Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Online Training
Cisco 350-701 Online Training
The questions for 350-701 were last updated at Oct 16,2025.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Oct 16,2025
A network administrator configures Dynamic ARP Inspection on a switch. After Dynamic ARP Inspection is applied, all users on that switch are unable to communicate with any destination. The network administrator checks the interface status of all interfaces, and there is no err-disabled interface.
What is causing this problem?
- A . DHCP snooping has not been enabled on all VLANs.
- B . The ip arp inspection limit command is applied on all interfaces and is blocking the traffic of all users.
- C . Dynamic ARP Inspection has not been enabled on all VLANs
- D . The no ip arp inspection trust command is applied on all user host interfaces
When web policies are configured in Cisco Umbrella, what provides the ability to ensure that domains are blocked when they host malware, command and control, phishing, and more threats?
- A . Application Control
- B . Security Category Blocking
- C . Content Category Blocking
- D . File Analysis
Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two)
- A . exploits
- B . ARP spoofing
- C . denial-of-service attacks
- D . malware
- E . eavesdropping
In a PaaS model, which layer is the tenant responsible for maintaining and patching?
- A . hypervisor
- B . virtual machine
- C . network
- D . application
What is the function of Cisco Cloudlock for data security?
- A . data loss prevention
- B . controls malicious cloud apps
- C . detects anomalies
- D . user and entity behavior analytics
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
- A . Cisco Security Intelligence
- B . Cisco Application Visibility and Control
- C . Cisco Model Driven Telemetry
- D . Cisco DNA Center
Which function is the primary function of Cisco AMP threat Grid?
- A . automated email encryption
- B . applying a real-time URI blacklist
- C . automated malware analysis
- D . monitoring network traffic
Which two deployment modes does the Cisco ASA FirePower module support? (Choose two)
- A . transparent mode
- B . routed mode
- C . inline mode
- D . active mode
- E . passive monitor-only mode
An engineer needs a solution for TACACS+ authentication and authorization for device administration.
The engineer also wants to enhance wired and wireless network security by requiring users and endpoints to use 802.1X, MAB, or WebAuth.
Which product meets all of these requirements?
- A . Cisco Prime Infrastructure
- B . Cisco Identity Services Engine
- C . Cisco Stealthwatch
- D . Cisco AMP for Endpoints
Which benefit does endpoint security provide the overall security posture of an organization?
- A . It streamlines the incident response process to automatically perform digital forensics on the endpoint.
- B . It allows the organization to mitigate web-based attacks as long as the user is active in the domain.
- C . It allows the organization to detect and respond to threats at the edge of the network.
- D . It allows the organization to detect and mitigate threats that the perimeter security devices do not detect.