DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

2023 Free 350-701 Exam Questions: Practice Test & Answers

Exam NameImplementing and Operating Cisco Security Core Technologies
Exam Number350-701 SCOR
Practice ExamCisco Certified Network Professional Security Practice Test 
Number of questions90-110
Passing Score750-850 / 1000
Exam Price$400 USD
Take other online exams

Question #1
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172
B. authenticates the IP address of the 172
C. authenticates the IKEv1 peers in the 172
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
View answer
Correct Answer: B
Question #2
Which command enables 802.1X globally on a Cisco switch?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. authentication port-control auto
D. aaa new-model
View answer
Correct Answer: A
Question #3
What is a characteristic of Dynamic ARP Inspection?
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted
C. DAI associates a trust state with each switch
D. DAI intercepts all ARP requests and responses on trusted ports only
View answer
Correct Answer: A
Question #4
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
A. authentication server: Cisco Identity Service Engine
B. supplicant: Cisco AnyConnect ISE Posture module
C. authenticator: Cisco Catalyst switch
D. authenticator: Cisco Identity Services Engine
E. authentication server: Cisco Prime Infrastructure
View answer
Correct Answer: AC
Question #5
What is a difference between an XSS attack and an SQL injection attack?
A. SQL injection is a hacking method used to attack SQL databases, whereas XSS attack can exist in many different types of applications
B. XSS attacks are used to steal information from databases, whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them
C. XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications
D. SQL injection attacks are used to steal information from databases, whereas XSS attacks are used to redirect users to websites where attackers can steal data from them
View answer
Correct Answer: D
Question #6
What is a difference between a DoS attack and DDos attack?
A. A DoS attack is where a computer is used to flood a server with TCP packets, whereas DDoS attack is where a computer is used to flood a server with UDP packets
B. A DoS attack is where a computer is used to flood a server with UDP packets, whereas DDoS attack is where a computer is used to flood a server with TCP packets
C. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN
D. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where multiple systems target a single system with a DoS attack
View answer
Correct Answer: D
Question #7
What are two advantages of using Cisco AnyConnect over DMVPN? (Choose two.)
A. It provides spoke-to-spoke communications without traversing the hub
B. It enables VPN access for individual users from their machines
C. It allows multiple sites to connect to the data center
D. It allows different routing protocols to work over the tunnel
E. It allows customization of access policies based on user identity
View answer
Correct Answer: BE
Question #8
What is the difference between a vulnerability and an exploit?
A. A vulnerability is a weakness that can be exploited by an attacker
B. A vulnerability is a hypothetical event for an attacker to exploit
C. An exploit is a hypothetical event that causes a vulnerability in the network
D. An exploit is a weakness that can cause a vulnerability in the network
View answer
Correct Answer: A
Question #9
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
A. threat intelligence
B. Indicators of Compromise
C. trusted automated exchange
D. The Exploit Database
View answer
Correct Answer: A
Question #10
Refer to the exhibit. An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
A. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully
B. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy
C. The OU of the IKEv2 peer certificate is set to MANGLER
D. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER
View answer
Correct Answer: B
Question #11
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
A. event
B. intent
C. integration
D. multivendo
View answer
Correct Answer: B
Question #12
A network engineer needs to select a VPN type that provides the most stringent security, multiple security associations for the connections, and efficient VPN establishment with the least bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this environment?
A. DMVPN because it uses multiple SAs and FlexVPN does not
B. DMVPN because it supports IKEv2 and FlexVPN does not
C. FlexVPN because it supports IKEv2 and DMVPN does not
D. FlexVPN because it uses multiple SAs and DMVPN does not
View answer
Correct Answer: D
Question #13
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
A. show authentication registrations
B. show authentication method
C. show dot1x all
D. show authentication sessions
View answer
Correct Answer: D
Question #14
Refer to the exhibit. What does the number 15 represent in this configuration?
A. privilege level for an authorized user to this router
B. access list that identifies the SNMP devices that can access the router
C. interval in seconds between SNMPv3 authentication attempts
D. number of possible failed attempts until the SNMPv3 user is locked out
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: