 
D. Cisco pxGrid



Question # 21

An administrator enables Cisco Threat Intelligence Director on a Cisco FMC. Whichprocess uses STIX and allows uploads and downloads of block lists?

A. consumption 
B. sharing 
C. editing 
D. authoring 



Question # 22

In which two ways does the Cisco Advanced Phishing Protection solution protect users?(Choose two.)

A. It prevents use of compromised accounts and social engineering. 
B. It prevents all zero-day attacks coming from the Internet. 
C. It automatically removes malicious emails from users' inbox. 
D. It prevents trojan horse malware using sensors. 
E. It secures all passwords that are shared in video conferences. 



Question # 23

What are two recommended approaches to stop DNS tunneling for data exfiltration andcommand and control call backs? (Choose two.)

A. Use intrusion prevention system. 
B. Block all TXT DNS records. 
C. Enforce security over port 53. 
D. Use next generation firewalls. 
E. Use Cisco Umbrella



Question # 24

For a given policy in Cisco Umbrella, how should a customer block website based on acustom list?

A. by specifying blocked domains in me policy settings 
B. by specifying the websites in a custom blocked category 
C. by adding the websites to a blocked type destination list
D. by adding the website IP addresses to the Cisco Umbrella blocklist 



Question # 25

An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure thatrogue NTP servers cannot insert themselves as the authoritative time source Which twosteps must be taken to accomplish this task? (Choose two)

A. Specify the NTP version 
B. Configure the NTP stratum 
C. Set the authentication key 
D. Choose the interface for syncing to the NTP server 
E. Set the NTP DNS hostname 



Question # 26

A security test performed on one of the applications shows that user input is not validated.Which security vulnerability is the application more susceptible to because of this lack ofvalidation?

A. denial -of-service  
B. cross-site request forgery 
C. man-in-the-middle 
D. SQL injection



Question # 27

Which function is included when Cisco AMP is added to web security?

A. multifactor, authentication-based user identity 
B. detailed analytics of the unknown file's behavior 
C. phishing detection on emails 
D. threat prevention on an infected endpoint



Question # 28

What is the most commonly used protocol for network telemetry?

A. SMTP 
B. SNMP 
C. TFTP 
D. NctFlow



Question # 29

Which two functions does the Cisco Advanced Phishing Protection solution perform intrying to protect from phishing attacks? (Choose two.)

A. blocks malicious websites and adds them to a block list 
B. does a real-time user web browsing behavior analysis 
C. provides a defense for on-premises email deployments 
D. uses a static algorithm to determine malicious 
E. determines if the email messages are malicious



Question # 30

Which two capabilities of Integration APIs are utilized with Cisco DNA center? (Choosetwo)

A. Upgrade software on switches and routers 
B. Third party reporting 
C. Connect to ITSM platforms 
D. Create new SSIDs on a wireless LAN controller 
E. Automatically deploy new virtual routers



Question # 31

What is a difference between GRE over IPsec and IPsec with crypto map?

A. Multicast traffic is supported by IPsec with crypto map. 
B. GRE over IPsec supports non-IP protocols. 
C. GRE provides its own encryption mechanism. 
D. IPsec with crypto map oilers better scalability. 



Question # 32

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.)

A. Create an LDAP authentication realm and disable transparent user identification. 
B. Create NTLM or Kerberos authentication realm and enable transparent useridentification. 
C. Deploy a separate Active Directory agent such as Cisco Context Directory Agent. 
D. The eDirectory client must be installed on each client workstation. 
E. Deploy a separate eDirectory server; the dent IP address is recorded in this server



Question # 33

Which solution is more secure than the traditional use of a username and password andencompasses at least two of the methods of authentication?

A. single-sign on 
B. RADIUS/LDAP authentication 
C. Kerberos security solution 
D. multifactor authentication



Question # 34

Which Cisco security solution provides patch management in the cloud?

A. Cisco Umbrella 
B. Cisco ISE 
C. Cisco CloudLock 
D. Cisco Tetration



Question # 35

Which metric is used by the monitoring agent to collect and output packet loss and jitter information?

A. WSAv performance 
B. AVC performance  
C. OTCP performance 
D. RTP performance



Question # 36

An organization uses Cisco FMC to centrally manage multiple Cisco FTD devices Thedefault management port conflicts with other communications on the network and must be changed What must be done to ensure that all devices can communicate together?

A. Set the sftunnel to go through the Cisco FTD 
B. Change the management port on Cisco FMC so that it pushes the change to allmanaged Cisco FTD devices 
C. Set the sftunnel port to 8305. 
D. Manually change the management port on Cisco FMC and all managed Cisco FTDdevices



Question # 37

Why is it important for the organization to have an endpoint patching strategy?

A. so the organization can identify endpoint vulnerabilities 
B. so the internal PSIRT organization is aware of the latest bugs 
C. so the network administrator is notified when an existing bug is encountered 
D. so the latest security fixes are installed on the endpoints



Question # 38

What is the target in a phishing attack?

A. perimeter firewall 
B. IPS 
C. web server 
D. endpoint 



Question # 39

A network engineer must configure a Cisco ESA to prompt users to enter two forms ofinformation before gaining access The Cisco ESA must also join a cluster machine usingpreshared keys What must be configured to meet these requirements?

A. Enable two-factor authentication through a RADIUS server and then join the cluster byusing the Cisco ESA CLI
B. Enable two-factor authentication through a RADIUS server and then join the cluster byusing the Cisco ESA GUI 
C. Enable two-factor authentication through a TACACS+ server and then join the cluster byusing the Cisco ESA GUI.
D. Enable two-factor authentication through a TACACS+ server and then join the cluster byusing the Cisco ESA CLI



Question # 40

Email security has become a high priority task for a security engineer at a large multinational organization due to ongoing phishing campaigns. To help control this, the engineerhas deployed an Incoming Content Filter with a URL reputation of (-10 00 to -6 00) on theCisco ESA Which action will the system perform to disable any links in messages thatmatch the filter?

A. Defang 
B. Quarantine 
C. FilterAction 
D. ScreenAction



Question # 41

An engineer must configure Cisco AMP for Endpoints so that it contains a list of files thatshould not be executed by users. These files must not be quarantined. Which action meetsthis configuration requirement?

A. Identity the network IPs and place them in a blocked list. .
B. Modify the advanced custom detection list to include these files. 
C. Create an application control blocked applications list. 
D. Add a list for simple custom detection.



Question # 42

Which VMware platform does Cisco ACI integrate with to provide enhanced visibility, provide policy integration and deployment, and implement security policies with access lists?

A. VMware APIC 
B. VMwarevRealize 
C. VMware fusion 
D. VMware horizons



Question # 43

Which Cisco WSA feature supports access control using URL categories?

A. transparent user identification 
B. SOCKS proxy services 
C. web usage controls 
D. user session restrictions



Question # 44

Which API method and required attribute are used to add a device into Cisco DNA Centerwith the native API?

A. GET and serialNumber 
B. userSudiSerlalNos and deviceInfo 
C. POST and name 
D. lastSyncTime and pid



Question # 45

What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physicalSecure Email Gateway?

A. simplifies the distribution of software updates 
B. provides faster performance 
C. provides an automated setup process 
D. enables the allocation of additional resources



Question # 46

A network administrator is modifying a remote access VPN on an FTD managed by anFMC. The administrator wants to offload traffic to certain trusted domains. Theadministrator wants this traffic to go out of the client's local internet and send other internetbound traffic over the VPN Which feature must the administrator configure?

A. dynamic split tunneling 
B. local LAN access 
C. dynamic access policies 
D. reverse route injection



Question # 47

A network security engineer must export packet captures from the Cisco FMC web browserwhile troubleshooting an issue. When navigating to the address https://<FMCIP>/capure/CAPI/pcap/test.pcap, an error 403: Forbidden is given instead of the PCAP file.Which action must the engineer take to resolve this issue?

A. Disable the proxy setting on the browser 
B. Disable the HTTPS server and use HTTP instead 
C. Use the Cisco FTD IP address as the proxy server setting on the browser 
D. Enable the HTTPS server for the device platform policy



Question # 48

Which Cisco security solution determines if an endpoint has the latest OS updates andpatches installed on the system?

A. Cisco Endpoint Security Analytics 
B. Cisco AMP for Endpoints 
C. Endpoint Compliance Scanner 
D. Security Posture Assessment Service



Question # 49

Based on the NIST 800-145 guide, which cloud architecture is provisioned for exclusiveuse by a specific group of consumers from different organizations and may be owned,managed, and operated by one or more of those organizations?

A. hybrid cloud 
B. private cloud 
C. community cloud 
D. public cloud 



Question # 50

An administrator configures a new destination list in Cisco Umbrella so that theorganization can block specific domains for its devices. What should be done to ensure thatall subdomains of domain.com are blocked?

A. Configure the *.com address in the block list. 
B. Configure the *.domain.com address in the block list 
C. Configure the *.domain.com address in the block list 
D. Configure the domain.com address in the block list 



Question # 51

What is a description of microsegmentation?

A. Environments deploy a container orchestration platform, such as Kubernetes, tomanage the application delivery.
B. Environments apply a zero-trust model and specify how applications on different serversor containers can communicate. 
C. Environments deploy centrally managed host-based firewall rules on each server orcontainer.
D. Environments implement private VLAN segmentation to group servers with similarapplications. 



Question # 52

Which two protocols must be configured to authenticate end users to the Cisco WSA?(Choose two.)

A. TACACS+ 
B. CHAP 
C. NTLMSSP 
D. RADIUS 
E. Kerberos



Question # 53

What are two ways that Cisco Container Platform provides value to customers who utilizecloud service providers? (Choose two.)

A. Allows developers to create code once and deploy to multiple clouds 
B. helps maintain source code for cloud deployments 
C. manages Docker containers 
D. manages Kubernetes clusters 
E. Creates complex tasks for managing code



Question # 54

An engineer is configuring their router to send NetfFow data to Stealthwatch which has anIP address of 1 1 11 using the flow record Stea!thwatch406397954 command Whichadditional command is required to complete the flow record?

A. transport udp 2055  
B. match ipv4 ttl 
C. cache timeout active 60 
D. destination 1.1.1.1



Question # 55

A large organization wants to deploy a security appliance in the public cloud to form a siteto-site VPNand link the public cloud environment to the private cloud in the headquarters data center.Which Ciscosecurity appliance meets these requirements?

A. Cisco Cloud Orchestrator  
B. Cisco ASAV 
C. Cisco WSAV 
D. Cisco Stealthwatch Cloud



Question # 56

Which feature is used in a push model to allow for session identification, hostreauthentication, and session termination?

A. AAA attributes 
B. CoA request 
C. AV pair 
D. carrier-grade NAT



Question # 57

Which problem Is solved by deploying a multicontext firewall?

A. overlapping IP addressing plan  
B. more secure policy 
C. resilient high availability design 
D. faster inspection



Question # 58

Which DoS attack uses fragmented packets in an attempt to crash a target machine?

A. teardrop  
B. smurf 
C. LAND 
D. SYN flood



Question # 59

What is a functional difference between Cisco Secure Endpoint and Cisco UmbrellaRoaming Client?

A. Secure Endpoint authenticates users and provides segmentation, and the UmbrellaRoaming Client allows only for VPN connectivity. 
B. Secure Endpoint stops and tracks malicious activity on hosts, and the UmbrellaRoaming Client tracks only URL-based threats. 
C. The Umbrella Roaming Client authenticates users and provides segmentation, andSecure Endpoint allows only for VPN connectivity. 
D. The Umbrella Roaming client stops and tracks malicious activity on hosts, and SecureEndpoint tracks only URL-based threats. 



Question # 60

What is the purpose of the Trusted Automated exchange cyber threat intelligence industrystandard?

A. public collection of threat intelligence feeds 
B. threat intelligence sharing organization 
C. language used to represent security information 
D. service used to exchange security information



Question # 61

A network administrator has configured TACACS on a network device using the keyCisc0467380030 tor authentication purposes. However, users are unable to authenticate.TACACS server is reachable, but authentication is tailing. Which configuration step mustthe administrator complete?

A. Implement synchronized system clock on TACACS server that matches the networkdevice. 
B. Install a compatible operating system version on the TACACS server. 
C. Configure the TACACS key on the server to match with the network device. 
D. Apply an access control list on TACACS server to allow communication with the networkdevice. 



Question # 62

What must be configured on Cisco Secure Endpoint to create a custom detection tile list todetect and quarantine future files?

A. Use the simple custom detection feature and add each detection to the list. 
B. Add a network IP block allowed list to the configuration and add the blocked files. 
C. Create an advanced custom detection and upload the hash of each file 
D. Configure an application control allowed applications list to block the files 



Question # 63

Which method must be used to connect Cisco Secure Workload to external orchestratorsat a client site when the client does not allow incoming connections?

A. source NAT 
B. reverse tunnel 
C. GRE tunnel 
D. destination NAT 



Leave Your Review