350-701 Exam Questions

Total 626 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

What must be used to share data between multiple security products?


A.

Cisco Rapid Threat Containment


B.

Cisco Platform Exchange Grid


C.

Cisco Advanced Malware Protection


D.

Cisco Stealthwatch Cloud





B.
  

Cisco Platform Exchange Grid



How does Cisco Stealthwatch Cloud provide security for cloud environments?


A.

It delivers visibility and threat detection.


B.

It prevents exfiltration of sensitive data.


C.

It assigns Internet-based DNS protection for clients and servers.


D.

It facilitates secure connectivity between public and private networks





A.
  

It delivers visibility and threat detection.



Explanation Cisco Stealthwatch Cloud: Available as an SaaS product offer to
provide visibility and threat detection within public cloud infrastructures such as Amazon
Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP).

Which algorithm provides encryption and authentication for data plane communication?


A.

AES-GCM


B.

SHA-96


C.

AES-256


D.

SHA-384





A.
  

AES-GCM



https://www.cisco.com/c/en/us/td/docs/routers/sdwan/configuration/security/vedge/securitybook/security-overview.html

Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?


A.

It allows the endpoint to authenticate with 802.1x or MAB.


B.

It verifies that the endpoint has the latest Microsoft security patches installed.


C.

It adds endpoints to identity groups dynamically.


D.

It allows CoA to be applied if the endpoint status is compliant.





A.
  

It allows the endpoint to authenticate with 802.1x or MAB.



What Cisco command shows you the status of an 802.1X connection on interface gi0/1?


A.

show authorization status


B.

show authen sess int gi0/1


C.

show connection status gi0/1


D.

show ver gi0/1





B.
  

show authen sess int gi0/1



What is the function of Cisco Cloudlock for data security?


A.

data loss prevention


B.

controls malicious cloud apps


C.

detects anomalies


D.

user and entity behavior analytics





A.
  

data loss prevention



When Cisco and other industry organizations publish and inform users of known security findings and vulnerabilities, which name is used?


A.

Common Security Exploits


B.

Common Vulnerabilities and Exposures


C.

Common Exploits and Vulnerabilities


D.

Common Vulnerabilities, Exploits and Threats





B.
  

Common Vulnerabilities and Exposures



CCNP And CCIE Security Core SCOR 350-701 Official Cert Guide

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two)


A.

data exfiltration


B.

command and control communication


C.

intelligent proxy


D.

snort


E.

URL categorization





A.
  

data exfiltration



B.
  

command and control communication



Reference: https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threatanalytics/
at-aglance-c45-736555.pdf

Which Talos reputation center allows you to track the reputation of IP addresses for email and web traffic?


A.

IP Blacklist Center


B.

File Reputation Center


C.

AMP Reputation Center


D.

IP and Domain Reputation Center





D.
  

IP and Domain Reputation Center



Which form of attack is launched using botnets?


A.

EIDDOS


B.

virus


C.

DDOS


D.

TCP flood





C.
  

DDOS



ExplanationA botnet is a collection of internet-connected devices infected by
malware that allow hackers to control them.Cyber criminals use botnets to instigate botnet
attacks, which include malicious activities such as credentialsleaks, unauthorized access,
data theft and DDoS attacks.


Page 1 out of 63 Pages

Cisco 350-701 Exam Details


Exam Code: 350-701
Exam Name: Cisco Implementing and Operating Cisco Security Core Technologies Exam - SCOR
Certification Name: Cisco Certified Specialist Security Core certification
Certification Provider: Cisco
Exam Questions: 90–110
Exam Time: 120 minutes
Passing Score: 750–850