Implementing and
Operating Cisco
SecurityCore
Technologies (SCOR
350-701)
Version: Demo
[ Total Questions: 10]
Web: www.certsout.com
Email: support@certsout.com
Cisco
350-701
2.
IMPORTANT NOTICE
Feedback
We havedeveloped quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@certsout.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.
support@certsout.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
3.
Cisco - 350-701
CertsExam
1 of 8
Pass with Valid Exam Questions Pool
Exam Topic Breakdown
Exam Topic Number of Questions
Topic 2 : Exam Pool B 4
Topic 1 : Exam Pool A 4
Topic 3 : Exam Pool C 2
TOTAL 10
4.
Cisco - 350-701
CertsExam
2 of 8
Pass with Valid Exam Questions Pool
A.
B.
C.
D.
A.
B.
C.
D.
Topic 2, Exam Pool B
Question #:1 - (Exam Topic 2)
Which Dos attack uses fragmented packets to crash a target machine?
smurf
MITM
teardrop
LAND
Answer: C
Explanation
ExplanationExplanationA teardrop attack is a denial-of-service (DoS) attack that involves sending
fragmented packets to a targetmachine. Since the machine receiving such packets cannot reassemble them due
to a bug in TCP/IPfragmentation reassembly, the packets overlap one another, crashing the target network
device. This generally happens on older operating systems such as Windows 3.1x, Windows 95, Windows NT
and versions of the Linux kernel prior to 2.1.63.
Question #:2 - (Exam Topic 2)
What is a difference between DMVPN and sVTI?
DMVPN supports tunnel encryption, whereas sVTI does not.
DMVPN supports dynamic tunnel establishment, whereas sVTI does not.
DMVPN supports static tunnel establishment, whereas sVTI does not.
DMVPN provides interoperability with other vendors, whereas sVTI does not.
Answer: B
Explanation
DMVPN and sVTI are both VPN technologies that use IPsec to secure the tunnel traffic. However, they differ
in how they establish and manage the tunnels. DMVPN supports dynamic tunnel establishment, which means
that the VPN endpoints can create and delete tunnels on demand, based on the routing information. This
allows for a scalable and flexible VPN topology, where the endpoints can communicate directly with each
other without going through a central hub. sVTI, on the other hand, supports static tunnel establishment, which
means that the VPN endpoints have to manually configure the tunnel source and destination addresses. This
requires a one-to-one mapping between the endpoints, and limits the VPN topology to a hub-and-spoke model,
where the endpoints can only communicate with the hub. Therefore, DMVPN is more suitable for large and
dynamic VPN networks, while sVTI is more suitable for small and stable VPN networks. References:
5.
Cisco - 350-701
CertsExam
3 of 8
Pass with Valid Exam Questions Pool
[Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0], Module 5: Secure
Connectivity, Lesson 5.2: Implementing Site-to-Site VPNs, Topic 5.2.3: Dynamic Multipoint VPN
(DMVPN)
what is difference between svti and DVTI? - Cisco Community
Question #:3 - (Exam Topic 2)
Drag and drop the capabilities from the left onto the correct technologies on the right.
Answer:
Explanation
Text, chat or text message Description automatically generated
Question #:4 - (Exam Topic 2)
6.
Cisco - 350-701
CertsExam
4 of 8
Pass with Valid Exam Questions Pool
A.
B.
C.
D.
An engineer needs a cloud solution that will monitor traffic, create incidents based on events, and integrate
with
other cloud solutions via an API. Which solution should be used to accomplish this goal?
SIEM
CASB
Adaptive MFA
Cisco Cloudlock
Answer: D
Reference: https://docs.umbrella.com/cloudlock-documentation/docs/endpointsNote:+ Security information
and event management (SIEM) platforms collect log and event data from securitysystems, networks and
computers, and turn it into actionable security insights.+ An incident is a record of the triggering of an alerting
policy. Cloud Monitoring opens an incident when acondition of an alerting policy has been met.
7.
Cisco - 350-701
CertsExam
5 of 8
Pass with Valid Exam Questions Pool
A.
B.
C.
D.
A.
B.
C.
D.
Topic 1, Exam Pool A
Question #:5 - (Exam Topic 1)
On which part of the IT environment does DevSecOps focus?
application development
wireless network
data center
perimeter network
Answer: A
Explanation
DevSecOps is a development practice that integrates security into all phases of the software development
lifecycle, from initial design through integration, testing, deployment, and software delivery. DevSecOps
focuses on application development, as it aims to deliver secure and robust applications that meet the
customers’ needs and expectations. DevSecOps also makes security a shared responsibility of development,
security, and operations teams, rather than a separate silo. DevSecOps enables faster and safer software
delivery by automating security processes and tools, and addressing security issues as they emerge, rather than
at the end of the cycle.
References :=
Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0, Module 6: Securing the
Data Center, Lesson 6.2: DevSecOps
What Is DevSecOps? Definition and Best Practices | Microsoft Security
What is DevSecOps? | IBM
What is DevSecOps? | DevSecOps vs. DevOps | VMware
Question #:6 - (Exam Topic 1)
When wired 802.1X authentication is implemented, which two components are required? (Choose two)
authentication server: Cisco Identity Service Engine
supplicant: Cisco AnyConnect ISE Posture module
authenticator: Cisco Catalyst switch
authenticator: Cisco Identity Services Engine
8.
Cisco - 350-701
CertsExam
6 of 8
Pass with Valid Exam Questions Pool
E.
A.
B.
C.
D.
A.
authentication server: Cisco Prime Infrastructure
Answer: A C
Explanation
Wired 802.1X authentication is a port-based network access control that uses the physical characteristics of the
switched LAN infrastructure to authenticate devices attached to a LAN port1. Wired 802.1X authentication
requires three components: a supplicant, an authenticator, and an authentication server2. The supplicant is the
client device that requests access to the network. The authenticator is the switch port that controls the access to
the network based on the authentication result. The authentication server is the server that validates the
credentials of the supplicant and sends the authentication result to the authenticator3.
In this question, option A is correct because Cisco Identity Service Engine (ISE) is an example of an
authentication server that supports wired 802.1X authentication4. Option C is correct because Cisco Catalyst
switch is an example of an authenticator that supports wired 802.1X authentication5. Option B is incorrect
because Cisco AnyConnect ISE Posture module is not a supplicant, but a software component that checks the
compliance status of the supplicant. Option D is incorrect because Cisco ISE is not an authenticator, but an
authentication server. Option E is incorrect because Cisco Prime Infrastructure is not an authentication server,
but a network management tool.
References: 1: Wired 802.1X Deployment Guide - Cisco 2: 802.1X Authenticated Wired Access Overview |
Microsoft Learn 3: About 802.1X Authentication - Aruba 4: Cisco Identity Services Engine - Products &
Services - Cisco 5: Cisco Catalyst 2960-X Series Switches - Products & Services - Cisco : Cisco AnyConnect
Secure Mobility Client Administrator Guide, Release 4.9 - Configure Posture [Cisco AnyConnect Secure
Mobility Client] - Cisco : Cisco Prime Infrastructure - Products & Services - Cisco
Question #:7 - (Exam Topic 1)
Which RADIUS attribute can you use to filter MAB requests in an 802.1 x deployment?
1
2
6
31
Answer: C
Reference:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/identity-based-networkingservices/config_guide_
Question #:8 - (Exam Topic 1)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed?
(Choose two)
DDoS
9.
Cisco - 350-701
CertsExam
7 of 8
Pass with Valid Exam Questions Pool
B.
C.
D.
E.
antispam
antivirus
encryption
DLP
Answer: D E
Reference:
https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overv
10.
Cisco - 350-701
CertsExam
8 of 8
Pass with Valid Exam Questions Pool
A.
B.
C.
D.
A.
B.
C.
D.
Topic 3, Exam Pool C
Question #:9 - (Exam Topic 3)
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical
host by using VMware vMotion. What is a requirement for both physical hosts?
The hosts must run Cisco AsyncOS 10.0 or greater.
The hosts must run different versions of Cisco AsyncOS.
The hosts must have access to the same defined network.
The hosts must use a different datastore than the virtual appliance.
Answer: C
Explanation
To migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware
vMotion, both hosts must have access to the same defined network. This is because vMotion preserves the
network identity and connections of the virtual machine, and requires that the source and destination hosts
have compatible CPUs and shared storage1. The hosts do not need to run the same or different versions of
Cisco AsyncOS, as long as they meet the minimum requirements for the virtual appliance2. The hosts do not
need to use a different datastore than the virtual appliance, as vMotion can migrate virtual machines across
datastores as well3. References: 1: VMware vMotion: Live Migration of Virtual Machines and
Storage 2: Cisco Secure Web Appliance Virtual - Cisco 3: Migrating to Virtual SMA from Physical - Cisco
Community
Question #:10 - (Exam Topic 3)
Which Cisco DNA Center Intent API action is used to retrieve the number of devices known to a DNA
Center?
GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device/count
GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/network-device
GET
https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v1/networkdevice?parameter1=value¶meter2=value&..
GET https://fqdnOrlPofDnaCenterPlatform/dna/intent/api/v
1/networkdevice/startIndex/recordsToReturn
Answer: A
11.
About certsout.com
certsout.com wasfounded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@certsout.com
Feedback: feedback@certsout.com
Support: support@certsout.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.