Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Practice Test Free

350-701 Practice Test Free

Table of Contents

Toggle
  • 350-701 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence
  • Free Access Full 350-701 Practice Test Free Questions

350-701 Practice Test Free – 50 Real Exam Questions to Boost Your Confidence

Preparing for the 350-701 exam? Start with our 350-701 Practice Test Free – a set of 50 high-quality, exam-style questions crafted to help you assess your knowledge and improve your chances of passing on the first try.

Taking a 350-701 practice test free is one of the smartest ways to:

  • Get familiar with the real exam format and question types
  • Evaluate your strengths and spot knowledge gaps
  • Gain the confidence you need to succeed on exam day

Below, you will find 50 free 350-701 practice questions to help you prepare for the exam. These questions are designed to reflect the real exam structure and difficulty level. You can click on each Question to explore the details.

Question 1

A network engineer is deciding whether to use stateful or stateless failover when configuring two Cisco ASAs for high availability. What is the connection status in both cases?

A. need to be reestablished with stateful failover and preserved with stateless failover

B. preserved with both stateful and stateless failover

C. need to be reestablished with both stateful and stateless failover

D. preserved with stateful failover and need to be reestablished with stateless failover

 


Suggested Answer: D

 

 

Question 2

For a given policy in Cisco Umbrella, how should a customer block websites based on a custom list?

A. by adding the website IP addresses to the Cisco Umbrella blocklist

B. by adding the websites to a blocked type destination list

C. by specifying blocked domains in the policy settings

D. by specifying the websites in a custom blocked category

 


Suggested Answer: B

 

 

Question 3

An administrator wants to ensure that all endpoints are compliant before users are allowed access on the corporate network. The endpoints must have the corporate antivirus application installed and be running the latest build of Windows 10.
What must the administrator implement to ensure that all devices are compliant before they are allowed on the network?

A. Cisco Identity Services Engine and AnyConnect Posture module

B. Cisco Stealthwatch and Cisco Identity Services Engine integration

C. Cisco ASA firewall with Dynamic Access Policies configured

D. Cisco Identity Services Engine with PxGrid services enabled

 


Suggested Answer: A

Reference:
https://www.cisco.com/c/en/us/td/docs/security/vpn_client/anyconnect/anyconnect46/administration/guide/b_AnyConnect_Administrator_Guide_4-6/
configure-posture.html

 

Question 4

What is the process in DevSecOps where all changes in the central code repository are merged and synchronized?

A. EP

B. CD

C. CI

D. QA

 


Suggested Answer: B

 

 

Question 5

Which two risks is a company vulnerable to if it does not have a well-established patching solution for endpoints? (Choose two.)

A. malware

B. denial-of-service attacks

C. ARP spoofing

D. exploits

E. eavesdropping

 


Suggested Answer: AD

 

 

Question 6

What is capability of EPP compared to EDR?

A. EPP protects against malware that has already entered the environment, and EDR focuses on protecting against botnets.

B. EDR protects against email attacks, and EPP focuses on detecting and monitoring phishing and ransomware email attacks.

C. EDR protects against malicious email attacks, and EPP focuses on suspicious website attacks including DoS and DDoS attempts.

D. EDR protects against malware that has already entered the environment, and EPP focuses on preventing malware from entering.

 


Suggested Answer: D

 

 

Question 7

What are two workload security models? (Choose two.)

A. SaaS

B. PaaS

C. off-premises

D. on-premises

E. IaaS

 


Suggested Answer: CD

 

 

Question 8

An organization wants to implement a cloud-delivered and SaaS-based solution to provide visibility and threat detection across the AWS network. The solution must be deployed without software agents and rely on AWS VPC flow logs instead. Which solution meets these requirements?

A. NetFlow collectors

B. Cisco Cloudlock

C. Cisco Stealthwatch Cloud

D. Cisco Umbrella

 


Suggested Answer: C

Reference:
https://www.cisco.com/c/en/us/products/security/stealthwatch-cloud/index.html

 

Question 9

What are two Detection and Analytics Engines of Cognitive Threat Analytics? (Choose two.)

A. data exfiltration

B. command and control communication

C. intelligent proxy

D. snort

E. URL categorization

 


Suggested Answer: AB

Reference:
https://www.cisco.com/c/dam/en/us/products/collateral/security/cognitive-threat-analytics/at-a-glance-c45-736555.pdf

 

Question 10

In which two ways does a system administrator send web traffic transparently to the Cisco WSA? (Choose two.)

A. use Web Cache Communication Protocol

B. configure AD Group Policies to push proxy settings

C. configure the proxy IP address in the web-browser settings

D. configure policy-based routing on the network infrastructure

E. reference a Proxy Auto Config file

 


Suggested Answer: AD

 

 

Question 11

Which metric is used by the monitoring agent to collect and output packet loss and jitter information?

A. RTP performance

B. TCP performance

C. WSAv performance

D. AVC performance

 


Suggested Answer: A

 

 

Question 12

What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)

A. biometric factor

B. time factor

C. confidentiality factor

D. knowledge factor

E. encryption factor

 


Suggested Answer: AD

 

 

Question 13

Which API method and required attribute are used to add a device into Cisco DNA Center with the native API?

A. GET and serialNumber

B. userSudiSerlalNos and deviceInfo

C. POST and name

D. lastSyncTime and pid

 


Suggested Answer: A

 

 

Question 14

When a Cisco WSA checks a web request, what occurs if it is unable to match a user-defined policy?

A. It applies the next identification profile policy.

B. It applies the global policy.

C. It applies the advanced policy.

D. It blocks the request.

 


Suggested Answer: B

 

 

Question 15

Which system facilitates deploying microsegmentation and multi-tenancy services with a policy-based container?

A. SDLC

B. Lambda

C. Contiv

D. Docker

 


Suggested Answer: D

Reference:
https://www.cisco.com/c/dam/global/es_es/pdfs/Cisco-cloudcenter-architecture-wp-c11-737224.pdf

 

Question 16

Which solution for remote workers enables protection, detection, and response on the endpoint against known and unknown threats?

A. Cisco AMP for Endpoints

B. Cisco AnyConnect

C. Cisco Umbrella

D. Cisco Duo

 


Suggested Answer: A

 

 

Question 17

An engineer is adding a Cisco router to an existing environment. NTP authentication is configured on all devices in the environment with the command ntp authentication-key 1 md5 Cisc433392759. There are two routers on the network that are configured as NTP servers for redundancy, 192.168.1.110 and 192.168.1.111. 192.168.1.110 is configured as the authoritative time source. What command must be configured on the new router to use 192.168.1.110 as its primary time source without the new router attempting to offer time to existing devices?

A. ntp server 192.168.1.110 primary key 1

B. ntp server 192.168.1.110 key 1 prefer

C. ntp peer 192.168.1.110 prefer key 1

D. ntp peer 192.168.1.110 key 1 primary

 


Suggested Answer: B

 

 

Question 18

Which Cisco Firewall solution requires zone definition?

A. CBAC

B. Cisco AMP

C. ZBFW

D. Cisco ASA

 


Suggested Answer: D

 

 

Question 19

A Cisco AMP for Endpoints administrator configures a custom detection policy to add specific MD5 signatures. The configuration is created in the simple detection policy section, but it does not work. What is the reason for this failure?

A. The administrator must upload the file instead of the hash for Cisco AMP to use.

B. The APK must be uploaded for the application that the detection is intended.

C. The MD5 hash uploaded to the simple detection policy is in the incorrect format.

D. Detections for MD5 signatures must be configured in the advanced custom detection policies.

 


Suggested Answer: A

 

 

Question 20

When a site-to-site VPN is configured in Cisco FMC, which topology is supported when crypto ACLs are used instead of protected networks to define interesting traffic?

A. hub-and-spoke

B. full mesh

C. DMVPN

D. point-to-point

 


Suggested Answer: D

 

 

Question 21

What are the two types of managed Intercloud Fabric deployment models? (Choose two.)

A. Service Provider managed

B. User managed

C. Public managed

D. Hybrid managed

E. Enterprise managed

 


Suggested Answer: AE

 

 

Question 22

DRAG DROP
-
Drag and drop the firewall capabilities from the left onto the corresponding firewall deployment modes on the right.
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 23

Which two types of connectors are used to generate telemetry data from IPFIX records in a Cisco Secure Workload implementation? (Choose two.)

A. NetFlow

B. Cisco Secure Workload

C. Cisco ASA

D. ERSPAN

E. ADC

 


Suggested Answer: AD

 

 

Question 24

While using Cisco Firepower's Security Intelligence policies, which two criteria is blocking based upon? (Choose two.)

A. IP addresses

B. URLs

C. port numbers

D. protocol IDs

E. MAC addresses

 


Suggested Answer: AB

 

 

Question 25

An engineer is configuring web filtering for a network using Cisco Umbrella Secure Internet Gateway. The requirement is that all traffic needs to be filtered. Using the SSL decryption feature, which type of certificate should be presented to the end-user to accomplish this goal?

A. SubCA

B. organization owned root

C. self-signed

D. third-party

 


Suggested Answer: B

 

 

Question 26

Which Cisco security solution determines if an endpoint has the latest OS updates and patches installed on the system?

A. Cisco Endpoint Security Analytics

B. Cisco AMP for Endpoints

C. Endpoint Compliance Scanner

D. Security Posture Assessment Service

 


Suggested Answer: D

 

 

Question 27

Which function is performed by certificate authorities but is a limitation of registration authorities?

A. CRL publishing

B. certificate re-enrollment

C. verifying user identity

D. accepts enrollment requests

 


Suggested Answer: C

 

 

Question 28

What is a benefit of a Cisco Secure Email Gateway Virtual as compared to a physical Secure Email Gateway?

A. simplifies the distribution of software updates

B. enables the allocation of additional resources

C. provides an automated setup process

D. provides faster performance

 


Suggested Answer: B

 

 

Question 29

Which form of attack is launched using botnets?

A. TCP flood

B. DDOS

C. DOS

D. virus

 


Suggested Answer: B

 

 

Question 30

What is the most common type of data exfiltration that organizations currently experience?

A. encrypted SMTP

B. SQL database injections

C. HTTPS file upload site

D. Microsoft Windows network shares

 


Suggested Answer: D

Reference:
https://blogs.cisco.com/security/sensitive-data-exfiltration-and-the-insider

 

Question 31

Image
Refer to the exhibit. An administrator is adding a new Cisco FTD device to their network and wants to manage it with Cisco FMC. The Cisco FTD uses a registration key of Cisc392481137 and is not behind a NAT device. Which command is needed to enable this on the Cisco FTD?

A. configure manager add 16

B. configure manager add DONTRESOLVE FTD123

C. configure manager add

D. configure manager add DONTRESOLVE

 


Suggested Answer: C

Reference:
https://www.cisco.com/c/en/us/td/docs/security/firepower/620/configuration/guide/fpmc-config-guide-v62/firepower_command_line_reference.html#ID-

2201-000004b4

 

Question 32

With which components does a southbound API within a software-defined network architecture communicate?

A. applications

B. controllers within the network

C. appliances

D. devices such as routers and switches

 


Suggested Answer: D

 

 

Question 33

For which two conditions can an endpoint be checked using ISE posture assessment? (Choose two.)

A. computer identity

B. Windows service

C. user identity

D. Windows firewall

E. default browser

 


Suggested Answer: BD

 

 

Question 34

Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?

A. northbound API

B. westbound API

C. eastbound API

D. southbound API

 


Suggested Answer: D

 

 

Question 35

What is a benefit of performing device compliance?

A. providing multi-factor authentication

B. verification of the latest OS patches

C. providing attribute-driven policies

D. device classification and authorization

 


Suggested Answer: B

 

 

Question 36

A mall provides security services to customers with a shared appliance. The mall wants separation of management on the shared appliance. Which ASA deployment mode meets these needs?

A. routed mode

B. multiple zone mode

C. multiple context mode

D. transparent mode

 


Suggested Answer: C

 

 

Question 37

A network engineer must monitor user and device behavior within the on-premises network. This data must be sent to the Cisco Stealthwatch Cloud analytics platform for analysis. What must be done to meet this requirement, using the Ubuntu-based VM appliance deployed in a VMware-based hypervisor?

A. Deploy a Cisco FTD sensor to send network events to Cisco Stealthwatch Cloud.

B. Configure a Cisco FMC to send syslogs to Cisco Stealthwatch Cloud.

C. Deploy the Cisco Stealthwatch Cloud PNM sensor that sends data to Cisco Stealthwatch Cloud.

D. Configure a Cisco FMC to send NetFlow to Cisco Stealthwatch Cloud.

 


Suggested Answer: C

 

 

Question 38

An email administrator is setting up a new Cisco ESA. The administrator wants to enable the blocking of greymail for the end user. Which feature must the administrator enable first?

A. Intelligent Multi-Scan

B. Anti-Virus Filtering

C. IP Reputation Filtering

D. File Analysis

 


Suggested Answer: A

 

 

Question 39

Which Cisco Umbrella package supports selective proxy for inspection of traffic from risky domains?

A. DNS Security Advantage

B. SIG Essentials

C. DNS Security Essentials

D. SIG Advantage

 


Suggested Answer: A

 

 

Question 40

How does a Cisco Secure Web Appliance integrated with LDAP handle the permissions of a currently logged in Active Directory group member when the Active Directory administrator changes the permissions of the user's group mid session?

A. If the Cisco Secure Client Mobility Client is configured on the endpoint to provide Active Directory updates, the Cisco Secure Web Appliance changes the user’s permissions immediately when alerted by the client.

B. If the Cisco Secure Web Appliance is configured to receive real-time updates from the Active Directory user agent, it changes the user’s permissions immediately when the agent sends the update.

C. The Cisco Secure Web Appliance terminates the current session and prompts the user to re-authenticate in order to update the effective permissions.

D. The Cisco Secure Web Appliance continues to operate using the permissions that were in effect when the user logged in for the duration of the user’s session.

 


Suggested Answer: D

 

 

Question 41

Which algorithm provides encryption and authentication for data plane communication?

A. AES-GCM

B. SHA-96

C. AES-256

D. SHA-384

 


Suggested Answer: A

 

 

Question 42

Image
Refer to the exhibit. An engineer must enable secure SSH protocols and enters this configuration. What are two results of running this set of commands on a Cisco router? (Choose two.)

A. generates RSA key pairs on the router

B. enables SSHv1 on the router

C. uses the FQDN with the label command

D. labels the key pairs to be used for SSH

E. generates AES key pairs on the router

 


Suggested Answer: AD

 

 

Question 43

Which action adds IOCs to customize detections for a new attack?

A. Use the initiate Endpoint 1OC scan feature to gather the IOC information and push it to clients.

B. Upload the 10Cs into the Installed Endpoint IOC feature within Cisco Secure Endpoint.

C. Add a custom advanced detection to include the 1OCs needed within Cisco Secure Endpoint.

D. Modify the base policy within Cisco Secure Endpoint to include simple custom detections.

 


Suggested Answer: B

 

 

Question 44

The security team has installed a Cisco Secure Email Gateway. During setup, a large number of email messages containing the string "abcde1111111111" are being blocked. The security team wants to investigate and determine if the emails are part of a phishing or malware attack. Which configuration step must the security team apply?

A. Implement a policy to only allow email from trusted to the network senders.

B. Apply a policy to route all blocked emails to a separate quarantine folder.

C. Configure sender domain reputation policy to check if sender email domain is known to be malicious.

D. Configure a policy to disable spam filtering in order to expedite email delivery.

 


Suggested Answer: B

 

 

Question 45

What is a difference between FlexVPN and DMVPN?

A. DMVPN uses only IKEv1. FlexVPN uses only IKEv2

B. FlexVPN uses IKEv2. DMVPN uses IKEv1 or IKEv2

C. DMVPN uses IKEv1 or IKEv2. FlexVPN only uses IKEv1

D. FlexVPN uses IKEv1 or IKEv2. DMVPN uses only IKEv2

 


Suggested Answer: B

 

 

Question 46

What is the difference between Cross-site Scripting and SQL Injection attacks?

A. Cross-site Scripting is when executives in a corporation are attacked, whereas SQL Injection is when a database is manipulated.

B. Cross-site Scripting is an attack where code is executed from the server side, whereas SQL Injection is an attack where code is executed from the client side.

C. Cross-site Scripting is a brute force attack targeting remote sites, whereas SQL Injection is a social engineering attack.

D. Cross-site Scripting is an attack where code is injected into a database, whereas SQL Injection is an attack where code is injected into a browser.

 


Suggested Answer: B

 

 

Question 47

An organization is moving toward the zero-trust model. Which Cisco solution enables administrators to deploy and control microsegmentation of endpoints that are connected to a Cisco Data Center Virtual Edge, Cisco Application Virtual Switch, Microsoft vSwitch, and VMware vSphere Distributed Switch?

A. Cisco Titration

B. Cisco DCNM

C. Cisco Stealthwatch

D. Cisco ACI

 


Suggested Answer: D

 

 

Question 48

What are two DDoS attack categories? (Choose two.)

A. protocol

B. source-based

C. database

D. sequential

E. volume-based

 


Suggested Answer: AE

 

 

Question 49

What is a difference between DMVPN and sVTI?

A. DMVPN provides interoperability with other vendors, whereas sVTI does not.

B. DMVPN supports static tunnel establishment, whereas sVTI does not.

C. DMVPN supports dynamic tunnel establishment, whereas sVTI does not.

D. DMVPN supports tunnel encryption, whereas sVTI does not.

 


Suggested Answer: C

 

 

Question 50

What is the difference between a vulnerability and an exploit?

A. A vulnerability is a weakness that can be exploited by an attacker.

B. A vulnerability is a hypothetical event for an attacker to exploit.

C. An exploit is a hypothetical event that causes a vulnerability in the network.

D. An exploit is a weakness that can cause a vulnerability in the network.

 


Suggested Answer: A

Reference:
https://debricked.com/blog/what-is-security-weakness/#:~:text=A%20vulnerability%20is%20a%20weakness,when%20it%20can%20be%

20exploited.&text=This%20is%20a%20%E2%80%9Ccommunity%2Ddeveloped,of%20common%20software%20security%20weaknesses%E2%80%9D
.

 

Free Access Full 350-701 Practice Test Free Questions

If you’re looking for more 350-701 practice test free questions, click here to access the full 350-701 practice test.

We regularly update this page with new practice questions, so be sure to check back frequently.

Good luck with your 350-701 certification journey!

Share18Tweet11
Previous Post

350-601 Practice Test Free

Next Post

350-801 Practice Test Free

Next Post

350-801 Practice Test Free

350-901 Practice Test Free

3V0-21.21 Practice Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.