Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Online Training
Cisco 350-701 Online Training
The questions for 350-701 were last updated at Oct 18,2025.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Oct 18,2025
Which IPS engine detects ARP spoofing?
- A . Atomic ARP Engine
- B . Service Generic Engine
- C . ARP Inspection Engine
- D . AIC Engine
In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?
- A . Smurf
- B . distributed denial of service
- C . cross-site scripting
- D . rootkit exploit
Which telemetry data captures variations seen within the flow, such as the packets TTL, IP/TCP flags, and payload length?
- A . interpacket variation
- B . software package variation
- C . flow insight variation
- D . process details variation
Which two characteristics of messenger protocols make data exfiltration difficult to detect and prevent? (Choose two)
- A . Outgoing traffic is allowed so users can communicate with outside organizations.
- B . Malware infects the messenger application on the user endpoint to send company data.
- C . Traffic is encrypted, which prevents visibility on firewalls and IPS systems.
- D . An exposed API for the messaging platform is used to send large amounts of data.
- E . Messenger applications cannot be segmented with standard network controls
An engineer is trying to securely connect to a router and wants to prevent insecure algorithms from being used. However, the connection is failing.
Which action should be taken to accomplish this goal?
- A . Disable telnet using the no ip telnet command.
- B . Enable the SSH server using the ip ssh server command.
- C . Configure the port using the ip ssh port 22 command.
- D . Generate the RSA key using the crypto key generate rsa command.
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two)
- A . DDoS
- B . antispam
- C . antivirus
- D . encryption
- E . DLP
Which information is required when adding a device to Firepower Management Center?
- A . username and password
- B . encryption method
- C . device serial number
- D . registration key
Which Cisco security solution protects remote users against phishing attacks when they are not connected to the VPN?
- A . Cisco Stealth watch
- B . Cisco Umbrella
- C . Cisco Firepower
- D . NGIPS
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two)
- A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically
- B . The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.
- C . The IPsec configuration that is set up on the active device must be duplicated on the standby device
- D . Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.
- E . The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device
A company is experiencing exfiltration of credit card numbers that are not being stored on-premise. The company needs to be able to protect sensitive data throughout the full environment.
Which tool should be used to accomplish this goal?
- A . Security Manager
- B . Cloudlock
- C . Web Security Appliance
- D . Cisco ISE