Cisco 350-701 Practice Exams
Last updated on Apr 01,2025- Exam Code: 350-701
- Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
- Certification Provider: Cisco
- Latest update: Apr 01,2025
Which form of attack is launched using botnets?
- A . EIDDOS
- B . virus
- C . DDOS
- D . TCP flood
Which two application layer preprocessors are used by Firepower Next Generation Intrusion Prevention System? (Choose two)
- A . packet decoder
- B . SIP
- C . modbus
- D . inline normalization
- E . SSL
Which protocol provides the strongest throughput performance when using Cisco AnyConnect VPN?
- A . TLSv1.2
- B . TLSv1.1
- C . BJTLSv1
- D . DTLSv1
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
- A . Time-based one-time passwords
- B . Data loss prevention
- C . Heuristic-based filtering
- D . Geolocation-based filtering
- E . NetFlow
Which attack is commonly associated with C and C++ programming languages?
- A . cross-site scripting
- B . water holing
- C . DDoS
- D . buffer overflow
What is a characteristic of Dynamic ARP Inspection?
- A . DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database.
- B . In a typical network, make all ports as trusted except for the ports connecting to switches, which Are untrusted
- C . DAI associates a trust state with each switch.
- D . DAI intercepts all ARP requests and responses on trusted ports only.
Which two endpoint measures are used to minimize the chances of falling victim to phishing and social
engineering attacks? (Choose two)
- A . Patch for cross-site scripting.
- B . Perform backups to the private cloud.
- C . Protect against input validation and character escapes in the endpoint.
- D . Install a spam and virus email filter.
- E . Protect systems with an up-to-date antimalware program
Which policy represents a shared set of features or parameters that define the aspects of a managed device that are likely to be similar to other managed devices in a deployment?
- A . Group Policy
- B . Access Control Policy
- C . Device Management Policy
- D . Platform Service Policy
Which feature is supported when deploying Cisco ASAv within AWS public cloud?
- A . multiple context mode
- B . user deployment of Layer 3 networks
- C . IPv6
- D . clustering
What are two rootkit types? (Choose two)
- A . registry
- B . virtual
- C . bootloader
- D . user mode
- E . buffer mode