Exam Details

  • Exam Code
    :350-701
  • Exam Name
    :Implementing and Operating Cisco Security Core Technologies (SCOR)
  • Certification
    :CCNP
  • Vendor
    :Cisco
  • Total Questions
    :655 Q&As
  • Last Updated
    :Apr 23, 2024

Cisco CCNP 350-701 Questions & Answers

  • Question 41:

    An administrator is configuring N I P on Cisco ASA via ASDM and needs to ensure that rogue NTP servers cannot insert themselves as the authoritative time source Which two steps must be taken to accomplish this task? (Choose two)

    A. Specify the NTP version

    B. Configure the NTP stratum

    C. Set the authentication key

    D. Choose the interface for syncing to the NTP server

    E. Set the NTP DNS hostname

  • Question 42:

    What is the function of the crypto is a kmp key cisc406397954 address 0.0.0.0 0.0.0.0 command when establishing an IPsec VPN tunnel?

    A. It defines what data is going to be encrypted via the VPN

    B. lt configures the pre-shared authentication key

    C. It prevents all IP addresses from connecting to the VPN server.

    D. It configures the local address for the VPN server.

  • Question 43:

    A small organization needs to reduce the VPN bandwidth load on their headend Cisco ASA in order to ensure that bandwidth is available for VPN users needing access to corporate resources on the10.0.0.0/24 local HQ network. How is this accomplished without adding additional devices to the network?

    A. Use split tunneling to tunnel traffic for the 10.0.0.0/24 network only.

    B. Configure VPN load balancing to distribute traffic for the 10.0.0.0/24 network,

    C. Configure VPN load balancing to send non-corporate traffic straight to the internet.

    D. Use split tunneling to tunnel all traffic except for the 10.0.0.0/24 network.

  • Question 44:

    An engineer must modify a policy to block specific addresses using Cisco Umbrella. The policy is created already and is actively u: of the default policy elements. What else must be done to accomplish this task?

    A. Add the specified addresses to the identities list and create a block action.

    B. Create a destination list for addresses to be allowed or blocked.

    C. Use content categories to block or allow specific addresses.

    D. Modify the application settings to allow only applications to connect to required addresses.

  • Question 45:

    A network engineer entered the snmp-server user asmith myv7 auth sha cisco priv aes 256 cisc0xxxxxxxxx command and needs to send SNMP information to a host at 10.255.255.1. Which command achieves this goal?

    A. snmp-server host inside 10.255.255.1 version 3 myv7

    B. snmp-server host inside 10.255.255.1 snmpv3 myv7

    C. snmp-server host inside 10.255.255.1 version 3 asmith

    D. snmp-server host inside 10.255.255.1 snmpv3 asmith

  • Question 46:

    When a Cisco WSA checks a web request, what occurs if it is unable to match a user- defined policy?

    A. It blocks the request.

    B. It applies the global policy.

    C. It applies the next identification profile policy.

    D. It applies the advanced policy.

  • Question 47:

    In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?

    A. man-in-the-middle

    B. cross-site scripting

    C. insecure API

  • Question 48:

    What is a benefit of performing device compliance?

    A. Verification of the latest OS patches

    B. Providing multi-factor authentication

    C. Providing attribute-driven policies

  • Question 49:

    Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

    A. to prevent theft of the endpoints

    B. because defense-in-depth stops at the network

    C. to expose the endpoint to more threats

    D. because human error or insider threats will still exist

  • Question 50:

    Which Cisco ISE service checks the compliance of endpoints before allowing the endpoints to connect to the network?

    A. posture

    B. profiler

    C. Cisco TrustSec

    D. Threat Centric NAC

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 350-701 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.