Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

350-701 Mock Test Free

Table of Contents

Toggle
  • 350-701 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 350-701 Mock Test Free

350-701 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 350-701 certification exam? Start your preparation the smart way with our 350-701 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 350-701 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 350-701 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

In which two customer environments is the Cisco WSAv connector traffic direction method selected? (Choose two.)

A. Customer owns ASA Appliance and Virtual Form Factor is required.

B. Customer does not own Cisco hardware and needs Explicit Proxy.

C. Customer owns ASA Appliance and SSL Tunneling is required.

D. Customer needs to support roaming users.

E. Customer does not own Cisco hardware and needs Transparent Redirection (WCCP).

 

Suggested Answer: AE

Question 2

What are two ways a network administrator transparently identifies users using Active Directory on the Cisco WSA? (Choose two.)

A. Create an LDAP authentication realm and disable transparent user identification.

B. Create NTLM or Kerberos authentication realm and enable transparent user identification.

C. Deploy a separate Active Directory agent such as Cisco Context Directory Agent.

D. The eDirectory client must be installed on each client workstation.

E. Deploy a separate eDirectory server; the client IP address is recorded in this server.

 

Suggested Answer: AC

Question 3

Which cryptographic process provides origin confidentiality, integrity, and origin authentication for packets?

A. AH

B. IKEv1

C. IKEv2

D. ESP

 

Suggested Answer: D

Question 4

An engineer recently completed the system setup on a Cisco WSA. Which URL information does the system send to SensorBase Network servers?

A. complete URL, without obfuscating the path segments

B. URL information collected from clients that connect to the Cisco WSA using Cisco AnyConnect

C. none because SensorBase Network Participation is disabled by default

D. summarized server-name information and MD5-hashed path information

 

Suggested Answer: A

Question 5

Image
Refer to the exhibit. What does the Python script accomplish?

A. It authenticates to a Cisco ISE server using the username or ersad.

B. It lists the LDAP users from the external identity store configured on Cisco ISE.

C. It authenticates to a Cisco ISE with an SSH connection.

D. It allows authentication with TLSv1 SSL protocol.

 

Suggested Answer: A

Question 6

Image
Refer to the exhibit. Which command results in these messages when attempting to troubleshoot an IPsec VPN connection?

A. debug crypto isakmp connection

B. debug crypto ipsec

C. debug crypto ipsec endpoint

D. debug crypto isakmp

 

Suggested Answer: B

Question 7

Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)

A. Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.

B. The active and standby devices can run different versions of the Cisco IOS software but must be the same type of device.

C. The IPsec configuration that is set up on the active device must be duplicated on the standby device.

D. Only the IPsec configuration that is set up on the active device must be duplicated on the standby device; the IKE configuration is copied automatically.

E. The active and standby devices must run the same version of the Cisco IOS software and must be the same type of device.

 

Suggested Answer: CE

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_conn_vpnav/configuration/15-mt/sec-vpn-availability-15-mt-book/sec-state-fail-ipsec.html

Question 8

Which deployment model is the most secure when considering risks to cloud adoption?

A. public cloud

B. hybrid cloud

C. community cloud

D. private cloud

 

Suggested Answer: D

Question 9

What is an advantage of network telemetry over SNMP pulls?

A. security

B. scalability

C. accuracy

D. encapsulation

 

Suggested Answer: C

Question 10

Which threat intelligence standard contains malware hashes?

A. advanced persistent threat

B. open command and control

C. structured threat information expression

D. trusted automated exchange of indicator information

 

Suggested Answer: C

Question 11

Which two protocols must be configured to authenticate end users to the Cisco WSA? (Choose two.)

A. TACACS+

B. CHAP

C. NTLMSSP

D. RADIUS

E. Kerberos

 

Suggested Answer: AD

Question 12

What is the definition of phishing?

A. malicious email spoofing attack that targets a specific organization or individual

B. impersonation of an authorized website to deceive users into entering their credentials

C. any kind of unwanted, unsolicited digital communication that gets sent out in bulk

D. sending fraudulent communications that appear to come from a reputable source

 

Suggested Answer: D

Question 13

Which attribute has the ability to change during the RADIUS CoA?

A. authorization

B. NTP

C. accessibility

D. membership

 

Suggested Answer: A

Question 14

What must be used to share data between multiple security products?

A. Cisco Platform Exchange Grid

B. Cisco Rapid Threat Containment

C. Cisco Stealthwatch Cloud

D. Cisco Advanced Malware Protection

 

Suggested Answer: A

Question 15

An MDM provides which two advantages to an organization with regards to device management? (Choose two.)

A. asset inventory management

B. allowed application management

C. AD group policy management

D. network device management

E. critical device management

 

Suggested Answer: AB

Question 16

A Cisco FTD engineer is creating a newIKEv2 policy called s2s00123456789 for their organization to allow additional protocols to terminate network devices with.
They currently only have one policy established and need the new policy to be a backup in case some devices cannot support the stronger algorithms listed in the primary policy. What should be done in order to support this?

A. Change the encryption to AES* to support all AES algorithms in the primary policy.

B. Make the priority for the primary policy 10 and the new policy 1.

C. Change the integrity algorithms to SHA* to support all SHA algorithms in the primary policy.

D. Make the priority for the new policy 5 and the primary policy 1.

 

Suggested Answer: D

Question 17

Which two descriptions of AES encryption are true? (Choose two.)

A. AES is less secure than 3DES.

B. AES is more secure than 3DES.

C. AES can use a 168-bit key for encryption.

D. AES can use a 256-bit key for encryption.

E. AES encrypts and decrypts a key three times in sequence.

 

Suggested Answer: BD

Reference:
https://gpdb.docs.pivotal.io/43190/admin_guide/topics/ipsec.html

Question 18

Image
Refer to the exhibit. Logins from internal users to a Cisco Adaptive Security Appliance firewall must be performed by using a TACACS server. The firewall is already configured. Which additional configuration must be performed to configure the TACACS+ server group with a key of Cisco4512!?

A.
Image

B.
Image

C.
Image

D.
Image

 

Suggested Answer: A

Question 19

Why is it important to have logical security controls on endpoints even though the users are trained to spot security threats and the network devices already help prevent them?

A. because defense-in-depth stops at the network

B. because human error or insider threats will still exist

C. to prevent theft of the endpoints

D. to expose the endpoint to more threats

 

Suggested Answer: B

Question 20

An administrator configures a new destination list in Cisco Umbrella so that the organization can block specific domains for its devices. What should be done to ensure that all subdomains of domain.com are blocked?

A. Configure the domain.com address in the block list.

B. Configure the *.domain.com address in the block list.

C. Configure the *.com address in the block list.

D. Configure the *domain.com address in the block list.

 

Suggested Answer: A

Question 21

What are two characteristics of the RESTful architecture used within Cisco DNA Center? (Choose two.)

A. REST codes can be compiled with any programming language.

B. REST uses HTTP to send a request to a web service.

C. The POST action replaces existing data at the URL path.

D. REST uses methods such as GET, PUT, POST, and DELETE.

E. REST is a Linux platform-based architecture.

 

Suggested Answer: BD

Question 22

Image
Refer to the exhibit. A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced. What is the cause of this issue?

A. The hashing algorithm that was used was MD5, which is unsupported.

B. The key was configured in plain text.

C. NTP authentication is not enabled.

D. The router was not rebooted after the NTP configuration updated.

 

Suggested Answer: C

Question 23

What is the difference between EPP and EDR?

A. Having an EDR solution gives an engineer the capability to flag offending files at the first sign of malicious behavior.

B. EPP focuses primarily on threats that have evaded front-line defenses that entered the environment.

C. Having an EPP solution allows an engineer to detect, investigate, and remediate modern threats.

D. EDR focuses solely on prevention at the perimeter.

 

Suggested Answer: A

Question 24

An engineer wants to automatically assign endpoints that have a specific OUI into a new endpoint group. Which probe must be enabled for this type of profiling to work?

A. SNMP

B. NMAP

C. DHCP

D. NetFlow

 

Suggested Answer: C

Question 25

DRAG DROP
-
Drag and drop the descriptions from the left onto the encryption algorithms on the right.
Image

 

Suggested Answer:
Correct Answer Image

Question 26

Which Cisco security solution stops exfiltration using HTTPS?

A. Cisco CTA

B. Cisco FTD

C. Cisco AnyConnect

D. Cisco ASA

 

Suggested Answer: A

Question 27

A network administrator received a critical message alert from a Cisco Secure Web Appliance stating that the log partition is at 107% capacity. How does a Cisco Secure Web Appliance respond when its logging partition is full?

A. It overwrites the oldest log files.

B. It suspends logging and reporting functions.

C. It deletes logs older than a configurable age.

D. It archives older logs in a compressed file to free space.

 

Suggested Answer: B

Question 28

Which Cisco solution does Cisco Umbrella integrate with to determine if a URL is malicious?

A. Cisco AMP

B. Cisco AnyConnect

C. Cisco Dynamic DNS

D. Cisco Talos

 

Suggested Answer: D

Question 29

Which attack is preventable by Cisco ESA but not by the Cisco WSA?

A. SQL injection

B. phishing

C. buffer overflow

D. DoS

 

Suggested Answer: D

Question 30

Image
Refer to the exhibit. What will occur when this device tries to connect to the port?

A. 802. 1X will not work, but MAB will start and allow the device on the network.

B. 802. 1X will work and the device will be allowed on the network.

C. 802. 1X will not work and the device will not be allowed network access.

D. 802. 1X and MAB will both be used and ISE can use policy to determine the access level.

 

Suggested Answer: D

Question 31

Which Cisco Umbrella package supports selective proxy for inspection of traffic from risky domains?

A. DNS Security Advantage

B. SIG Essentials

C. DNS Security Essentials

D. SIG Advantage

 

Suggested Answer: A

Question 32

How is DNS tunneling used to exfiltrate data out of a corporate network?

A. It leverages the DNS server by permitting recursive lookups to spread the attack to other DNS servers

B. It encodes the payload with random characters that are broken into short strings and the DNS server rebuilds the exfiltrated data

C. It redirects DNS requests to a malicious server used to steal user credentials, which allows further damage and theft on the network

D. It corrupts DNS servers by replacing the actual IP address with a rogue address to collect information or start other attacks

 

Suggested Answer: B

Question 33

Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?

A. SDLC

B. Lambda

C. Contiv

D. Docker

 

Suggested Answer: D

Reference:
https://www.cisco.com/c/dam/global/es_es/pdfs/Cisco-cloudcenter-architecture-wp-c11-737224.pdf

Question 34

An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?

A. Intelligent Multi-Scan

B. Anti-Virus Filtering

C. IP Reputation Filtering

D. File Analysis

 

Suggested Answer: A

Question 35

What are two trojan malware attacks? (Choose two.)

A. frontdoor

B. sync

C. smurf

D. rootkit

E. backdoor

 

Suggested Answer: DE

Question 36

Which Cisco security solution secures public, private, hybrid, and community clouds?

A. Cisco ISE

B. Cisco ASAv

C. Cisco Cloudlock

D. Cisco pxGrid

 

Suggested Answer: C

Question 37

What is a functional difference between a Cisco ASA and Cisco IOS router with Zone-Based Policy Firewall?

A. The Cisco ASA can be configured for high availability, whereas the Cisco IOS router with Zone-Based Policy Firewall cannot.

B. The Cisco IOS router with Zone-Based Policy Firewall can be configured for high availability, whereas the Cisco ASA cannot.

C. The Cisco ASA denies all traffic by default, whereas the Cisco IOS router with Zone-Based Policy Firewall starts out by allowing all traffic, even on untrusted interfaces.

D. The Cisco IOS router with Zone-Based Policy Firewall denies all traffic by default, whereas Cisco ASA starts out by allowing traffic until rules are added.

 

Suggested Answer: C

Question 38

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

A. biometric factor

B. time factor

C. confidentiality factor

D. knowledge factor

E. encryption factor

 

Suggested Answer: AD

Question 39

Image
Refer to the exhibit. What will happen when this Python script is run?

A. The list of computers, policies, and connector statuses will be received from Cisco AMP.

B. The list of computers and their current vulnerabilities will be received from Cisco AMP.

C. The compromised computers and malware trajectories will be received from Cisco AMP.

D. The compromised computers and what compromised them will be received from Cisco AMP.

 

Suggested Answer: A

Question 40

What are two list types within Cisco AMP for Endpoints Outbreak Control? (Choose two.)

A. blocked ports

B. simple custom detections

C. command and control

D. allowed applications

E. URL

 

Suggested Answer: BD

Reference:
https://docs.amp.cisco.com/en/A4E/AMP%20for%20Endpoints%20User%20Guide.pdf
chapter 2

Question 41

Which two endpoint measures are used to minimize the chances of falling victim to phishing and social engineering attacks? (Choose two.)

A. Patch for cross-site scripting.

B. Perform backups to the private cloud.

C. Protect against input validation and character escapes in the endpoint.

D. Install a spam and virus email filter.

E. Protect systems with an up-to-date antimalware program.

 

Suggested Answer: DE

Question 42

Which Cisco ASA Platform mode disables the threat detection features except for Advanced Threat Statistics?

A. cluster

B. multiple context

C. routed

D. transparent

 

Suggested Answer: D

Question 43

Which CoA response code is sent if an authorization state is changed successfully on a Cisco IOS device?

A. CoA-NAK

B. CoA-NCL

C. CoA-MAB

D. CoA-ACK

 

Suggested Answer: D

Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_aaa/configuration/15-sy/sec-usr-aaa-15-sy-book/sec-rad-coa.html

Question 44

What are two functions of IKEv1 but not IKEv2? (Choose two.)

A. IKEv1 conversations are initiated by the IKE_SA_INIT message.

B. With IKEv1, aggressive mode negotiates faster than main mode.

C. IKEv1 uses EAP for authentication.

D. NAT-T is supported in IKEv1 but not in IKEv2.

E. With IKEv1, when using aggressive mode, the initiator and responder identities are passed in cleartext.

 

Suggested Answer: BE

Reference:
https://community.cisco.com/t5/routing/internet-key-exchange-ike-aggressive-mode/td-p/2081283

Question 45

How do the features of DMVPN compare to IPsec VPN?

A. DMVPN supports high availability routing, and IPsec VPN supports stateless failover.

B. DMVPN uses hub-and-spoke topology, and IPsec VPN uses on-demand spoke topology.

C. DMVPN supports non-IP protocols, and IPsec VPN only supports IP protocols.

D. DMVPN supports multiple vendors, and IPsec VPN only supports Cisco products.

 

Suggested Answer: B

Question 46

An engineer must deploy a network security management solution to provide the operations team with a unified view of the security environment. The company operates a hybrid cloud with an element of on-premises private hosting for critical applications and data. The operations team requires a single solution that will be used to manage and configure:
• Firewalls
• Intrusion Prevention System
• Application control
• URL filtering
• Advanced malware protection
Which Cisco solution must be deployed?

A. Secure Firewall Threat Defense

B. Adaptive Security Device Manager

C. Next-Generation Firewall

D. Secure Firewall Management Center

 

Suggested Answer: D

Question 47

What are two functionalities of northbound and southbound APIs within Cisco SDN architecture? (Choose two.)

A. Northbound APIs utilize RESTful API methods such as GET, POST, and DELETE

B. Southbound APIs utilize CLI, SNMP, and RESTCONF

C. Southbound APIs are used to define how SDN controllers integrate with applications

D. Northbound interfaces utilize OpenFlow and OpFlex to integrate with network devices

E. Southbound interfaces utilize device configurations such as VLANs and IP addresses

 

Suggested Answer: AB

Reference:
https://www.cisco.com/c/dam/global/sr_rs/training-events/2016/cisco-day-2016/pdf/APIC-EM_Vedran_Hafner.pdf

Question 48

What is the difference between deceptive phishing and spear phishing?

A. Deceptive phishing is an attacked aimed at a specific user in the organization who holds a C-level role.

B. A spear phishing campaign is aimed at a specific person versus a group of people.

C. Spear phishing is when the attack is aimed at the C-level executives of an organization.

D. Deceptive phishing hijacks and manipulates the DNS server of the victim and redirects the user to a false webpage.

 

Suggested Answer: B

Question 49

Which Cisco ISE service checks the state of all the endpoints connecting to a network for compliance with corporate security policies?

A. Threat Centric NAC service

B. posture service

C. Cisco TrustSec

D. compliance module

 

Suggested Answer: B

Question 50

A company identified a phishing vulnerability during a pentest. What are two ways the company can protect employees from the attack? (Choose two.)

A. using an inline IPS/IDS in the network

B. using Cisco Umbrella

C. using Cisco ESA

D. using Cisco ISE

E. using Cisco FTD

 

Suggested Answer: AE

Access Full 350-701 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 350-701 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 350-701 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

350-601 Mock Test Free

Next Post

350-801 Mock Test Free

Next Post

350-801 Mock Test Free

350-901 Mock Test Free

3V0-21.21 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.