700 760 Sep21
700 760 Sep21
700 760 Sep21
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. Duo
B. Identity Services Engine
C. Stealthwatch
D. Cisco Security Connector
E. AMP for Endpoints
Answer: BC
Q2x
Which two benefits of streamlined management does Cisco provide? (Choose two.)
Answer: AD
Q3x
Which are two reasons perimeter-based network security is no longer sufficient? (Choose two )
A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users
Answer: AD
Q4x
What are two ways Cisco helps customers navigate compliance issues? (Choose two.)
Answer: AB
Q5x
Which two security risks are created by legacy approaches to networking? (Choose two.)
A. network downtime
B. user vulnerability
C. access points
D. slow containment
E. large attack surface
Answer: DE
Q6x
In which two ways should companies modernize their security philosophies? (Choose two.)
Answer: AE
Q7x
How can partners leverage Cisco's award-winning resources and support to help customers?
Answer: A
Q8x
What is an attribute of Cisco Talos?
Answer: C
Q9x
What are two common seller obstacles? (Choose two.)
Answer: BC
Q10x
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points
Answer: AB
Q11x
Which network security product provides a unified image on an intuitive interface?
Answer: D
Q12x
Which two products are involved in granting safe access to apps? (Choose two.)
A. ACI
B. Identify Services Engine
C. TrustSec
D. Duo
E. SD-Access
Answer: BD
Q13x
Where do you start to achieve true network visibility?
A. Branches
B. Fabric Level
C. OT
D. IT
Answer: B
Q14x
What are two results of utilizing a fragmented security model? (Choose two.)
Answer: AB
Q15x
What are two key Cisco loT use cases? (Choose two.)
A. Mobile Utilities
B. Financial Institutions
C. Parks and Recreation
D. Industrial Security
E. Connected Health
Answer: AE
Q16
What are two ways that Cisco helps customers balance protection and accessibility? (Choose
two )
Answer: AC
Q17x
For what does ACI provide a single point of support?
A. automation
B. management
C. orchestration
D. visibility
Answer: C
Q18
Which two elements does Tetration provide for security posture and traffic analysis? (Choose
two.)
A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages
Answer: D
Q19x
What are two common customer obstacles? (Choose two.)
Answer: AC
Q20x
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
Answer: BD
Q21
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose
two.)
Answer: AE
Q22x
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA
Answer: CD
Q23x
Which three products are in Cisco's Web & Email Security portfolio? (Choose three.)
A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES
Answer: BDF
Q24
What are three main areas of the Cisco Security Portfolio? (Choose three.)
A. Firewalls
B. Advanced Threat
C. Cloud Security
D. Roaming Security
E. loT Security
F. Voice & Collaboration
Answer: BCE
Q25x
Which three products are used to secure the cloud? (Choose three.)
A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock
Answer: BCF
Q26x
Which three products are Cisco Advanced Threat solutions? (Choose three.)
A. Stealthwatch
B. Web Security
C. Remote Access VPN
D. ThreatGrid
E. Advanced Malware Protection (AMP)
F. Next-Generation Firewall (NGFW)
G. Next-Generation Intrusion Prevention System (NGIPS)
Answer: ADE
Q27
Which two security areas are provided by Cisco's email solutions? (Choose two.)
A. DNS-Layer Security
B. CTD & Network Analytics
C. Malware Protection
D. Identity Services
E. Cloud App Security
Answer: CD
Q28x
What are two of the key benefits of the Opportunity Incentive Program? (Choose two.)
Answer: CD
Q29x
Which three products are Cisco Visibility & Enforcement solutions? (Choose three.)
A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints
Answer: BCD
Q30
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
Answer: AB
Q31x
What is the primary customer challenge caused by the wide variety of security solution providers
on the market?
Answer: D
Q32x
Which component of AMP provides the details customers need to address problems after a
breach is identified?
A. Rapid remediation
B. File sandboxing
C. Continuous analysis
D. Context awareness
Answer: A
Q33x
What is used to reduce attack surfaces?
A. Access
B. Remediation
C. Segmentation
D. Device trust
Answer: C
Q34x
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
Answer: BE
Q35x
What is the primary customer challenge caused by the wide variety of security solution providers
on the market?
Answer: D
Q36x
In which two ways does Cisco address resource constraints for customers? (Choose two.)
Answer: CD
Q37x
Which two attack vectors are protected by Email Security? (Choose two.)
A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud
Answer: BCE
Q38x
What are two steps organizations must take to secure loT? (Choose two.)
A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions
Answer: AC
Q39x
Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times?
A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection
Answer: C
Q40x
What does remote access use to verify identity?
A. MFA
B. Remote Access VPN
C. Agents
D. AMP for Endpoints
Answer: A
Q41x
What are two steps organizations must take to secure loT? (Choose two.)
A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions
Answer: AC
Q42x
Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times?
A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection
Answer: C
Q43x
Which two attack vectors are protected by Remote Access VPN? (Choose two.)
A. Cloud
B. Campus & Branch
C. Voicemail
D. Email
E. Mobile
Answer: BE
Q44x
Which two security areas are part of Cisco's web solutions? (Choose two.)
A. URL Filtering
B. Web Security
C. Email Security
D. Identity & Access Control
E. Malware Protection
Answer: AE
Q45x
Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email
Answer: BD
Q46x
Which two attack vectors are protected by Next-Generation Intrusion Prevention System
(NGIPS)? (Choose two)
A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email
Answer: AB
Q47x
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
Answer: BE
Q48x
Which two types of recurring revenue sales does Cisco offer? (Choose two.)
Answer: AB
Q49x
Which option is a challenge that is often faced by small businesses when considering security
solutions?
A. Enterprise-level firewalls
B. Limited budget
C. Large numbers of overseas employees
D. Solutions that lack email security
Answer: B
Q50x
Which two aspects of Cisco solutions save customers money? (Choose two.)
A. Maturity
B. Detection
C. Motivation
D. Protection
E. Prevention
Answer: AC
Q52x
Which three factors should a customer consider when choosing the ideal security solution
provider? (Choose three.)
Answer: BEF
Q53x
Which statement embodies trust-centric security?
Answer: D
Q54x
Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center
Answer: CDE
Q55x
Which two areas require secure access? (Choose two.)
A. Workflow
B. Workspace
C. Workforce
D. Worktable
E. Workloads
Answer: CE