Try 12 Cisco SCOR 350-701 sample questions and practice-test preview prompts for the CCNP Security core exam on security architecture, network security, cloud security, secure access, endpoint protection, and automation.
Cisco SCOR 350-701 is the core exam used for CCNP Security and related Cisco security paths. It tests security architecture, network security, cloud security, content security, endpoint protection, secure access, visibility, enforcement, and automation judgment.
This page includes 12 original sample questions for initial review. Full IT Mastery practice for Cisco SCOR is not live yet; use the preview to test fit and use the Notify me form if this is your target route.
These questions are original IT Mastery preview items. They are written for SCOR-style security architecture and operations judgment, not as official Cisco exam questions.
Topic: segmentation
A company wants to limit lateral movement between user workstations, development servers, and payment systems. Which design choice best supports this goal?
Best answer: B
Explanation: Segmentation reduces lateral movement by separating systems into zones and controlling allowed flows. It should be paired with logging, identity, and policy enforcement.
Topic: secure access
Remote users need access to private applications, but the organization wants decisions based on user identity, device posture, and application risk. Which concept best fits?
Best answer: D
Explanation: Secure access designs increasingly evaluate identity, device posture, context, and application risk instead of trusting a user only because they reached the network.
Topic: cloud security
A workload in a public cloud allows inbound management access from the internet. What should be reviewed first?
Best answer: A
Explanation: Exposed management access is high risk. Review network rules, identity, MFA, logs, private access patterns, bastions, and least privilege before focusing on cosmetic items.
Topic: endpoint protection
An endpoint tool detects a suspicious process creating persistence and connecting to an unfamiliar domain. What should happen next?
Best answer: C
Explanation: Endpoint alerts should be correlated with process, persistence, network, user, and threat-intelligence evidence. Containment depends on severity and scope.
Topic: email security
Users receive messages that spoof a trusted domain and include a credential-harvesting link. Which controls are relevant?
Best answer: A
Explanation: Phishing defense combines technical controls and process. Authentication, filtering, URL analysis, user reporting, removal, and response all contribute.
Topic: visibility
A security team cannot determine whether blocked traffic is a scan, a misconfiguration, or a compromised host. What capability is most useful?
Best answer: D
Explanation: Security visibility requires context. Correlation across network, endpoint, identity, and baseline data helps separate malicious behavior from misconfiguration or noise.
Topic: VPN
A site-to-site VPN is established, but only one subnet can communicate. What should be checked?
Best answer: A
Explanation: VPN connectivity depends on matching traffic selectors or proxy IDs, routing, ACLs, NAT behavior, and policy. One working subnet suggests the tunnel exists but policy/path matching may be incomplete.
Topic: automation
A team wants to quarantine hosts automatically after high-confidence malware alerts while preserving evidence. What design concern is most important?
Best answer: C
Explanation: Security automation should be controlled and observable. Quarantine actions need reliable triggers, audit logs, evidence preservation, exception handling, and rollback procedures.
Topic: identity
An administrator account is used from two countries within ten minutes. What should the security team do?
Best answer: A
Explanation: Impossible-travel patterns can signal credential compromise. Investigation should review MFA, source IPs, device context, session activity, and privileged actions.
Topic: secure network design
A guest wireless network should provide internet access without reaching corporate internal applications. What is the best design direction?
Best answer: D
Explanation: Guest access should be isolated from corporate resources. Segmentation, policy controls, authentication or captive portal behavior, and monitoring help enforce intended access.
Topic: web security
A user clicks a malicious link that attempts to download a payload from a newly registered domain. Which control can help reduce this risk?
Best answer: A
Explanation: DNS and web security controls can block access to known or suspicious malicious destinations, enforce policy, and provide investigation logs.
Topic: policy enforcement
A firewall rule was added for a temporary vendor test and never removed. What process would reduce this risk?
Best answer: C
Explanation: Firewall policy should have ownership, business justification, expiration for temporary access, review cycles, and recertification to reduce accumulated risk.
| Area | What to check |
|---|---|
| Architecture | Can you place controls across network, cloud, endpoint, identity, and application layers? |
| Detection | Can you interpret logs, flows, endpoint evidence, and correlated alerts? |
| Enforcement | Can you choose segmentation, firewall, VPN, secure access, and content-security controls? |
| Automation | Can you explain safe response automation, audit logging, and evidence preservation? |