350 701 Scor PDF
350 701 Scor PDF
350 701 Scor PDF
0 (350-701)
Exam Description: Implementing and Operating Cisco Security Core Technologies v1.0 (SCOR 350-701)
is a 120-minute exam associated with the CCNP and CCIE Security Certifications. This exam tests a
candidate's knowledge of implementing and operating core security technologies including network
security, cloud security, content security, endpoint protection and detection, secure network access,
visibility and enforcements. The course, Implementing and Operating Cisco Security Core Technologies,
helps candidates to prepare for this exam.
The following topics are general guidelines for the content likely to be included on the exam. However,
other related topics may also appear on any specific delivery of the exam. To better reflect the contents
of the exam and for clarity purposes, the guidelines below may change at any time without notice.
1.2 Compare common security vulnerabilities such as software bugs, weak and/or
hardcoded passwords, SQL injection, missing encryption, buffer overflow, path traversal,
cross-site scripting/forgery
1.3 Describe functions of the cryptography components such as hashing, encryption, PKI,
SSL, IPsec, NAT-T IPv4 for IPsec, pre-shared key and certificate based authorization
1.4 Compare site-to-site VPN and remote access VPN deployment types such as sVTI, IPsec,
Cryptomap, DMVPN, FLEXVPN including high availability considerations, and
AnyConnect
1.6 Explain the role of the endpoint in protecting humans from phishing and social
engineering attacks
1.7 Explain North Bound and South Bound APIs in the SDN architecture
1.8 Explain DNAC APIs for network provisioning, optimization, monitoring, and
troubleshooting
1.9 Interpret basic Python scripts used to call Cisco Security appliances APIs
2.5 Implement segmentation, access control policies, AVC, URL filtering, and malware
protection
2.6 Implement management options for network security solutions such as intrusion
prevention and perimeter security (Single vs. multidevice manager, in-band vs. out-of-
band, CDP, DNS, SCP, SFTP, and DHCP security and risks)
2.7 Configure AAA for device and network access (authentication and authorization,
TACACS+, RADIUS and RADIUS flows, accounting, and dACL)
2.8 Configure secure network management of perimeter security and infrastructure devices
(secure device management, SNMPv3, views, groups, users, authentication, and
encryption, secure logging, and NTP with authentication)
2.9 Configure and verify site-to-site VPN and remote access VPN
2.9.a Site-to-site VPN utilizing Cisco routers and IOS
2.9.b Remote access VPN using Cisco AnyConnect Secure Mobility client
2.9.c Debug commands to view IPsec tunnel establishment and troubleshooting
3.2 Compare the customer vs. provider security responsibility for the different cloud service
models
3.2.a Patch management in the cloud
3.2.b Security assessment in the cloud
3.2.c Cloud-delivered security solutions such as firewall, management, proxy, security
intelligence, and CASB
3.3 Describe the concept of DevSecOps (CI/CD pipeline, container orchestration, and
security
3.5 Identify security capabilities, deployment models, and policy management to secure the
cloud