100% found this document useful (1 vote)
1K views14 pages

700-760 Advanced Security Architecture Express For Account Managers (ASAEAM)

Cisco provides security certification questions to test knowledge of their security products and solutions. The questions cover a wide range of topics including network visibility, cloud security, email & web security, advanced threat protection, and more. Cisco addresses growing business needs through highly scalable platforms and multiple solution deployment choices. Network visibility is achieved at the fabric level.

Uploaded by

Вит
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views14 pages

700-760 Advanced Security Architecture Express For Account Managers (ASAEAM)

Cisco provides security certification questions to test knowledge of their security products and solutions. The questions cover a wide range of topics including network visibility, cloud security, email & web security, advanced threat protection, and more. Cisco addresses growing business needs through highly scalable platforms and multiple solution deployment choices. Network visibility is achieved at the fabric level.

Uploaded by

Вит
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

700-760 Advanced Security Architecture Express for Account Managers (ASAEAM)

QUESTION 1
What are two ways Cisco addresses customers' growing business needs? (Choose two.)
A. Multi/hybrid cloud platforms
B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices

Correct Answer: BE

QUESTION 2
Where do you start to achieve true network visibility?
A. Branches
B. Fabric Level
C. OT
D. IT

Correct Answer: B

QUESTION 3
Which three products are used to secure the cloud? (Choose three.)
A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock

Correct Answer: BCF

QUESTION 4
Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)
A. Mobile
B. Cloud
C. Email
D. Web
E. Endpoints

Correct Answer: AE

QUESTION 5
Which two attack vectors are protected by Email Security? (Choose two.)
A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud

Correct Answer: BC

QUESTION 6
Which two areas require secure access? (Choose two.)
A. Workflow
B. Workspace
C. Workforce
D. Worktable
E. Workloads

Correct Answer: CE

QUESTION 7
What are three main areas of the Cisco Security Portfolio? (Choose three.)
A. Firewalls
B. Advanced Threat
C. Cloud Security
D. Roaming Security
E. loT Security
F. Voice & Collaboration

Correct Answer: BCE

QUESTION 8
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA

Correct Answer: CD

QUESTION 9
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points

Correct Answer: AB

QUESTION 10
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
A. Limit internal access to networks.
B. Require and install agents on mobile devices.
C. Always verify and never trust everything inside and outside the perimeter.
D. Block BYOD devices.
E. Only grant access to authorized users and devices.

Correct Answer: CE

QUESTION 11
Which three factors should a customer consider when choosing the ideal security solution provider? (Choose three.)
A. Creates new market opportunities
B. Delivers excellent partner and customer support
C. Generates higher margins on each sale
D. Provides solutions at the lowest cost
E. Offers more than just niche products
F. Is committed to security

Correct Answer: BEF

QUESTION 12
Which component of StealthWatch uses sophisticated security analytics to accelerate threat response times?
A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection

Correct Answer: B

QUESTION 13
Which two security areas are provided by Cisco's email solutions? (Choose two.)
A. DNS-Layer Security
B. CTD & Network Analytics
C. Malware Protection
D. Identity Services
E. Cloud App Security

Correct Answer: AC

QUESTION 14
How can partners leverage Cisco's award-winning resources and support to help customers?
A. Access support, services, and resources whenever needed.
B. Be the first to receive new innovations.
C. Take advantage of incentives programs.
D. Earn higher margins on each deal sold.

Correct Answer: A

QUESTION 15
Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center

Correct Answer: CD

QUESTION 16
What is used to reduce attack surfaces?
A. Access
B. Remediation
C. Segmentation
D. Device trust

Correct Answer: C

QUESTION 17
Which two benefits of streamlined management does Cisco provide? (Choose two.)
A. Unified management across multiple services
B. Siloed systems
C. Consolidated security monitoring
D. Centralized management
E. Device access control

Correct Answer: AD

QUESTION 18
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
A. Advanced Malware Protection
B. Identity Services Engine
C. Industrial Network Director
D. Cisco Security Connector
E. Duo

Correct Answer: BC

QUESTION 19
Which three products are in Cisco's Web & Email Security portfolio? (Choose three.)
A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES

Correct Answer: BDF

QUESTION 20
What are two ways Cisco helps customers navigate compliance issues? (Choose two.)
A. Providing identity verification
B. Securing email communications
C. Ensuring all employees have access to all files
D. Removing reporting requirements
E. Removing bureaucratic security tags

Correct Answer: AB

QUESTION 21
Which three products are Cisco Advanced Threat solutions? (Choose three.)
A. Stealthwatch
B. Web Security
C. Remote Access VPN
D. ThreatGrid
E. Advanced Malware Protection (AMP)
F. Next-Generation Firewall (NGFW)
G. Next-Generation Intrusion Prevention System (NGIPS)

Correct Answer: ADE

QUESTION 22
Which two security areas are part of Cisco's web solutions? (Choose two.)
A. URL Filtering
B. Web Security
C. Email Security
D. Identity & Access Control
E. Malware Protection

Correct Answer: BE

QUESTION 23
Which are two reasons perimeter-based network security is no longer sufficient? (Choose two )
A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users

Correct Answer: DE

QUESTION 24
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. Duo
B. Identity Services Engine
C. Stealthwatch
D. Cisco Security Connector
E. AMP for Endpoints

Correct Answer: CE

QUESTION 25
Which component of AMP provides the details customers need to address problems after a breach is identified?
A. Rapid remediation
B. Filesandboxmg
C. Continuous analysis
D. Context awareness

Correct Answer: A

QUESTION 26
Which two attack vectors are protected by Remote Access VPN? (Choose two.)
A. Cloud
B. Campus & Branch
C. Voicemail
D. Mobile
E. Email

Correct Answer: BD

QUESTION 27
What are two of the key benefits of the Opportunity Incentive Program? (Choose two.)
A. Supports a focus on the customer lifecycle
B. Facilitates rapid quoting to decrease time to market
C. Incentivizes partner-driven opportunity creation efforts
D. Reinforces partner demand-generation capabilities
E. Strengthens customer success management

Correct Answer: CD

QUESTION 28
In which two ways does Cisco address resource constraints for customers? (Choose two.)
A. Extended datacenter support
B. loT device hardware upgrades
C. Environment control via URL filtering and AVC
D. Enable many features via one appliance
E. Consolidated training

Correct Answer: CD

QUESTION 29
Which three products are Cisco Visibility & Enforcement solutions? (Choose three.)
A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints

Correct Answer: BCD

QUESTION 30
What are two ways that Cisco helps customers balance protection and accessibility? (Choose two )
A. Leverage integrated tools and dynamic context to enforce policies
B. Reinforce device infrastructure with an extensive security portfolio
C. Provide vital training to ensure a skilled workforce.
D. Analyze user and device vulnerability.
E. Manage risk more effectively across the environment.

Correct Answer: AC

QUESTION 31
What is an attribute of Cisco Talos?
A. Detection of threats communicated within 48 hours of occurrence
B. Blocks threats in real time
C. Real-time threat information
D. 3rd party applications integrated through comprehensive APIs

Correct Answer: C

QUESTION 32
Which statement embodies trust-centric security?
A. Verify before granting access via MDM software
B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
C. Protect users from attacks by enabling strict security policies.
D. Verify before granting access via identity-based policies for users, devices, apps. and locations

Correct Answer: B

QUESTION 33
In which two ways should companies modernize their security philosophies? (Choose two.)
A. Reinforce their threat-centric security tactics.
B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions
E. Complement threat-centric tactics with trust-centric methods.

Correct Answer: AD

QUESTION 34
Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)
A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email

Correct Answer: BC

QUESTION 35
What are two common customer obstacles? (Choose two.)
A. Lack of solution integration
B. High turnover of IT professionals
C. Compliance regulations
D. Limited resources
E. Security system blackouts

Correct Answer: AC

QUESTION 36
Which two types of recurring revenue sales does Cisco offer? (Choose two.)
A. Platform subscription sale
B. License sale
C. Portfolio
D. Subscription sale
E. Training

Correct Answer: AB

QUESTION 37
What are two steps organizations must take to secure loT? (Choose two.)
A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions

Correct Answer: AC

QUESTION 38
For what does ACI provide a single point of support?
A. automation
B. management
C. orchestration
D. visibility

Correct Answer: C

QUESTION 39
What are two key Cisco loT use cases? (Choose two.)
A. Mobile Utilities
B. Financial Institutions
C. Parks and Recreation
D. Industrial Security
E. Connected Health

Correct Answer: DE

QUESTION 40
Which network security product provides a unified image on an intuitive interface?
A. Next-Generation Intrusion Prevention System
B. Advanced Malware Protection
C. Cloudlock
D. Firepower Threat Defense

Correct Answer: D

QUESTION 41
Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
A. Simplify the datacenter
B. Meet immediate needs
C. Roll out more solutions
D. Plan for the future
E. Reduce training needs

Correct Answer: BD

QUESTION 42
What are two common seller obstacles? (Choose two.)
A. Unresponsive potential customers
B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition

Correct Answer: BC

QUESTION 43
Which two security risks are created by legacy approaches to networking? (Choose two.)
A. network downtime
B. user vulnerability
C. access points
D. slow containment
E. large attack surface

Correct Answer: BDE

QUESTION 44
What does remote access use to verify identity?
A. MFA
B. Remote Access VPN
C. Agents
D. AMP for Endpoints

Correct Answer: A

QUESTION 45
Which two products are involved in granting safe access to apps? (Choose two.)
A. ACI
B. Identify Services Engine
C. TrustSec
D. Duo
E. SD-Access

Correct Answer: DE

QUESTION 46
What is the primary customer challenge caused by the wide variety of security solution providers on the market?
A. Finding a low-cost option
B. Determining the single best security product
C. Contacting all providers for information
D. Finding the right provider to offer the best value

Correct Answer: D

QUESTION 47
What are two factors that influence customer loT conversations'? (Choose two)
A. Maturity
B. Detection
C. Motivation
D. Protection
E. Prevention

Correct Answer: AC

QUESTION 48
Which two elements does Tetration provide for security posture and traffic analysis? (Choose two.)
A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages

Correct Answer: BD

QUESTION 49
Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email

Correct Answer: BD

QUESTION 50
What are two results of utilizing a fragmented security model? (Choose two.)
A. Individual components pieced together to meet requirements.
B. Decreased visibility and limited understand of security coverage.
C. Reduced malicious file risk through additional segmentation.
D. Decreased network accessibility through multiple applications.
E. Increased identity controls.

Correct Answer: AB

QUESTION 51
Which three options are solutions and features of the data center threat-centric solution? (Choose three.)
A. constant threat protection at all levels
B. file reputation
C. enabled scalability and capability across the business
D. enhanced visibility of data, user, and device behavior
E. file trajectory
F. global threat intelligence

Correct Answer: ACD

QUESTION 52
On average, how much do network attacks cost?
A. $300K
B. $50K
C. $500k
D. $300B

Correct Answer: A

QUESTION 53
Which two options are features of the endpoints threat-centric solution? (Choose two.)
A. remote VPN
B. fuzzy fingerprinting
C. URL filtering
D. antivirus defense
E. web proxy

Correct Answer: BD

QUESTION 54
Which application works with customers to eliminate security gaps and ensure safe data access and storage in the cloud across devices?
A. AnyConnect
B. Cloudlock
C. Stealthwatch
D. TrustSec
E. AMP Threat Grid
F. Next Generation Firewall

Correct Answer: C

QUESTION 55
Which two attack vectors are protected by identity and access control? (Choose two.)
A. campus and home
B. voicemail
C. endpoints
D. data center
E. cloud apps

Correct Answer: AC

QUESTION 56
Which attribute does Cisco Talos possess?
A. ability to detect threats across all layers of defense
B. third-party applications integrated through comprehensive APIs
C. real-time threat intelligence
D. detection of threats communicated within 24 hours of occurrence
E. blocks threats in real time

Correct Answer: C

QUESTION 57
In the process of calculating the cost of recovery, which two elements will be taken into consideration? (Choose two.)
A. number of compromised servers
B. average revenue per hour
C. time (in hours) to rebuild servers
D. server downtime (in hours)

Correct Answer: AC

QUESTION 58
Which response is correct if a customer wants to know how the Cisco Secure Access solution manages a changing user base in a
growing company?
A. Cisco architecture offers the lowest TCO by providing products that integrate together, lowering the cost of IT setup, management, and
maintenance.
B. Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer needs.
C. Cisco Security Intelligence Operations integrate all security solutions, providing advanced protection against new threats.
D. Cisco provides the ability to monitor and restrict application usage. As applications becomemore complex. Cisco provides the flexibility
to control all
or subsets of the applications.

Correct Answer: B

QUESTION 59
Which two attack vectors are protected by cloud app security? (Choose two.)
A. mobile
B. cloud apps
C. voicemail
D. email
E. campus and branch

Correct Answer: AD

QUESTION 60
Which two Cisco business values demonstrate features of end-to-end protection and protection across the attack continuum? (Choose
two.)
A. completeness
B. cost effectiveness
C. protection
D. control
E. flexibility

Correct Answer: CD

QUESTION 61
Which two options are small budget customer concerns? (Choose two.)
A. Products are not packaged together.
B. Too many security vendors to manage.
C. Licenses are too cheap.
D. Security budget has been shrinking
E. Multiple devices are leaving a gap in security.

Correct Answer: DE

QUESTION 62
Which three customer use cases address the best outcome? (Choose three)
A. Propose the best scalability.
B. Offer powerful and integrated products.
C. Faster threat identification
D. Deliver flexible deployment options.
E. Enhance remediation.
F. Provide complete protection.

Correct Answer: BDF


QUESTION 63
Which two attack vectors are protected by remote access VPN? (Choose two.)
A. campus and branch
B. voicemail
C. cloud apps
D. email
E. mobile

Correct Answer: DE

QUESTION 64
Which two options are products in the cloud apps threat-centric solution? (Choose two.)
A. Talos
B. Stealthwatch
C. Cloudlock
D. ISE
E. Meraki

Correct Answer: AC

QUESTION 65
Which two options are products and benefits of the mobile threat-centric solution? (Choose two)
A. enforced device security policies with Meraki
B. enhanced control access with ISE and Cloudlock
C. device phishing protection through AMP
D. automated policy enforcement with ASAv
E. software-defined segmentation through TrustSec

Correct Answer: AB

QUESTION 66
Which issue do customers with vulnerable cloud issues deal with? (Choose three)
A. invisible employee apps usage
B. appropriate level of access
C. solution that does not extend to cloud
D. lack of protection from cloud apps
E. complex mobile management
F. expensive malware attacks

Correct Answer: ACD

QUESTION 67
Which option is the best example of how Cisco solution enable customer's business?
A. faster threat identification
B. better ability to scale and alter your environment
C. best continuous analysis
D. only comprehensive policy enforcement tool

Correct Answer: C

QUESTION 68
Which three options are cloud security products? (Choose three)
A. Meraki
B. Cloudlock
C. NGFW
D. Investigate
E. Web Security Appliance
F. Umbrella

Correct Answer: BDF

QUESTION 69
Which three issues do customers with limited mobility issues deal with? (Choose three)
A. Remote workers that compromise security
B. Solutions that do not extend off network
C. Complex mobile management
D. Complex mobile management
E. Big data center vulnerability
F. Expensive malware attacks
Correct Answer: ABC

QUESTION 70
Which three options are main areas of the Cisco Security Portfolio? (Choose three)
A. roaming security
B. ASA and NGIPS
C. advanced threat
D. web and email security
E. cloud security
F. policy and entry

Correct Answer: CDE

QUESTION 71
Which three options does Cisco provide to customers for complete protection against current security threat? (Choose three)
A. Threat-centric defense
B. Sporadic application analysis
C. Accelerated threat identification
D. Enhanced remediation
E. Accelerated threat identification
F. Manual security intelligence updates

Correct Answer: ABC

QUESTION 72
Which three attack vectors are protected by web security? Choose three.
A. Mobile
B. Voicemail
C. Virtual machines
D. Web
E. Endpoint
F. Cloud apps

Correct Answer: ADE

QUESTION 73
Which two options are solutions and features of campus and branch threat-centric solution? (Choose two)
A. Enabled and protected investment
B. File retrospection and trajectory
C. NGFW and NGIPS
D. Network analytics
E. Behavioral indication of compromise

Correct Answer: AD

QUESTION 74
How does the Cisco policy and access solution handle a changing user base in growing company?
A. Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer needs
B. Cisco architecture offers the lowest TCO by providing product that integrate, which lowers the cost of IT setup, management, and
maintenance.
C. Cisco Talos Security Intelligence and Research Group integrates into all security solutions, which provides advanced protection
against new threats.
D. Cisco provides you the ability to monitor and restrict application usage. As applications become more complex, Cisco provides the
flexibility to control all or subsets of the application.

Correct Answer: A

QUESTION 75
Which two options drive successful business outcomes for customers? (Choose two)
A. Endpoint visibility
B. Enhanced visibility
C. Comprehensive threat protection
D. Hardend solutions
E. Firewall protection

Correct Answer: AC

QUESTION 76
Which three options are products and benefits of the mobile threat-centric solution? (Choose three)
A. AnyConect
B. URL filter
C. Enhanced access and usage control with ISE
D. Enforced device security policies with Meraki
E. Secure off-network connection with Stealthwatch
F. CRD and network Analytics

Correct Answer: ACF

QUESTION 77
Which three options are major problems for customers growing their business? (Choose three)
A. Inconsistent network monitoring
B. Security not extending to the cloud
C. Device incompatibility
D. No scalable solution
E. Inconsistent containment tools
F. Business growing too fast

Correct Answer: BCD

QUESTION 78
Which option describes how partners can help customers using their unique relationship with Cisco aswad-winning resources and
support?
A. Be the first to receive new innovations
B. Take advantage of incentives programs
C. Access 24-hour support around the word
D. Earn higher margins on each deal sold

Correct Answer: C

QUESTION 79
Which issues are resolved with the Security Advantage programs? (Choose two)
A. Have a defined consumption level
B. Have undefined security spend
C. Have an end-of-year budget
D. Require customized investments
E. Need an unlimited consumption model

Correct Answer: AC

QUESTION 80
Which NGFW appliance do you use if your customer is a small business that requires multilayered protection and task automation?
A. ASA4100 Series
B. FirePower 3100 Series
C. Cisco 4000 Series NGIPS
D. ASA5500-X with FirePOWER
E. Cisco 500 Series ISR

Correct Answer: D

QUESTION 81
Which customer use case is challenged by inconsistent protection, coverage gaps, and exposing businesses to unwanted security
vulnerabilities?
A. Growing business
B. Compliance issue
C. Limited mobility
D. Vulnerable cloud
E. Small budget

Correct Answer: D

QUESTION 82
Which two attack vectors are protected by Cyber Threat Defense and network analytics (Choose two)
A. Cloud apps
B. Campus and branch
C. Email
D. Web
E. Voicemail

Correct Answer: CD
QUESTION 83
Which two options are solutions and features of the web threat-centric solution? (Choose two)
A. URL filtering
B. CTA and threat defense
C. Email security
D. Identity and access control
E. Data loss prevention

Correct Answer: AE

QUESTION 84
Which three options are Cisco industry differentiators? (Choose three)
A. uncontested threat blocking
B. unparalleled commitment to security
C. unmatched support and services
D. lowest price
E. largest selection of security solutions
F. best-in-class technologies

Correct Answer: BCF

QUESTION 85
Which ISR appliance do you use if your customer is a small business that requires integrated switching and routing and WAN
redundancy?
A. FirePower 8000 secirs
B. Cisco 4000 Series ISR
C. Cisco 800 Series ISR
D. FirePower 7000 Series
E. FirePower 2100 Series

Correct Answer: C

QUESTION 86
Which customer use case is challenged by device incompatibility, OS diversity, and a multitude of third-party application?
A. Compliance issue
B. Growing business
C. Vulnerable cloud
D. Small budget
E. Limited mobility

Correct Answer: A

QUESTION 87
Which three options are result of utilizing a fragmented security model? (Choose three)
A. Individual components pieced together that are incompatible
B. Multiple points of access that can be exploited by cyber criminals
C. Additional fragmentation that reduces the risk from malicious files
D. Decreased network accessibility through multiple applications
E. Patchworked applications that continually increase in complex
F. Fragmented security that provides disbursed protection

Correct Answer: ABE

QUESTION 88
Which two options are products and benefit of email threat-centric solution? (Choose two)
A. Meraki
B. Cloudlock
C. Cisco Registered Enverlope Service
D. Cisco Umbrella
E. Web Filtering
F. AMP for Endpoints

Correct Answer: DF

QUESTION 89
Which two options are issues that customers with compliance standards issues are dealing with? (Choose two)
A. Device incompatibility
B. Lack of access policies
C. Malware attacks
D. Email exposure
E. Inconsistent oversight
Correct Answer: AB

QUESTION 90
Which two attack vectors are protected by email security? (Choose two)
A. endpoints
B. virtual machines
C. email
D. mobile
E. cloud apps
F. voicemail

Correct Answer: AC

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy