Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Last Update 7 hours ago Total Questions : 726

The Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) content is now fully updated, with all current exam questions added 7 hours ago. Deciding to include 350-701 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 350-701 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 350-701 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) practice test comfortably within the allotted time.

Question # 4

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which

probe must be enabled for this type of profiling to work?

A.

NetFlow

B.

NMAP

C.

SNMP

D.

DHCP

Question # 5

While using Cisco Secure Firewall ' s Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)

A.

URLs

B.

MAC addresses

C.

Port numbers

D.

IP addresses

E.

Protocol IDs

Question # 6

How is ICMP used an exfiltration technique?

A.

by flooding the destination host with unreachable packets

B.

by sending large numbers of ICMP packets with a targeted hosts source IP address using an IP broadcast address

C.

by encrypting the payload in an ICMP packet to carry out command and control tasks on a compromised host

D.

by overwhelming a targeted host with ICMP echo-request packets

Question # 7

Which two probes are configured to gather attributes of connected endpoints using Cisco Identity Services

Engine? (Choose two)

A.

RADIUS

B.

TACACS+

C.

DHCP

D.

sFlow

E.

SMTP

Question # 8

A mall provides security services to customers with a shared appliance. The mall wants separation of

management on the shared appliance. Which ASA deployment mode meets these needs?

A.

routed mode

B.

transparent mode

C.

multiple context mode

D.

multiple zone mode

Question # 9

An engineer configured a new network identity in Cisco Umbrella but must verify that traffic is being routed

through the Cisco Umbrella network. Which action tests the routing?

A.

Ensure that the client computers are pointing to the on-premises DNS servers.

B.

Enable the Intelligent Proxy to validate that traffic is being routed correctly.

C.

Add the public IP address that the client computers are behind to a Core Identity.

D.

Browse to http://welcome.umbrella.com/ to validate that the new identity is working.

Question # 10

Why is it important for the organization to have an endpoint patching strategy?

A.

so the organization can identify endpoint vulnerabilities

B.

so the internal PSIRT organization is aware of the latest bugs

C.

so the network administrator is notified when an existing bug is encountered

D.

so the latest security fixes are installed on the endpoints

Question # 11

When wired 802.1X authentication is implemented, which two components are required? (Choose two)

A.

authentication server: Cisco Identity Service Engine

B.

supplicant: Cisco AnyConnect ISE Posture module

C.

authenticator: Cisco Catalyst switch

D.

authenticator: Cisco Identity Services Engine

E.

authentication server: Cisco Prime Infrastructure

Question # 12

What is a benefit of using Cisco AVC (Application Visibility and Control) for application control?

A.

management of application sessions

B.

retrospective application analysis

C.

zero-trust approach

D.

dynamic application scanning

Question # 13

Which feature is used in a push model to allow for session identification, host reauthentication, and session termination?

A.

AAA attributes

B.

CoA request

C.

AV pair

D.

carrier-grade NAT

Question # 14

Refer to the exhibit.

How does Cisco Umbrella manage traffic that is directed toward risky domains?

A.

Traffic is proximed through the intelligent proxy.

B.

Traffic is managed by the security settings and blocked.

C.

Traffic is managed by the application settings, unhandled and allowed.

D.

Traffic is allowed but logged.

Question # 15

What are two Trojan malware attacks? (Choose two)

A.

Frontdoor

B.

Rootkit

C.

Smurf

D.

Backdoor

E.

Sync

Go to page: