Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > Cisco > CCNP Security > 350-701 > 350-701 Online Practice Questions and Answers

350-701 Online Practice Questions and Answers

Questions 4

Which benefit is provided by ensuring that an endpoint is compliant with a posture policy configured in Cisco ISE?

A. It allows the endpoint to authenticate with 802.1x or MAB.

B. It verifies that the endpoint has the latest Microsoft security patches installed.

C. It adds endpoints to identity groups dynamically.

D. It allows CoA to be applied if the endpoint status is compliant.

Buy Now

Correct Answer: B

Questions 5

Which Cisco product is open, scalable, and built on IETF standards to allow multiple security products from Cisco and other vendors to share data and interoperate with each other?

A. Advanced Malware Protection

B. Platform Exchange Grid

C. Multifactor Platform Integration

D. Firepower Threat Defense

Buy Now

Correct Answer: B

With Cisco pxGrid (Platform Exchange Grid), your multiple security products can now share data and work together. This open, scalable, and IETF standards-driven platform helps you automate security to get answers and contain threats faster.

Questions 6

What is the purpose of the certificate signing request when adding a new certificate for a server?

A. It is the password for the certificate that is needed to install it with.

B. It provides the server information so a certificate can be created and signed

C. It provides the certificate client information so the server can authenticate against it when installing

D. It is the certificate that will be loaded onto the server

Buy Now

Correct Answer: B

A certificate signing request (CSR) is one of the first steps towards getting your own SSL Certificate. Generated on the same server you plan to install the certificate on, the CSR contains information (e.g. common name, organization, country) that the Certificate Authority (CA) will use to create your certificate. It also contains the public key that will be included in your certificate and is signed with the corresponding private key

Questions 7

Which type of algorithm provides the highest level of protection against brute-force attacks?

A. PFS

B. HMAC

C. MD5

D. SHA

Buy Now

Correct Answer: D

Questions 8

A network engineer needs to select a VPN type that provides the most stringent security, multiple security associations for the connections, and efficient VPN establishment with the least bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this environment?

A. DMVPN because it supports IKEv2 and FlexVPN does not

B. FlexVPN because it supports IKEv2 and DMVPN does not

C. FlexVPN because it uses multiple SAs and DMVPN does not

D. DMVPN because it uses multiple SAs and FlexVPN does not

Buy Now

Correct Answer: C

https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_ike2vpn/configuration/xe-16-12/sec-flex-vpn-xe-16-12-book/sec-cfg-flex-serv.html

Questions 9

An organization must add new firewalls to its infrastructure and wants to use Cisco ASA or Cisco FTD.

The chosen firewalls must provide methods of blocking traffic that include offering the user the option to bypass the block for certain sites after displaying a warning page and to reset the connection. Which solution should the organization choose?

A. Cisco FTD because it supports system rate level traffic blocking, whereas Cisco ASA does not

B. Cisco ASA because it allows for interactive blocking and blocking with reset to be configured via the GUI, whereas Cisco FTD does not.

C. Cisco FTD because it enables interactive blocking and blocking with reset natively, whereas Cisco ASA does not

D. Cisco ASA because it has an additional module that can be installed to provide multiple blocking capabilities, whereas Cisco FTD does not.

Buy Now

Correct Answer: C

Questions 10

Which Cisco solution integrates Encrypted Traffic Analytics to perform enhanced visibility,promote compliance,shorten response times, and provide administrators with the information needed to provide educated and automated decisions to secure the environment?

A. Cisco DNA Center

B. Cisco SDN

C. Cisco ISE

D. Cisco Security Compiance Solution

Buy Now

Correct Answer: A

https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/Campus/eta-sda-fabric-deployment-guide-2019sep.pdf

Questions 11

Which solution supports high availability in routed or transparent mode as well as in northbound and southbound deployments?

A. Cisco FTD with Cisco ASDM

B. Cisco FTD with Cisco FMC

C. Cisco Firepower NGFW physical appliance with Cisco. FMC

D. Cisco Firepower NGFW Virtual appliance with Cisco FMC

Buy Now

Correct Answer: B

Questions 12

Which Cisco cloud security software centrally manages policies on multiple platforms such as Cisco ASA, Cisco Firepower, Cisco Meraki, and AWS?

A. Cisco Defense Orchestrator

B. Cisco Configuration Professional

C. Cisco Secureworks

D. Cisco DNAC

Buy Now

Correct Answer: A

Questions 13

Which DoS attack uses fragmented packets in an attempt to crash a target machine?

A. teardrop

B. smurf

C. LAND

D. SYN flood

Buy Now

Correct Answer: A

Explanation: A teardrop attack is a type of DoS attack that uses fragmented packets in an attempt to crash a target machine. The attacker sends IP packets that are deliberately malformed, such that the fragments overlap or have invalid offsets. When the target machine tries to reassemble the packets, it encounters an error or a buffer overflow, resulting in a system crash or a denial of service. Teardrop attacks exploit a vulnerability in the TCP/IP fragmentation reassembly process, which is responsible for splitting and recombining large packets that exceed the maximum transmission unit (MTU) size. Teardrop attacks can affect various operating systems, such as Windows, Linux, and BSD, depending on the implementation of the TCP/IP stack. Teardrop attacks are also known as IP fragmentation attacks or overlapping fragment attacks. References: Implementing and Operating Cisco Security Core Technologies (SCOR) v1.0, Module 5: Securing the Cloud, Lesson 5.2: Cloud Security Threats, Topic 5.2.2: DoS Attacks What is an IP Fragmentation Attack (Teardrop ICMP/UDP) Teardrop Attack - Radware What Is a Teardrop Attack? | F5

Reference: https://www.radware.com/security/ddos-knowledge-center/ddospedia/teardrop- attack/

Exam Code: 350-701
Exam Name: Implementing and Operating Cisco Security Core Technologies (SCOR)
Last Update: Jun 10, 2025
Questions: 753

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.