Security Architecture for Account Managers (SAAM) v1.0 (700-760)

Page:    1 / 4   
Total 50 questions

In which two ways has digitization transformed today’s security threat landscape? (Choose two.)

  • A. decreased access points
  • B. decreasing third-party applications
  • C. growing ecosystem
  • D. decreasing endpoint ecosystem
  • E. expanding complexity

Answer : CE

Which two benefits of streamlined management does Cisco provide? (Choose two.)

  • A. siloed systems
  • B. unified management across multiple services
  • C. consolidated security monitoring
  • D. device access control
  • E. centralized management

Answer : BE

Which competing IT and Operation Technology (OT) priorities complicate securing IoT?

  • A. security vs. availability
  • B. innovation vs. manufacturing
  • C. malfunctions vs. output
  • D. hackers vs. safety

Answer : A

What are two results of utilizing a fragmented security model? (Choose two.)

  • A. Individual components are pieced together to meet requirements.
  • B. Decreased visibility and limited understanding of security coverage.
  • C. Increased identity controls.
  • D. Decreased network accessibility through multiple applications.
  • E. Reduced malicious file risk through additional segmentation.

Answer : AB

What is the primary customer challenge caused by the wide variety of security solution providers on the market?

  • A. finding the right provider to offer the best value
  • B. finding a low-cost option
  • C. determining the single best security product
  • D. contacting all providers for information

Answer : A

What are two steps organizations must take to secure IoT? (Choose two.)

  • A. block contractors
  • B. acquire subscription solutions
  • C. update equipment
  • D. remediate malfunctions
  • E. prevent blackouts

Answer : CD

What does remote access use to verify identity?

  • A. MFA
  • B. Agents
  • C. Remote Access VPN
  • D. AMP for Endpoints

Answer : A

How should partners leverage Cisco’s award-winning resources and support to help customers?

  • A. Be the first to receive new innovations.
  • B. Access support, services, and resources whenever needed.
  • C. Take advantage of incentive programs.
  • D. Earn higher margins on each deal sold.

Answer : B

What are two reasons perimeter-based network security is no longer sufficient? (Choose two.)

  • A. more networks
  • B. more IT professionals
  • C. more devices
  • D. more users
  • E. more vulnerabilities

Answer : CD

In which two areas are Cisco’s unmatched environment protection demonstrated by its long-standing experience? (Choose two.)

  • A. comprehensive vision for security
  • B. multi-functional devices
  • C. best-in-class technologies
  • D. all-in-one solution
  • E. complete software delivery

Answer : AC

Which two security areas are part of Cisco’s cloud solutions? (Choose two.)

  • A. SAP S/4 HANA
  • B. DNS-Layer Security
  • C. Cloud App Security
  • D. CI and Network Analytics
  • E. Remote access VPN

Answer : BC

What are the two tenants of establishing an SD-perimeter? (Choose two.)

  • A. securing app access
  • B. securing user-device trust
  • C. controlling external access
  • D. securing device access
  • E. securing network access

Answer : AE

Which two benefits of flexible purchasing does Cisco provide? (Choose two.)

  • A. reduce training needs
  • B. meet immediate needs
  • C. plan for the future
  • D. simplify the datacenter
  • E. roll out more solutions

Answer : BC

What is used to reduce attack surfaces?

  • A. remediation
  • B. device trust
  • C. access
  • D. segmentation

Answer : D

Which three products are in Cisco’s Web and Email Security portfolio? (Choose three.)

  • A. CES
  • B. Investigate
  • C. WSA
  • D. Umbrella
  • E. ESA
  • F. Meraki

Answer : CDE

Page:    1 / 4   
Total 50 questions