Questions for the 350-701 were updated on : Dec 17 ,2025
For which type of attack is multifactor authentication an effective deterrent?
D
An engineer is deploying a Cisco Secure Email Gateway and must configure a sender group that
decides which mail policy will process the mail. The configuration must accept incoming mails and
relay the outgoing mails from the internal server. Which component must be configured to accept
the connection to the listener and meet these requirements on a Cisco Secure Email Gateway?
B
How does a Cisco Secure Firewall help to lower the risk of exfiltration techniques that steal customer
data?
D
What is a feature of an endpoint detection and response solution?
B
What are two differences between a Cisco Secure Web Appliance that is running in transparent mode
and one running in explicit mode? (Choose two.)
C, E
An administrator has been tasked with configuring the Cisco Secure Email Gateway to ensure there
are no viruses before quarantined emails are delivered. In addition, delivery of mail from known bad
mail servers must be prevented. Which two actions must be taken in order to meet these
requirements? (Choose two.)
B, E
A security engineer is tasked with configuring TACACS on a Cisco ASA firewall. The engineer must be
able to access the firewall command line interface remotely. The authentication must fall back to the
local user database of the Cisco ASA firewall. AAA server group named TACACS-GROUP is already
configured with TACACS server IP address 192.168.10.10 and key C1sc0512222832!. Which
configuration must be done next to meet the requirement?
B
In which cloud services model is the customer responsible for scanning for and mitigation of
application vulnerabilities?
C
A security engineer must create a policy based on the reputation verdict of a file from a Cisco Secure
Email Gateway. The file with an undetermined verdict must be dropped. Which action must the
security engineer take to meet the requirement?
B
Which API technology with SDN architecture is used to communicate with a controller and network
devices such as routers and switches?
D
DRAG DROP
Drag and drop the VPN functions from the left onto the descriptions on the right.

A network administrator needs a solution to match traffic and allow or deny the traffic based on the
type of application, not just the source or destination address and port used. Which kind of security
product must the network administrator implement to meet this requirement?
B
DRAG DROP
An engineer must configure AsyncOS for Cisco Secure Web Appliance to push log files to a syslog
server using the SCP retrieval method. Drag and drop the steps from the left into the sequence on
the right to complete the configuration.

Refer to the exhibit.
Refer to the exhibit. An engineer must configure an incoming mail policy so that each email sent
from [email protected] to a domain of @cisco.com is scanned for antispam and advanced
malware protection. All other settings will use the default behavior. What must be configured in the
incoming mail policy to meet the requirements?
B
A company deploys an application that contains confidential data and has a hybrid hub-and-spoke
topology. The hub resides in a public cloud environment, and the spoke resides on-premises. An
engineer must secure the application to ensure that confidential data in transit between the hub-
and-spoke servers is accessible only to authorized users. The engineer performs these configurations:
Segregation of duties
Role-based access control
Privileged access management
What must be implemented to protect the data in transit?
D