Sie sind auf Seite 1von 24

700-265

Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0

Cisco - 700-265 Cisco Advanced Security Architecture for Account Managers


QUESTION 1
Which customer cost saver has examples like Reputation analysis and recommended remediation steps?

A. Flexible licensing
B. Faster integration
C. Fewer resources to manage
D. Less time scoping a breach

Correct Answer: D
Section: (none)

QUESTION 2
Which Cisco offering focuses on developing logical product suites grouped by domains?

A. Internet of Everything
B. SmartNet
C. Smart License
D. Cisco Expo
E. Collaborative Services
F. Cisco ONE

Correct Answer: F
Section: (none)

QUESTION 3
Refer to the exhibit.

Consolidating platforms and appliances under a single provider is an example of which customer cost saver?

A. Less time scoping a breach


B. Fewer resources to manage
C. Faster integration
D. Flexible licensing

Correct Answer: D
Section: (none)

QUESTION 4
Which three features does an ASA 5506-X appliance with FirePOWER Services provide? (Choose three.)

A. reliable visibility
B. data loss prevention
C. NGIPS
D. next generation firewall
E. URL filtering
F. Talos

Correct Answer: ACD


Section: (none)

QUESTION 5
Which three options are web and email security products? (Choose three.)
A. Umbrella
B. Cloudlock
C. Web Security Appliance
D. Investigate
E. NGFW
F. Meraki

Correct Answer: ABE


Section: (none)

QUESTION 6
Which three options are products and benefits of the mobile threat-centric solution? (Choose three.)

A. enforced device security policies with Meraki


B. CRD and Network Analytics
C. enhanced access and usage control with ISE
D. AnyConect
E. URL filtering
F. secure off-network connection with Stealthwatch

Correct Answer: BCD


Section: (none)

QUESTION 7
Which three options are products and benefits of the data center threat-centric solution? (Choose three.)

A. deep visibility and data analytics through Stealthwatch


B. identity-based policy management through Meraki
C. automated policy enforcement with ASAv
D. deep malware defense with Talos
E. predictive intelligence through Umbrella and Talos
F. software-defined segmentation through TrustSec

Correct Answer: ACF


Section: (none)

QUESTION 8
Which two options are products in the cloud apps threat-centric solution? (Choose two.)

A. Talos
B. Stealthwatch
C. Cloudlock
D. ISE
E. Meraki

Correct Answer: AC
Section: (none)

QUESTION 9
Which Cisco business values are demonstrated by scalable solution and network adaptability?

A. Cost effectiveness
B. Protection
C. Control
D. Flexibility
E. Completeness

Correct Answer: D
Section: (none)

QUESTION 10
Which customer use case is challenged by device incompatibility, OS diversity, and a multitude of third-party
application?

A. Compliance issue
B. Growing business
C. Vulnerable cloud
D. Small budget
E. Limited mobility

Correct Answer: A
Section: (none)

QUESTION 11
Which two aspects of Cisco solutions save customers money? (Choose two.)

A. 100 percent effectiveness


B. Faster integration
C. Fewer resources to manage
D. Lowest-cost solutions
E. Incentives programs
F. Complete replacement of current infrastructure

Correct Answer: BC
Section: (none)

QUESTION 12
Which component of AMP provides the details that customers need to address problems after a breach is
identified?

A. context awareness
B. file sandboxing
C. rapid remediation
D. continuous analysis
E. network control

Correct Answer: C
Section: (none)

QUESTION 13
Which licensing feature enables customers to better manage their software assets and optimize their IT
spend?

A. Cisco ONE
B. Smart Accounts
C. Enterprise License Agreements
D. License Bundling

Correct Answer: B
Section: (none)

QUESTION 14
How does Cisco TrustSec help secure sensitive data and regulating network access?

A. email security
B. leverage file reputation
C. ensure compliance
D. provide customer choice
E. traffic tagging

Correct Answer: E
Section: (none)

QUESTION 15
Which two attack vectors are protected by malware protection? (Choose (two.)

A. mobile
B. campus and branch
C. email
D. cloud apps
E. voicemail

Correct Answer: ABC


Section: (none)

QUESTION 16
Which Cisco business values are demonstrated by increased employee productivity, confidence in data
confidentiality, and increased visibility?

A. protection
B. completeness
C. cost effectiveness
D. control
E. flexibility

Correct Answer: D
Section: (none)

QUESTION 17
Which three options must a customer look for when choosing a security solution provider? (Choose three.)

A. delivers better partner and customer support


B. offers more than just niche products
C. is committed to security
D. generates higher margins on each sale
E. provides solutions at the lowest cost
F. prioritizes one security solution above all else
G. creates new market opportunities
Correct Answer: ABC
Section: (none)

QUESTION 18
Which two options are features of the mobile threat-centric solution? (Choose two.)

A. Advanced Malware Protection


B. comprehensive management
C. simplified policy enforcement and management
D. fuzzy fingerprinting
E. email security

Correct Answer: AB
Section: (none)

QUESTION 19
Which two options are products and benefit of the campus and branch threat-centric solutions? (choose two)

A. Trojan and malware protection with NGIPS


B. Enhanced zero-day and DDoS attacks through NGFW
C. Cloud security policy management through CDO
D. Fuzzy fingerprint
E. Trusted security

Correct Answer: AB
Section: (none)

QUESTION 20
Which attribute does Cisco Talos possess?

A. ability to detect threats across all layers of defense


B. third-party applications integrated through comprehensive APIs
C. real-time threat intelligence
D. detection of threats communicated within 24 hours of occurrence
E. blocks threats in real time

Correct Answer: C
Section: (none)

QUESTION 21
Which three options are major problems for customers growing their business? (choose three)

A. Inconsistent network monitoring


B. Security not extending to the cloud
C. Device incompatibility
D. No scalable solution
E. Inconsistent containment tools
F. Business growing too fast

Correct Answer: BCD


Section: (none)
QUESTION 22
Which two options are solutions and features of campus and branch threat-centirc solution? (Choose two)

A. Enabled and protected investment


B. File retrospection and trajectory
C. NGFW and NGIPS
D. Network analytics
E. Behavioral indication of compromise

Correct Answer: CD
Section: (none)

QUESTION 23
Which two options are important drivers of the current security threat landscape? (Choose two)

A. Growing ecosystem
B. Decreasing third-party applications
C. Expanding complexity
D. Decreasing sophistication
E. Decreasing ecosystem

Correct Answer: AC
Section: (none)

QUESTION 24
In addition to protection, control, and flexibility, which two business values are included in Cisco value
propositions? (Choose two.)

A. Support
B. Completeness
C. Cost effectiveness
D. Scalability
E. Integration

Correct Answer: BC
Section: (none)

QUESTION 25
Which three options are a result of utilizing a fragmented security model? (Choose three.)

A. additional fragmentation that reduces the risk from malicious files


B. fragmented security that provides disbursed protection
C. decreased network accessibility through multiple applications
D. patchworked applications that continually increase in complexity
E. individual components pieced together that are incompatible
F. multiple points of access that can be exploited by cyber criminals

Correct Answer: DEF


Section: (none)

QUESTION 26
Which two options are solutions and features of the campus and branch threat-centric solution? (Choose two.)
A. NGFW and NGIPS
B. file retrospection and trajectory
C. enabled and protected investments
D. behavioral indication of compromise
E. network analytics

Correct Answer: CE
Section: (none)

QUESTION 27
Which two options are products and benefit of email threat-centric solution? (Choose two)

A. Meraki
B. Cloudlock
C. Cisco Registered Envelope Service
D. Cisco Umbrella
E. Web Filtering
F. AMP for Endpoints

Correct Answer: DF
Section: (none)

QUESTION 28
Which three options are attack vectors of the threat-centric defense? (Choose three.)

A. Linux OS
B. email
C. web
D. cloud apps
E. DNS security
F. voicemail

Correct Answer: BCD


Section: (none)

QUESTION 29
Which customer use case is challenged by inconsistent protection, coverage gaps, and exposing businesses
to unwanted security vulnerabilities?

A. Growing business
B. Compliance issue
C. Limited mobility
D. Vulnerable cloud
E. Small budget

Correct Answer: D
Section: (none)

QUESTION 30
Which two attack vectors are protected by identity and access control? (Choose two.)

A. campus and home


B. voicemail
C. endpoints
D. data center
E. cloud apps

Correct Answer: AC
Section: (none)

QUESTION 31
Which three points from the Threat-Centric module are true? (Choose three.)

A. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
B. An effective security solution can help overcome ever-growing security challenges.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Customers require inexpensive security solutions
E. Customers are searching for security answers without interrupting productivity.
F. Cisco Security provides flexible, simple, and integrated advanced threat defection, through a multilayered
approach.

Correct Answer: ACF


Section: (none)

QUESTION 32
Which two Cisco business values demonstrate features of end-to-end protection and protection across the
attack continuum? (Choose two.)

A. completeness
B. cost effectiveness
C. protection
D. control
E. flexibility

Correct Answer: CD
Section: (none)

QUESTION 33
Which two options are benefits of the web threat-centric solution? (Choose two.)

A. malware blocking with AMP


B. data loss prevention with NGFW
C. rogue web filtering protection through CTA
D. policy driver URL filtering
E. email encryption with CRES

Correct Answer: AC
Section: (none)

QUESTION 34
Which three options are solutions and features of the data center threat-centric solution? (Choose three.)

A. constant threat protection at all levels


B. file reputation
C. enabled scalability and capability across the business
D. enhanced visibility of data, user, and device behavior
E. file trajectory
F. global threat intelligence

Correct Answer: ACD


Section: (none)

QUESTION 35
Which three main points of the Cisco Security & Threat Landscape module are true? (Choose three.)

A. An effective security solution provides customers with the necessary tools and resources to overcome their
ever-growing security challenges.
B. The Cisco Security Solutions Portfolio drives customer business outcomes.
C. The business case for security is defined in the threat landscape.
D. The threat landscape is expanding and increasing costs for customers.
E. Customers need an easy to manage and fully integrated solution.
F. Customers must understand how vulnerable they are.

Correct Answer: ABE


Section: (none)

QUESTION 36
Which three options does Cisco provide to customers for visibility and control against current security threats?
(Choose three)

A. 18-month device release cycle


B. unparalleled network and endpoint visibility
C. fast device policy updates
D. unmatched security enforcement
E. comprehensive policy enforcement
F. granular device visibility and management

Correct Answer: BDF


Section: (none)

QUESTION 37
Which two options are features of the endpoints threat-centric solution? (Choose two.)

A. remote VPN
B. fuzzy fingerprinting
C. URL filtering
D. antivirus defense
E. web proxy

Correct Answer: BD
Section: (none)

QUESTION 38
Which three security vectors must customers monitor to overcome security challenges? (Choose three.)

A. cloud apps
B. remote and central
C. hackers device
D. campus and breach
E. malware protection
F. data center

Correct Answer: ADF


Section: (none)

QUESTION 39
Which three business outcomes do customers want to achieve? (Choose three.)

A. access to user's personal information


B. flexible solutions
C. managed environment
D. complete protection
E. complete cloud security model
F. additional firewalls for additional protection

Correct Answer: BCD


Section: (none)

QUESTION 40
Why does Software Volume Purchasing streamline software strategy and asset management?

A. Many solutions are offered only on one platform.


B. Customers can choose a license platform bundle that meets their needs.
C. Flexible consumption models provide less value than a la carte.
D. Bundled solutions can be added on to new appliances.

Correct Answer: B
Section: (none)

QUESTION 41
Which Cisco Security benefit is a differentiator that allows partners to plan and model their business?

A. one solution to fit every need


B. comprehensive vision for security
C. lowest price points
D. unparalleled commitment
E. best-in-class technologies

Correct Answer: D
Section: (none)

QUESTION 42
Which three options are issues that nonscalability brings? (Choose three)

A. inexperienced IT staff
B. lack of intrusion prevention tools
C. no employee remote access
D. security solutions are stale
E. business growing too fast
F. outdated malware databases

Correct Answer: DEF


Section: (none)

QUESTION 43
Which two options are small budget customer concerns? (Choose two.)

A. Products are not packaged together.


B. Too many security vendors to manage.
C. Licenses are too cheap.
D. Security budget has been shrinking
E. Multiple devices are leaving a gap in security.

Correct Answer: DE
Section: (none)

QUESTION 44
Which primary customer challenge is brought by the wide variety of security solution providers on the market?

A. choosing the right provider


B. contacting all providers for information
C. finding a low-cost option
D. determining the single best security product

Correct Answer: A
Section: (none)

QUESTION 45
Which option describes how partners can help customers using their unique relationship with Cisco award-
winning resources and support?

A. Be the first to receive new innovations


B. Take advantage of incentives programs
C. Access 24-hour support around the word
D. Earn higher margins on each deal sold

Correct Answer: C
Section: (none)

QUESTION 46
Which three customer use cases address the best outcome? (Choose three)

A. Propose the best scalability.


B. Offer powerful and integrated products.
C. Faster threat identification
D. Deliver flexible deployment options.
E. Enhance remediation.
F. Provide complete protection.

Correct Answer: BDF


Section: (none)

QUESTION 47
Which three options are Cisco industry differentiators? (choose three)

A. uncontested threat blocking


B. unparalleled commitment to security
C. unmatched support and services
D. lowest price
E. largest selection of security solutions
F. best-in-class technologies

Correct Answer: BCF


Section: (none)

QUESTION 48
Which application works with customers to eliminate security gaps and ensure safe data access and storage
in the cloud across devices?

A. AnyConnect
B. Cloudlock
C. Stealthwatch
D. TrustSec
E. AMP Threat Grid
F. Next Generation Firewall

Correct Answer: C
Section: (none)

QUESTION 49
Which phase of the software lifecycle has relationship building as a critical part because it deals with
developing new licenses to meet changing customer needs?

A. extend
B. renew
C. upsell and cross sell
D. adopt
E. activate

Correct Answer: C
Section: (none)

QUESTION 50
Why do partners often have a hard time selling their new security solutions to customers?

A. Customers have antiquated solutions.


B. Customers show a lack of concern over malware and threats.
C. Customers boast completely secure environments.
D. Customers have overcrowded portfolios of security solutions from multiple vendors.

Correct Answer: D
Section: (none)

QUESTION 51
How action do sellers help customers take during the adopt phase of the software lifecycle?

A. Anticipate future requirements and prepare accordingly.


B. Help customers manage their assets.
C. Develop an activation strategy and development plan.
D. Assist customers to become comfortable with their new software.
E. Identify new opportunities for services.

Correct Answer: D
Section: (none)

QUESTION 52
Which two options are features of Cisco Enterprise License Agreements? (Choose two.)

A. limited consumption models


B. up-front pricing
C. one agreement for each part of the business
D. unforeseen costs and fees down the road
E. organic growth up to 20%
F. short-term lifespan under 1 year

Correct Answer: BE
Section: (none)

QUESTION 53
Which two options are products and benefits of the mobile threat-centric solution? (Choose two)

A. enforced device security policies with Meraki


B. enhanced control access with ISE and Cloudlock
C. device phishing protection through AMP
D. automated policy enforcement with ASAv
E. software-defined segmentation through TrustSec

Correct Answer: AB
Section: (none)

QUESTION 54
Which option lists business outcomes that most customers are working to achieve in response to the current
security threat landscape?

A. complete protection, increased fragmentation, enabled business


B. increased scalability, visibility and control, blocking only current threats
C. increased scalability, blocking only current threats, enabled business
D. complete protection, visibility and control, enabled business

Correct Answer: D
Section: (none)

QUESTION 55
Which two options drive successful business outcomes for customers? (choose two)

A. Endpoint visibility
B. Enhanced visibility
C. Comprehensive threat protection
D. Hardend solutions
E. Firewall protection

Correct Answer: AC
Section: (none)

QUESTION 56
Which three options does Cisco provide to customers for complete protection againist current security threat?
(choose three)

A. Threat-centric defense
B. Sporadic application analysis
C. Accelerated threat identification
D. Enhanced remediation
E. Accelerated threat identification
F. Manual security intelligence updates

Correct Answer: ACDE


Section: (none)

QUESTION 57
How does the Cisco policy and access solution handle a changing user base in growing company?

A. Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer
needs
B. Cisco architecture offers the lowest TCO by providing product that integrate, which lowers the cost of IT
setup, management, and maintenance.

C Cisco Talos Security Intelligence and Research Group integrates into all security solutions, which
provides advanced protection against new threats.
C. Cisco provides you the ability to monitor and restrict application usage. As applications become more
complex, Cisco provides the flexibility to control all or subsets of the application.

Correct Answer: A
Section: (none)

QUESTION 58
Which issues are resolved with the Security Advantage programs? (Choose two)

A. Have a defined consumption level


B. Have undefined security spend
C. Have an end-of-year budget
D. Require customized investments
E. Need an unlimited consumption model

Correct Answer: AC
Section: (none)

QUESTION 59
Which customer cost saver leverages current infrastructures without buying new appliances and avoids
lengthy customizations?

A. faster integration
B. fewer resources to manage
C. flexible licensing
D. less time scoping a breach

Correct Answer: C
Section: (none)

QUESTION 60
Which three options are main areas of the Cisco Security Portfolio? (choose three)

A. roaming security
B. ASA and NGIPS
C. advanced threat
D. web and email security
E. cloud security
F. policy and entry

Correct Answer: CDE


Section: (none)

QUESTION 61
Which two actions must partners do during the asset management phase of the software lifecycle? (Choose
two.)

A. Create deep analytics and customized reports about license optimization.


B. Develop a new strategy based on expected needs.
C. Track utilization rates to understand current license efficacy
D. Help customers understand how new infrastructure is superior.
E. Offer activation services.

Correct Answer: AC
Section: (none)

QUESTION 62
Which two options are Cisco policy and access solutions? (Choose two.)

A. Next-Generation Intrusion Prevention System


B. AnyConnect
C. email security
D. web security
E. Next-Generation Firewall
F. identity service engine

Correct Answer: BF
Section: (none)

QUESTION 63
Which two benefits do partners gain when they use the software lifecycle? (Choose two.)

A. Adaptable deployment
B. Software portability
C. Improved sales performance
D. Cisco incentives
E. Increased efficiencies
F. Sales promotions
G. Customer support

Correct Answer: CE
Section: (none)

QUESTION 64
Which issue are you dealing with if a customer has different user groups that need distinct levels of access to
data?

A. limited mobility
B. growing business
C. vulnerable cloud
D. small budget
E. compliance issue

Correct Answer: E
Section: (none)

QUESTION 65
Which three features do customers get with smart license? (Choose three.)

A. PAK registration
B. company specific licensing
C. easy registration
D. manual registration
E. a complete view of software, services, and devices
F. products that have to be continually adjusted

Correct Answer: BCE


Section: (none)

QUESTION 66
Which two options are solutions and features of the email threat-centric solution? (Choose two.)

A. additional email security


B. DNS-Layer Security
C. CTD and Network Analytics
D. Advanced Malware Protection
E. Cloud App Security

Correct Answer: BC
Section: (none)

QUESTION 67
Which component of Cisco Stealthwatch uses sophisticated security analytics to accelerate threat response
time?

A. network control
B. investigation
C. threat protection
D. anomaly detection
E. granular visibility

Correct Answer: B
Section: (none)
QUESTION 68
Which two attack vectors are protected by remote access VPN? (Choose two.)

A. campus and branch


B. voicemail
C. cloud apps
D. email
E. mobile

Correct Answer: DE
Section: (none)

QUESTION 69
Which application works with Cisco NGFW to provide administrators powerful application and usage controls
over mobile users?

A. TrustSec
B. Cloudlock
C. Stealthwatch
D. Next Generation Firewall
E. AnyConnect
F. AMP Threat Grid

Correct Answer: D
Section: (none)

QUESTION 70
Which NGFW appliance do you use if your customer is a small business that requires multilayered protection
and task automation?

A. ASA4100 Series
B. FirePower 3100 Series
C. Cisco 4000 Series NGIPS
D. ASA5500-X with FirePOWER
E. Cisco 500 Series ISR

Correct Answer: D
Section: (none)

QUESTION 71
Which component of NGFW and NGIPS provides a unified image that includes the Cisco ASA features and
FirePOWER Services?

A. Firepower Threat Defense


B. Meraki MX
C. Next GenerationlPS
D. Cloudlock
E. Advanced Malware Protection

Correct Answer: A
Section: (none)

QUESTION 72
Which two attack vectors are protected by cloud app security? (Choose two.)

A. mobile
B. cloud apps
C. voicemail
D. email
E. campus and branch

Correct Answer: AD
Section: (none)

QUESTION 73
Which three attack vectors are protected by web security? (Choose three.)

A. voicemail
B. mobile
C. cloud apps
D. web
E. virtual machines
F. endpoints

Correct Answer: BDF


Section: (none)

QUESTION 74
Which three options are cloud security products? (choose three)

A. Meraki
B. Cloudlock
C. NGFW
D. Investigate
E. Web Security Appliance
F. Umbrella

Correct Answer: BDF


Section: (none)

QUESTION 75
Which Cisco security technology delivers the best real-time threat intelligence?

A. Cisco Security Intelligence Operations


B. Cisco ASA Next-Generation Firewall Services
C. Cisco Identity Services Engine
D. Cisco Security Manager
E. Cisco TrustSec

Correct Answer: A
Section: (none)

QUESTION 76
Which three issues do customers with limited mobility issues deal with? (choose three)

A. Remote workers that compromise security


B. Solutions that do not extend off network
C. Complex mobile management
D. Complex mobile management
E. Big data center vulnerability
F. Expensive malware attacks

Correct Answer: ABC


Section: (none)

QUESTION 77
Which ISR appliance di you use if your customer is a small business that requires integrated switching and
routing and WAN redundancy?

A. FirePower 8000 secirs


B. Cisco 4000 Series ISR
C. Cisco 800 Series ISR
D. FirePower 7000 Series
E. FirePower 2100 Series

Correct Answer: B
Section: (none)

QUESTION 78
Which Cisco business value is represented by features of automatic updates and post-attack guidance?

A. cost effectiveness
B. flexibility
C. protection
D. completeness
E. control

Correct Answer: C
Section: (none)

QUESTION 79
Which issue do customers with vulnerable cloud issues deal with (choose three)

A. invisible employee apps usage


B. appropriate level of access
C. solution that does not extend to cloud
D. lack of protection from cloud apps
E. complex mobile management
F. expensive malware attacks

Correct Answer: ACD


Section: (none)

QUESTION 80
Which option is the best example of how Cisco solution enable customer’s business?

A. faster threat identification


B. better ability to scale and alter your environment
C. best continuous analysis
D. only comprehensive policy enforcement tool

Correct Answer: C
Section: (none)

QUESTION 81
Which trait of Cisco security solutions addresses the worry that a customer's security provider will leave the
market or reach end-of-life?

A. familiarity
B. functionality
C. robustness
D. cost
E. stability

Correct Answer: E
Section: (none)

QUESTION 82
Which two attack vectors are protected by email security? (Choose two.)

A. mobile
B. endpoints
C. voicemail
D. email
E. virtual machines
F. cloud apps

Correct Answer: BD
Section: (none)

QUESTION 83
Which two options are solutions and features of the web threat-centric solution? (Choose two)

A. URL filtering
B. CTA and threat defense
C. Email security
D. Identity and access control
E. Data loss prevention

Correct Answer: AE
Section: (none)

QUESTION 84
Which phase of the software lifecycle deals with anticipating customer needs and bundling and adding
products accordingly?

A. plan and supply


B. upsell and cross sell
C. renew
D. land and expand
E. know and grow
Correct Answer: B
Section: (none)

QUESTION 85
Which two benefit of a partner selling Cisco security solutions are true? (Choose two.)

A. Incentives programs
B. Lower total cost of ownership
C. Simplified architecture solution
D. Opportunities for new revenue
E. Partner referrals

Correct Answer: CD
Section: (none)

QUESTION 86
Which three options are products and benefits of the mobile threat-centric solution? (choose three)

A. AnyConect
B. URL filter
C. Enhanced access and usage control with ISE
D. Enforced device security policies with Meraki
E. Secure off-network connection with Stealthwatch
F. CRD and network Analytics

Correct Answer: ACD


Section: (none)

QUESTION 87
Which NGIPS appliance do you use if you customer is at the enterprise level and requires modular
architecture that is scalable?

A. FirePOWER 2100 Series


B. ASA 7000 Series
C. FirePOWER 8000 Series
D. Cisco 4000 Series ISR
E. Cisco 800 Series ISR

Correct Answer: C
Section: (none)

QUESTION 88
Which two options are issues that customers with compliance standards issues are dealing with? (Choose
two)

A. Device incompatibility
B. Lack of access policies
C. Malware attacks
D. Email exposure
E. Inconsistent oversight

Correct Answer: AB
Section: (none)
QUESTION 89
Which three options are Cisco Advanced Threat Solutions? (Choose three.)

A. Next-Generation Intrusion Prevention System


B. Stealthwatch
C. remote access VPN
D. identity and access control
E. web security
F. cognitive Threat analytics

Correct Answer: BDF


Section: (none)

QUESTION 90
Which three options are solutions and features of the cloud apps threat-centric solution? (Choose three.)

A. Cloud App Security


B. CTD and Network Analytics
C. remote access VPN
D. accelerated threat response
E. complete policy management
F. cloud data loss prevention

Correct Answer: ADF


Section: (none)

QUESTION 91
Which Cisco security technology delivers the best real-time threat intelligence?

A. Identity Services Engine


B. Cisco Talos Security
C. TrustSec
D. Next Generation Firewall
E. Cisco Security Manager

Correct Answer: B
Section: (none)

QUESTION 92
Which two options are attack vectors protected by DNS-layer security? (Choose two.)

A. voicemail
B. virtual machines
C. Linux OS
D. email
E. web

Correct Answer: DE
Section: (none)

QUESTION 93
On average, how much do network attacks cost?
A. $300K
B. $50K
C. $500k
D. $300B

Correct Answer: A
Section: (none)

Das könnte Ihnen auch gefallen