Cisco Security Architecture for System Engineers v1.0

Page:    1 / 6   
Exam contains 83 questions

What does remote access use to verify identity?

  • A. Agents
  • B. MFA
  • C. Remote Access VPN
  • D. AMP for Endpoints


Answer : A

What are two common seller obstacles? (Choose two.)

  • A. Seller competition
  • B. Overcrowded portfolios
  • C. Fragmented solutions
  • D. Unresponsive potential customers
  • E. Complexity of solution components


Answer : BE

What is one of the key features of Cognitive Intelligence?

  • A. Allows visibility into anonymous and encrypted communications
  • B. It enables greater threat intelligence with entity modeling
  • C. It enables safe email usage with event analytics
  • D. It enhances anonymity with URL filtering


Answer : A

Which two attack vectors are protected by Malware Protection? (Choose two.)

  • A. Voicemail
  • B. Web
  • C. Mobile
  • D. Email
  • E. Data Center


Answer : BD

What are three key benefits of Cisco NGFW? (Choose three.)

  • A. Reduces throughput
  • B. Increases traffic latency
  • C. Detects and remediates threats faster
  • D. Identifies anomalous traffic
  • E. Prepares defenses
  • F. Reduces complexity


Answer : CDF

What are two features of Advanced Malware Protection (AMP)? (Choose two.)

  • A. File Retrospection and Trajectory
  • B. Dynamic Malware Analysis
  • C. Local Threat Intelligence
  • D. Automated Policy Management
  • E. Automatic Behavioral Authorization


Answer : AB

What is a continuous protection feature of Advanced Malware Protection?

  • A. File Reputation
  • B. Behavioral Indicators of Compromise
  • C. Global Threat Intelligence
  • D. Sandboxing File Analysis


Answer : B

Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to onboard it quickly and easily?

  • A. Device profiling
  • B. Centralized policy management
  • C. Context-aware access
  • D. Platform exchange grid


Answer : A

What are two features provided by ISE? (Choose two.)

  • A. Device Firewalling
  • B. Guest Management
  • C. DDOS attack prevention
  • D. Centralized policy management
  • E. Network visibility


Answer : BD

What are two solutions Cisco offers for web security? (Choose two.)

  • A. Cloudlock
  • B. AMP for Web Security
  • C. Cognitive Intelligence
  • D. CRES
  • E. NGFW


Answer : BC

What do customers receive when implementing TrustSec?

  • A. Context-aware access enhancing the forensic capabilities available to their IT team
  • B. SSL decryption enabling secure communications on and off company networks
  • C. Dynamic role-based access control that enables them to enforce business role policies across all network services
  • D. Dynamic profiling and onboarding, enabling businesses to control company role policies across all network services


Answer : C

Which two IoT environment layers are protected by AMP for Endpoints? (Choose two.)

  • A. Control Layer
  • B. Internet/Cloud
  • C. Data Center
  • D. Things
  • E. Access Points


Answer : BD

What does Cisco provide via Firepower"™s simplified, consistent management?

  • A. Higher value
  • B. Reduced complexity
  • C. Improved speed to security
  • D. Reduced down time


Answer : B

What are three major features of StealthWatch? (Choose three.)

  • A. Real-time sandboxing
  • B. Forensic investigation
  • C. Threat-based anomaly detection
  • D. Data Loss Prevention
  • E. Netflow monitoring
  • F. Malware clustering


Answer : BCE

What are two key advantages of Cisco"™s Security Solutions Portfolio? (Choose two.)

  • A. An effective security solution portfolio can help customers overcome ever-growing security challenges
  • B. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes
  • C. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayered approach.
  • D. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business outcomes.
  • E. The Cisco Security Portfolio provides security across the entire business environment.


Answer : CD

Page:    1 / 6   
Exam contains 83 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy