Adv anced Security Architecture for Systems Engineers v1.0 (500-651)

Page:    1 / 7   
Total 100 questions

What is key feature of Cognitive Threat Analytics?

  • A. It enables safe email usage with event Analytics
  • B. It improves threat detection over time with machine learning
  • C. It enhances anonymity with URL filtering
  • D. It enables greater endpoint device profiling intelligence with entity modeling


Answer : B

Explanation:
ASAS Security Advanced Threats SE Module

Which two features are part of the ISE Plus license? (Choose two.)

  • A. Profiling and feed services
  • B. Guest management
  • C. Cisco pxGrid
  • D. Basic Network Access AAA, 802 1X
  • E. Trustsec


Answer : AC

Explanation:
ASAS Policy and Access SE Module 5

Which feature of AnyConnect provides you the ability to identify data breaches as they happen?

  • A. Flexible AAA Options
  • B. Network Visibility Module
  • C. Differentiated Mobile Access
  • D. Trusted Network Detection


Answer : B

Explanation:
ASAS Policy and Access SE Module 5

Which Cisco solution falls under cloud security?

  • A. Identity Services Engine
  • B. Firepower Threat Defense
  • C. Cisco Defense Orchestrator
  • D. Umbrella


Answer : C

Explanation:
ASAS Cisco Cloud Security SE "" Module 3

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?

  • A. Layer-4 Monitoring
  • B. Data Loss Prevention
  • C. URL Filtering
  • D. Sandboxing


Answer : A

Explanation:
ASAS Security Web and Email SE Module 2

Which options describes how Cisco solutions enable customer's businesses?

  • A. Enhancing remediation operations
  • B. Having the fastest threat identification
  • C. Automating the security intelligence updates
  • D. Their ability to keep customers networks more secure and make IT more productive


Answer : D

Which three Cisco solutions are covered in the Advanced Threat module? (Choose three)

  • A. Cognitive Threat Analytics
  • B. Intrusion Analytics
  • C. AMP
  • D. Cisco Defense Orchestrator
  • E. NGIPS Cisco
  • F. Cisco ThreatGrid


Answer : ACF

Explanation:
ASAS Security Advanced Threats SE Module 6

What two challenges do customers face in their Campus and Branch deployments? (Choose two)

  • A. Stopping data breaches across campuses and branches
  • B. Protect data across multiple cloud applications
  • C. Monitoring file behavior across a large set of endpoints
  • D. Understanding what our users are doing online
  • E. Securing the entire infrastructure


Answer : AB

Which feature of ISE is Terminal Access Control System (TACACS) a part of?

  • A. Device Administration
  • B. Device Profiling
  • C. Centralized Policy Management
  • D. Guest Access Management


Answer : A

Explanation:
ASAS Policy and Access SE Module 5

Which three values are provided by NGFW and NGIPS in the "Campus NGFW" use case? (Choose three.)

  • A. Dynamic routing port to meet all network needs.
  • B. Differentiated Mobile Access
  • C. Additional firewalls across all platforms
  • D. High throughput maintained while still protecting domain against threats
  • E. Identity Services Engine
  • F. Flexible AAA Options


Answer : ABD

Which feature discovers and controls malicious cloud apps connected to the corporate environment?

  • A. Cognitive Threat Analytics
  • B. Cloudlock
  • C. Investigate
  • D. Umbrella


Answer : B

Explanation:
Cisco Cloudlock Apps Firewall discovers and controls malicious cloud apps connected to your corporate environment, and provides the world"™s largest crowd- sourced security solution to identify individual app risk, using our Community Trust Rating.
Reference: https://www.cloudlock.com/platform/app-discovery/

Which are two main features of DDoS Attack Prevention? (Choose two.)

  • A. Stop attacks within seconds of detection
  • B. Block or allow traffic automatically
  • C. Redirects DDoS traffic back to attacker
  • D. Leveraging AMP ThreatGrid technology


Answer : AB

How does AMP"™s file reputation feature help customers?

  • A. It automatically detects polymorphic variants of known malware
  • B. It increases time to detection with exact data analytics
  • C. It increases the protection to systems with exact fingerprinting
  • D. It enables secure web browsing with cognitive threat analytics


Answer : A

Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/ b_ScanCenter_Administrator_Guide_chapter_011101.pdf

Which of AMP"™s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?

  • A. Dynamic Analytics
  • B. Trajectory
  • C. Malware Security
  • D. File Retrospection


Answer : D

Explanation:
Tracks the spread of any file within your network and continuously monitors file reputation over time. If a file reputation changes to malicious or is found by file sandboxing to be malicious, AMP provides retrospective alerting in the after phase. AMP identifies every instance of the file within your network to address the problem of malicious files passing through perimeter defenses that are later deemed a threat.
Reference: https://www.cisco.com/c/en/us/td/docs/security/web_security/scancenter/administrator/guide/b_ScanCenter_Administrator_Guide/ b_ScanCenter_Administrator_Guide_chapter_011101.pdf

Which is a feature of E-mail Security?

  • A. Outbreak Filters
  • B. Umbrella
  • C. Layer-4 Monitoring
  • D. Investigate


Answer : A

Page:    1 / 7   
Total 100 questions