700 760 Sep21

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Q1x

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

A. Duo
B. Identity Services Engine
C. Stealthwatch
D. Cisco Security Connector
E. AMP for Endpoints

Answer: BC

Q2x
Which two benefits of streamlined management does Cisco provide? (Choose two.)

A. Unified management across multiple services


B. Siloed systems
C. Consolidated security monitoring
D. Centralized management
E. Device access control

Answer: AD

Q3x
Which are two reasons perimeter-based network security is no longer sufficient? (Choose two )

A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users

Answer: AD

Q4x
What are two ways Cisco helps customers navigate compliance issues? (Choose two.)

A. Providing identity verification


B. Securing email communications
C. Ensuring all employees have access to all files
D. Removing reporting requirements
E. Removing bureaucratic security tags

Answer: AB

Q5x
Which two security risks are created by legacy approaches to networking? (Choose two.)

A. network downtime
B. user vulnerability
C. access points
D. slow containment
E. large attack surface

Answer: DE

Q6x
In which two ways should companies modernize their security philosophies? (Choose two.)

A. Reinforce their threat-centric security tactics.


B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions
E. Complement threat-centric tactics with trust-centric methods.

Answer: AE

Q7x
How can partners leverage Cisco's award-winning resources and support to help customers?

A. Access support, services, and resources whenever needed.


B. Be the first to receive new innovations.
C. Take advantage of incentives programs.
D. Earn higher margins on each deal sold.

Answer: A

Q8x
What is an attribute of Cisco Talos?

A. Detection of threats communicated within 48 hours of occurrence


B. Blocks threats in real time
C. Real-time threat information
D. 3rd party applications integrated through comprehensive APIs

Answer: C

Q9x
What are two common seller obstacles? (Choose two.)

A. Unresponsive potential customers


B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition

Answer: BC

Q10x
In which two ways has digitization transformed today's security threat landscape? (Choose two.)

A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points

Answer: AB

Q11x
Which network security product provides a unified image on an intuitive interface?

A. Next-Generation Intrusion Prevention System


B. Advanced Malware Protection
C. Cloudlock
D. Firepower Threat Defense

Answer: D

Q12x
Which two products are involved in granting safe access to apps? (Choose two.)

A. ACI
B. Identify Services Engine
C. TrustSec
D. Duo
E. SD-Access

Answer: BD

Q13x
Where do you start to achieve true network visibility?

A. Branches
B. Fabric Level
C. OT
D. IT

Answer: B

Q14x
What are two results of utilizing a fragmented security model? (Choose two.)

A. Individual components pieced together to meet requirements.


B. Decreased visibility and limited understand of security coverage.
C. Reduced malicious file risk through additional segmentation.
D. Decreased network accessibility through multiple applications.
E. Increased identity controls.

Answer: AB

Q15x
What are two key Cisco loT use cases? (Choose two.)

A. Mobile Utilities
B. Financial Institutions
C. Parks and Recreation
D. Industrial Security
E. Connected Health

Answer: AE

Q16
What are two ways that Cisco helps customers balance protection and accessibility? (Choose
two )

A. Leverage integrated tools and dynamic context to enforce policies


B. Reinforce device infrastructure with an extensive security portfolio
C. Provide vital training to ensure a skilled workforce.
D. Analyze user and device vulnerability.
E. Manage risk more effectively across the environment.

Answer: AC

Q17x
For what does ACI provide a single point of support?

A. automation
B. management
C. orchestration
D. visibility

Answer: C
Q18
Which two elements does Tetration provide for security posture and traffic analysis? (Choose
two.)

A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages

Answer: D

Q19x
What are two common customer obstacles? (Choose two.)

A. Lack of solution integration


B. High turnover of IT professionals
C. Compliance regulations
D. Limited resources
E. Security system blackouts

Answer: AC

Q20x
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)

A. Simplify the datacenter


B. Meet immediate needs
C. Roll out more solutions
D. Plan for the future
E. Reduce training needs

Answer: BD

Q21
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose
two.)

A. Limit internal access to networks.


B. Require and install agents on mobile devices.
C. Always verify and never trust everything inside and outside the perimeter.
D. Block BYOD devices.
E. Only grant access to authorized users and devices.

Answer: AE

Q22x
Which two products empower customers to create secure next-gen networks? (Choose two.)

A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA

Answer: CD
Q23x
Which three products are in Cisco's Web & Email Security portfolio? (Choose three.)

A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES

Answer: BDF
Q24
What are three main areas of the Cisco Security Portfolio? (Choose three.)

A. Firewalls
B. Advanced Threat
C. Cloud Security
D. Roaming Security
E. loT Security
F. Voice & Collaboration

Answer: BCE

Q25x
Which three products are used to secure the cloud? (Choose three.)

A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock

Answer: BCF

Q26x
Which three products are Cisco Advanced Threat solutions? (Choose three.)

A. Stealthwatch
B. Web Security
C. Remote Access VPN
D. ThreatGrid
E. Advanced Malware Protection (AMP)
F. Next-Generation Firewall (NGFW)
G. Next-Generation Intrusion Prevention System (NGIPS)
Answer: ADE

Q27
Which two security areas are provided by Cisco's email solutions? (Choose two.)

A. DNS-Layer Security
B. CTD & Network Analytics
C. Malware Protection
D. Identity Services
E. Cloud App Security

Answer: CD

Q28x
What are two of the key benefits of the Opportunity Incentive Program? (Choose two.)

A. Supports a focus on the customer lifecycle


B. Facilitates rapid quoting to decrease time to market
C. Incentivizes partner-driven opportunity creation efforts
D. Reinforces partner demand-generation capabilities
E. Strengthens customer success management

Answer: CD

Q29x
Which three products are Cisco Visibility & Enforcement solutions? (Choose three.)

A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints

Answer: BCD

Q30
What are two ways Cisco addresses customers' growing business needs? (Choose two.)

A. Multi/hybrid cloud platforms


B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices

Answer: AB

Q31x
What is the primary customer challenge caused by the wide variety of security solution providers
on the market?

A. Finding a low-cost option


B. Determining the single best security product
C. Contacting all providers for information
D. Finding the right provider to offer the best value

Answer: D

Q32x
Which component of AMP provides the details customers need to address problems after a
breach is identified?

A. Rapid remediation
B. File sandboxing
C. Continuous analysis
D. Context awareness

Answer: A

Q33x
What is used to reduce attack surfaces?

A. Access
B. Remediation
C. Segmentation
D. Device trust

Answer: C

Q34x
What are two ways Cisco addresses customers' growing business needs? (Choose two.)

A. Multi/hybrid cloud platforms


B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices

Answer: BE

Q35x
What is the primary customer challenge caused by the wide variety of security solution providers
on the market?

A. Finding a low-cost option


B. Determining the single best security product
C. Contacting all providers for information
D. Finding the right provider to offer the best value

Answer: D

Q36x
In which two ways does Cisco address resource constraints for customers? (Choose two.)

A. Extended datacenter support


B. loT device hardware upgrades
C. Environment control via URL filtering and AVC
D. Enable many features via one appliance
E. Consolidated training

Answer: CD

Q37x
Which two attack vectors are protected by Email Security? (Choose two.)

A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud

Answer: BCE

Q38x
What are two steps organizations must take to secure loT? (Choose two.)

A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions

Answer: AC

Q39x
Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times?

A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection

Answer: C

Q40x
What does remote access use to verify identity?

A. MFA
B. Remote Access VPN
C. Agents
D. AMP for Endpoints

Answer: A

Q41x
What are two steps organizations must take to secure loT? (Choose two.)

A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions

Answer: AC

Q42x
Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times?

A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection

Answer: C

Q43x
Which two attack vectors are protected by Remote Access VPN? (Choose two.)

A. Cloud
B. Campus & Branch
C. Voicemail
D. Email
E. Mobile

Answer: BE
Q44x
Which two security areas are part of Cisco's web solutions? (Choose two.)

A. URL Filtering
B. Web Security
C. Email Security
D. Identity & Access Control
E. Malware Protection

Answer: AE

Q45x
Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email

Answer: BD

Q46x
Which two attack vectors are protected by Next-Generation Intrusion Prevention System
(NGIPS)? (Choose two)

A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email

Answer: AB

Q47x
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)

A. Advanced Malware Protection


B. Identity Services Engine
C. Industrial Network Director
D. Cisco Security Connector
E. Duo

Answer: BE

Q48x
Which two types of recurring revenue sales does Cisco offer? (Choose two.)

A. Platform subscription sale


B. License sale
C. Portfolio
D. Subscription sale
E. Training

Answer: AB

Q49x
Which option is a challenge that is often faced by small businesses when considering security
solutions?

A. Enterprise-level firewalls
B. Limited budget
C. Large numbers of overseas employees
D. Solutions that lack email security

Answer: B

Q50x
Which two aspects of Cisco solutions save customers money? (Choose two.)

A. fewer resources to manage


B. faster integration
C. replacing current infrastructure completely
D. 100% effectiveness
Answer: AB
Q51x
What are two factors that influence customer loT conversations'? (Choose two)

A. Maturity
B. Detection
C. Motivation
D. Protection
E. Prevention

Answer: AC

Q52x
Which three factors should a customer consider when choosing the ideal security solution
provider? (Choose three.)

A. Creates new market opportunities


B. Delivers excellent partner and customer support
C. Generates higher margins on each sale
D. Provides solutions at the lowest cost
E. Offers more than just niche products
F. Is committed to security

Answer: BEF
Q53x
Which statement embodies trust-centric security?

A. Verify before granting access via MDM software


B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
C. Protect users from attacks by enabling strict security policies.
D. Verify before granting access via identity-based policies for users, devices, app and locations

Answer: D

Q54x
Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center

Answer: CDE

Q55x
Which two areas require secure access? (Choose two.)

A. Workflow
B. Workspace
C. Workforce
D. Worktable
E. Workloads

Answer: CE

You might also like