Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Online Training
Cisco 350-701 Online Training
The questions for 350-701 were last updated at Oct 14,2025.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Oct 14,2025
How is Cisco Umbrella configured to log only security events?
- A . per policy
- B . in the Reporting settings
- C . in the Security Settings section
- D . per network in the Deployments section
What is a language format designed to exchange threat intelligence that can be transported over the TAXII protocol?
- A . STIX
- B . XMPP
- C . pxGrid
- D . SMTP
Which ASA deployment mode can provide separation of management on a shared appliance?
- A . DMZ multiple zone mode
- B . transparent firewall mode
- C . multiple context mode
- D . routed mode
What is the primary benefit of deploying an ESA in hybrid mode?
- A . You can fine-tune its settings to provide the optimum balance between security and performance for your environment
- B . It provides the lowest total cost of ownership by reducing the need for physical appliances
- C . It provides maximum protection and control of outbound messages
- D . It provides email security while supporting the transition to the cloud
Which statement about the configuration of Cisco ASA NetFlow v9 Secure Event Logging is true?
- A . To view bandwidth usage for NetFlow records, the QoS feature must be enabled.
- B . A sysopt command can be used to enable NSEL on a specific interface.
- C . NSEL can be used without a collector configured.
- D . A flow-export event type must be defined under a policy
An MDM provides which two advantages to an organization with regards to device management? (Choose two)
- A . asset inventory management
- B . allowed application management
- C . Active Directory group policy management
- D . network device management
- E . critical device management
Which two request of REST API are valid on the Cisco ASA Platform? (Choose two)
- A . put
- B . options
- C . get
- D . push
- E . connect
Which PKI enrollment method allows the user to separate authentication and enrollment actions and also provides an option to specify HTTP/TFTP commands to perform file retrieval from the server?
- A . url
- B . terminal
- C . profile
- D . selfsigned
After deploying a Cisco ESA on your network, you notice that some messages fail to reach their destinations.
Which task can you perform to determine where each message was lost?
- A . Configure the trackingconfig command to enable message tracking.
- B . Generate a system report.
- C . Review the log files.
- D . Perform a trace.
Which two mechanisms are used to control phishing attacks? (Choose two)
- A . Enable browser alerts for fraudulent websites.
- B . Define security group memberships.
- C . Revoke expired CRL of the websites.
- D . Use antispyware software.
- E . Implement email filtering techniques.