Cisco 350-701 Exam Questions
Implementing and Operating Cisco Security Core Technologies (Page 15 )

Updated On: 24-Feb-2026

Which two features are used to configure Cisco ESA with a multilayer approach to fight viruses and malware?
(Choose two)

  1. Sophos engine
  2. white list
  3. RAT
  4. outbreak filters
  5. DLP

Answer(s): A,D



What is the purpose of the Decrypt for Application Detection feature within the WSA Decryption options?

  1. It decrypts HTTPS application traffic for unauthenticated users.
  2. It alerts users when the WSA decrypts their traffic.
  3. It decrypts HTTPS application traffic for authenticated users.
  4. It provides enhanced HTTPS application detection for AsyncOS.

Answer(s): D



Which two statements about a Cisco WSA configured in Transparent mode are true? (Choose two)

  1. It can handle explicit HTTP requests.
  2. It requires a PAC file for the client web browser.
  3. It requires a proxy for the client web browser.
  4. WCCP v2-enabled devices can automatically redirect traffic destined to port 80.
  5. Layer 4 switches can automatically redirect traffic destined to port 80.

Answer(s): D,E



Which action controls the amount of URI text that is stored in Cisco WSA logs files?

  1. Configure the datasecurityconfig command
  2. Configure the advancedproxyconfig command with the HTTPS subcommand
  3. Configure a small log-entry size.
  4. Configure a maximum packet size.

Answer(s): B



An engineer is configuring a Cisco ESA and wants to control whether to accept or reject email messages to a recipient address.
Which list contains the allowed recipient addresses?

  1. SAT
  2. BAT
  3. HAT
  4. RAT

Answer(s): D






Post your Comments and Discuss Cisco 350-701 exam dumps with other Community members:

Join the 350-701 Discussion