Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

350-701 Implementing and Operating Cisco Security Core Technologies (SCOR 350-701) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

350-701 Practice Questions

Implementing and Operating Cisco Security Core Technologies (SCOR 350-701)

Last Update 4 days ago
Total Questions : 726

Dive into our fully updated and stable 350-701 practice test platform, featuring all the latest CCNP Security exam questions added this week. Our preparation tool is more than just a Cisco study aid; it's a strategic advantage.

Our free CCNP Security practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about 350-701. Use this test to pinpoint which areas you need to focus your study on.

350-701 PDF

350-701 PDF (Printable)
$48.3
$137.99

350-701 Testing Engine

350-701 PDF (Printable)
$52.5
$149.99

350-701 PDF + Testing Engine

350-701 PDF (Printable)
$65.45
$186.99
Question # 151

An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Clsc427128380. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?

Options:

A.  

ntp server 192.168.1.110 primary key 1

B.  

ntp peer 192.168.1.110 prefer key 1

C.  

ntp server 192.168.1.110 key 1 prefer

D.  

ntp peer 192.168.1.110 key 1 primary

Discussion 0
Question # 152

What is a characteristic of Dynamic ARP Inspection?

Options:

A.  

DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCPsnooping binding database.

B.  

In a typical network, make all ports as trusted except for the ports connecting to switches, which areuntrusted

C.  

DAI associates a trust state with each switch.

D.  

DAI intercepts all ARP requests and responses on trusted ports only.

Discussion 0
Question # 153

What is the benefit of installing Cisco AMP for Endpoints on a network?

Options:

A.  

It provides operating system patches on the endpoints for security.

B.  

It provides flow-based visibility for the endpoints network connections.

C.  

It enables behavioral analysis to be used for the endpoints.

D.  

It protects endpoint systems through application control and real-time scanning

Discussion 0
Question # 154

A networking team must harden an organization's network from VLAN hopping attacks. The team disables Dynamic Trunking Protocol and puts any unused ports in an unused VLAN. A trunk port is used as a trunk link. What must the team configure next to harden the network against VLAN hopping attacks?

Options:

A.  

disable STP on the network devices

B.  

dedicated VLAN ID for all trunk ports

C.  

DHCP snooping on all the switches

D.  

enable port-based network access control

Discussion 0
Question # 155

Which two preventive measures are used to control cross-site scripting? (Choose two)

Options:

A.  

Enable client-side scripts on a per-domain basis.

B.  

Incorporate contextual output encoding/escaping.

C.  

Disable cookie inspection in the HTML inspection engine.

D.  

Run untrusted HTML input through an HTML sanitization engine.

E.  

Same Site cookie attribute should not be used.

Discussion 0
Question # 156

Question # 156

Refer to the exhibit. The DHCP snooping database resides on router R1, and dynamic ARP inspection is configured only on switch SW2. Which ports must be configured as untrusted so that dynamic ARP inspection operates normally?

Options:

A.  

P2 and P3 only

B.  

P2, P3, and P6 only

C.  

P5, P6, and P7 only

D.  

P1, P2, P3, and P4 only

Discussion 0
Question # 157

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

Options:

A.  

user input validation in a web page or web application

B.  

Linux and Windows operating systems

C.  

database

D.  

web page images

Discussion 0
Question # 158

An organization wants to reduce their attach surface for cloud applications. They want to understand application communications, detect abnormal application Behavior, and detect vulnerabilities within the applications. Which action accomplishes this task?

Options:

A.  

Configure Cisco Secure Workload to detect anomalies and vulnerabilities.

B.  

Use Cisco ISE to provide application visibility and restrict access to them.

C.  

Implement Cisco Umbrella lo control the access each application is granted.

D.  

Modify the Cisco Duo configuration to restrict access between applications.

Discussion 0
Question # 159

An organization is receiving SPAM emails from a known malicious domain. What must be configured in order to

prevent the session during the initial TCP communication?

Options:

A.  

Configure the Cisco ESA to drop the malicious emails

B.  

Configure policies to quarantine malicious emails

C.  

Configure policies to stop and reject communication

D.  

Configure the Cisco ESA to reset the TCP connection

Discussion 0
Question # 160

What is an advantage of network telemetry over SNMP pulls?

Options:

A.  

accuracy

B.  

encapsulation

C.  

security

D.  

scalability

Discussion 0
Question # 161

An engineer has enabled LDAP accept queries on a listener. Malicious actors must be prevented from quickly

identifying all valid recipients. What must be done on the Cisco ESA to accomplish this goal?

Options:

A.  

Configure incoming content filters

B.  

Use Bounce Verification

C.  

Configure Directory Harvest Attack Prevention

D.  

Bypass LDAP access queries in the recipient access table

Discussion 0
Question # 162

What is a feature of the open platform capabilities of Cisco DNA Center?

Options:

A.  

intent-based APIs

B.  

automation adapters

C.  

domain integration

D.  

application adapters

Discussion 0
Question # 163

Which two protocols must be configured to authenticate end users to the Web Security Appliance? (Choose two.)

Options:

A.  

NTLMSSP

B.  

Kerberos

C.  

CHAP

D.  

TACACS+

E.  

RADIUS

Discussion 0
Question # 164

Where are individual sites specified to be block listed in Cisco Umbrella?

Options:

A.  

Application settings

B.  

Security settings

C.  

Destination lists

D.  

Content categories

Discussion 0
Question # 165

An organization has two systems in their DMZ that have an unencrypted link between them for communication.

The organization does not have a defined password policy and uses several default accounts on the systems.

The application used on those systems also have not gone through stringent code reviews. Which vulnerability

would help an attacker brute force their way into the systems?

Options:

A.  

weak passwords

B.  

lack of input validation

C.  

missing encryption

D.  

lack of file permission

Discussion 0
Get 350-701 dumps and pass your exam in 24 hours!

Free Exams Sample Questions