Cisco Implementing and Operating Security Core Technologies
Updated 17-Apr-2026
An engineer wants to generate NetFlow records on traffic traversing the Cisco AS
Answer(s): A
The syntax of this command is: flow-export destination interface-name ipv4-address | hostname udp-portThis command is used on Cisco ASA to configure Network Secure Event Logging (NSEL) collector to whichNetFlow packets are sent. The destination keyword indicates that a NSEL collector is being configured.+ The interface-name argument is the name of the ASA and ASA Services Module interface through which the collector is reached.+ The ipv4-address argument is the IP address of the machine running the collector application. + The hostname argument is the destination IP address or name of the collector. + The udp-port argument is the UDP port number to which NetFlow packets are sent. You can configure a maximum of five collectors. After a collector is configured, template records are automatically sent to all configured NSEL collectors.
https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/ monitor_nsel.html
How many interfaces per bridge group does an ASA bridge group deployment support?
Answer(s): B
Each of the ASAs interfaces need to be grouped into one or more bridge groups. Each of these groups acts as an independent transparent firewall. It is not possible for one bridge group to communicate with another bridge group without assistance from an external router. As of 8.4(1) upto 8 bridge groups are supported with 2-4 interface in each group. Prior to this only one bridge group was supported and only 2 interfaces. Up to 4 interfaces are permitted per bridgegroup (inside, outside, DMZ1, DMZ2)
Which two application layer preprocessors are used by Firepower Next Generation Intrusion PreventionSystem? (Choose two)
Answer(s): B,E
Application layer protocols can represent the same data in a variety of ways. The Firepower System provides application layer protocol decoders that normalize specific types of packet data into formats that the intrusion rules engine can analyze. Normalizing application-layer protocol encodings allows the rules engine to effectively apply the same content-related rules to packets whose data is represented differently and obtain meaningful results.
https://www.cisco.com/c/en/us/td/docs/security/firepower/60/configuration/guide/fpmc-config- guidev60/Application_Layer_Preprocessors.html#ID-2244-0000080c FirePower uses many preprocessors, including DNS, FTP/Telnet, SIP, SSL, SMTP, SSH preprocessors.
Which two features of Cisco Email Security can protect your organization against email threats? (Choose two)
Answer(s): B,D
Protect sensitive content in outgoing emails with Data Loss Prevention (DLP) and easy-to-use email encryption, all in one solution.Cisco Email Security appliance can now handle incoming mail connections and incoming messages from specific geolocations and perform appropriate actions on them, for example: Prevent email threats coming from specific geographic regions. Allow or disallow emails coming from specific geographic regions.
https://www.cisco.com/c/en/us/td/docs/security/esa/esa11-0/user_guide_fs/ b_ESA_Admin_Guide_11_0/b_ESA_Admin_Guide_chapter_00.html
Why would a user choose an on-premises ESA versus the CES solution?
Share your comments for Cisco 350-701 exam with other users:
Puneeth 10/5/2023 2:06:00 AM
new to this site but i feel it is good
Ashok Kumar 1/2/2024 6:53:00 AM
the correct answer to q8 is b. explanation since the mule app has a dependency, it is necessary to include project modules and dependencies to make sure the app will run successfully on the runtime on any other machine. source code of the component that the mule app is dependent of does not need to be included in the exported jar file, because the source code is not being used while executing an app. compiled code is being used instead.
Merry 7/30/2023 6:57:00 AM
good questions
VoiceofMidnight 12/17/2023 4:07:00 PM
Delayed the exam until December 29th.
Umar Ali 8/29/2023 2:59:00 PM
A and D are True
vel 8/28/2023 9:17:09 AM
good one with explanation
Gurdeep 1/18/2024 4:00:15 PM
This is one of the most useful study guides I have ever used.