Cisco 350-701 Implementing and Operating Cisco Security Core Technologies (SCOR) Online Training
Cisco 350-701 Online Training
The questions for 350-701 were last updated at Oct 18,2025.
- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Oct 18,2025
Which capability is exclusive to a Cisco AMP public cloud instance as compared to a private cloud instance?
- A . RBAC
- B . ETHOS detection engine
- C . SPERO detection engine
- D . TETRA detection engine
Which Cisco command enables authentication, authorization, and accounting globally so that CoA is supported on the device?
- A . aaa server radius dynamic-author
- B . aaa new-model
- C . auth-type all
- D . ip device-tracking
Why would a user choose an on-premises ESA versus the CES solution?
- A . Sensitive data must remain onsite.
- B . Demand is unpredictable.
- C . The server team wants to outsource this service.
- D . ESA is deployed inline.
Which attack is commonly associated with C and C++ programming languages?
- A . cross-site scripting
- B . water holing
- C . DDoS
- D . buffer overflow
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
- A . authenticates the IKEv2 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
- B . authenticates the IP address of the 172.16.0.0/32 peer by using the key ciscXXXXXXXX
- C . authenticates the IKEv1 peers in the 172.16.0.0/16 range by using the key ciscXXXXXXXX
- D . secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
Which statement about IOS zone-based firewalls is true?
- A . An unassigned interface can communicate with assigned interfaces
- B . Only one interface can be assigned to a zone.
- C . An interface can be assigned to multiple zones.
- D . An interface can be assigned only to one zone.
Which type of attack is social engineering?
- A . trojan
- B . phishing
- C . malware
- D . MITM
Which statement describes a traffic profile on a Cisco Next Generation Intrusion Prevention System?
- A . It allows traffic if it does not meet the profile.
- B . It defines a traffic baseline for traffic anomaly deduction.
- C . It inspects hosts that meet the profile with more intrusion rules.
- D . It blocks traffic if it does not meet the profile.
Which two behavioral patterns characterize a ping of death attack? (Choose two)
- A . The attack is fragmented into groups of 16 octets before transmission.
- B . The attack is fragmented into groups of 8 octets before transmission.
- C . Short synchronized bursts of traffic are used to disrupt TCP connections.
- D . Malformed packets are used to crash systems.
- E . Publicly accessible DNS servers are typically used to execute the attack.
Which proxy mode must be used on Cisco WSA to redirect TCP traffic with WCCP?
- A . transparent
- B . redirection
- C . forward
- D . proxy gateway