Advanced Security Architecture for Account Manager v9.0 (700-260)

Page:    1 / 8   
Total 119 questions

In the "Advanced Protection" use case: at which stage of the threat continuum does a challenge due to inconsistent threat containment tools occur?

  • A. during
  • B. before
  • C. along the entire attack continuum
  • D. after


Answer : C

In the "Secure Cloud" use case, which option is a primary benefit of the Cisco secure cloud solution?

  • A. integrated security
  • B. telemetry data
  • C. intrusion prevention
  • D. URL filtering
  • E. advanced content filters


Answer : D

Refer to the exhibit.


Consolidating platforms and appliances under a single provider is an example of which customer cost saver?

  • A. Less time scoping a breach
  • B. Fewer resources to manage
  • C. Faster integration
  • D. Flexible licensing


Answer : D

Which two business use trends have surfaced in the last five years that require nontraditional security? (Choose two.)

  • A. Wi-Fi connections
  • B. web and email attacks
  • C. third-party applications
  • D. partial URL/application blocking
  • E. substantial number of remote employees
  • F. BYOD


Answer : B,E

Which three options describe the main problems with traditional security solutions?
(Choose three.)

  • A. Security gaps
  • B. Lack of firewall
  • C. Pieced together
  • D. Missing components
  • E. Fragmented solutions
  • F. Lack of management solutions
  • G. Lack of cloud solution


Answer : A,C,E

Which component of Cisco Stealthwatch uses sophisticated security analytics to accelerate threat response time?

  • A. network control
  • B. investigation
  • C. threat protection
  • D. anomaly detection
  • E. granular visibility


Answer : E

Which option is the primary reason that companies need Cisco Cyber Threat Defense?

  • A. They need cost-effective security management outsourcing.
  • B. They have a lack of segmented or differentiated access.
  • C. They need to add and provision servers faster than ever.
  • D. They have increased bandwidth needs and allow BYOD.
  • E. They are being inundated with advanced persistent threats.


Answer : E

Which option would be the primary concern of a CIO who is focused on advanced protection in the advanced protection use case?

  • A. Integrate solutions seamlessly
  • B. Onboard devices quickly
  • C. Expand into new markets
  • D. Reduce vulnerabilities


Answer : D

Which two additional business values are used as part of Cisco value propositions?
(Choose two )

  • A. cost effectiveness
  • B. scalability
  • C. support
  • D. completeness
  • E. integration


Answer : A,D

How does Cisco Software Volume Purchasing streamline software strategy and asset management?

  • A. Many solutions are offered only on one platform.
  • B. Customers can choose a license platform bundle that meets their needs.
  • C. An a la carte model is offered instead of a flexible consumption model.
  • D. Solutions to be added to new appliances are bundled.


Answer : D

Which feature of web and email security enables administrators to block Facebook videos but allow posts and message?

  • A. centralized management and reporting
  • B. encryption
  • C. dynamic content analysis
  • D. application visibility and control


Answer : A

End-to-end protection and protection across the attack continuum are features that demonstrate which two Cisco business values? (Choose two.)

  • A. Cost effectiveness
  • B. Protection
  • C. Control
  • D. Flexibility
  • E. Completeness


Answer : B,E

Which response is correct if a customer wants to know how the Cisco Secure Access solution manages a changing user base in a growing company?

  • A. Cisco architecture offers the lowest TCO by providing products that integrate together, lowering the cost of IT setup, management, and maintenance.
  • B. Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer needs.
  • C. Cisco Security Intelligence Operations integrate all security solutions, providing advanced protection against new threats.
  • D. Cisco provides the ability to monitor and restrict application usage. As applications become more complex. Cisco provides the flexibility to control all or subsets of the applications.


Answer : B

The current comprehensive framework solutions that Cisco offers are divided into which three categories? (Choose three.)

  • A. Data center security
  • B. Cloud security
  • C. Content security
  • D. Network security
  • E. Access security
  • F. Internet security
  • G. Advanced malware protection


Answer : C,D,E

Which four options are examples of Cisco network security solutions? (Choose four.)

  • A. Cisco Security Manager
  • B. Cisco ASA Next-Generation Firewall Services
  • C. Cisco Web Security Appliance
  • D. Cisco Identity Services Engine
  • E. Cisco Site-to-Site VPN
  • F. Cisco Email Security Appliance
  • G. Cisco Next-Generation Intrusion Prevention System
  • H. Cisco ASA Firewall Services


Answer : B,E,G,H

Page:    1 / 8   
Total 119 questions