Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Online Training
Cisco 350-701 Online Training
The questions for 350-701 were last updated at Oct 16,2025.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Oct 16,2025
What can be integrated with Cisco Threat Intelligence Director to provide information about security threats, which allows the SOC to proactively automate responses to those threats?
- A . Cisco Umbrella
- B . External Threat Feeds
- C . Cisco Threat Grid
- D . Cisco Stealthwatch
Refer to the exhibit.
Which statement about the authentication protocol used in the configuration is true?
- A . The authentication request contains only a password
- B . The authentication request contains only a username
- C . The authentication and authorization requests are grouped in a single packet
- D . There are separate authentication and authorization request packets
Which technology is used to improve web traffic performance by proxy caching?
- A . WSA
- B . Firepower
- C . FireSIGHT
- D . ASA
A network engineer has entered the snmp-server user andy myv3 auth sha cisco priv aes 256 cisc0380739941 command and needs to send SNMP information to a host at 10.255.254.1.
Which command achieves this goal?
- A . snmp-server host inside 10.255.254.1 version 3 andy
- B . snmp-server host inside 10.255.254.1 version 3 myv3
- C . snmp-server host inside 10.255.254.1 snmpv3 andy
- D . snmp-server host inside 10.255.254.1 snmpv3 myv3
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
- A . 1
- B . 2
- C . 6
- D . 31
For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two)
- A . Windows service
- B . computer identity
- C . user identity
- D . Windows firewall
- E . default browser
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
- A . Time-based one-time passwords
- B . Data loss prevention
- C . Heuristic-based filtering
- D . Geolocation-based filtering
- E . NetFlow
Which feature within Cisco Umbrella allows for the ability to inspect secure HTTP traffic?
- A . File Analysis
- B . SafeSearch
- C . SSL Decryption
- D . Destination Lists
Which policy is used to capture host information on the Cisco Firepower Next Generation Intrusion Prevention System?
- A . Correlation
- B . Intrusion
- C . Access Control
- D . Network Discovery
Which SNMPv3 configuration must be used to support the strongest security possible?
- A . asa-host(config)#snmp-server group myv3 v3 priv
asa-host(config)#snmp-server user andy myv3 auth sha cisco priv des ciscXXXXXXXX
asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy - B . asa-host(config)#snmp-server group myv3 v3 noauth
asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX
asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy - C . asa-host(config)#snmpserver group myv3 v3 noauth
asa-host(config)#snmp-server user andy myv3 auth sha cisco priv 3des ciscXXXXXXXX
asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy - D . asa-host(config)#snmp-server group myv3 v3 priv
asa-host(config)#snmp-server user andy myv3 auth sha cisco priv aes 256 ciscXXXXXXXX
asa-host(config)#snmp-server host inside 10.255.254.1 version 3 andy