500-265 Flashcards
What is the single best set of benefits form a Cisco switched campus solution? Select exactly 1 answer(s) from the following:
A. Streamlined communications, customer responsiveness, and operational efficiency
B. Software-based routing capabilities and enhanced QoS
C. Network intelligence, enhanced QaS, borderless security, availability, resiliency
D. Intelligent network devices combined with integrated application modules
C
Which Cisco Secure Access solution provides centralized policy management to give administrators more granular control over access authorization?
A. Cisco Identity Services Engine
B. Cisco TrustSec
C. Cisco Advanced Malware Protection for Endpoints
D. Cisco AnyConnect
E. Cisco ASA Next-Generation Firewall
A
What is the main reason that customers need Cisco Secure Access?
A. Companies use more social media than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More devices are connecting on and off campus.
F. More business is done using the web and email than ever before.
E
If a customer complains that employees access websites for work but then waste time with games and videos, which solution should you suggest, and why?
A. Cisco AMP, for protection before, during, and after attacks
B. Cisco WSA, for its URL filtering ability
C. Cisco RSA, for its data loss prevention
D. Cisco WSA, for its application visibility and control
E. Cisco ESA, for its global threat operations
F. Cisco ESA, for its antivirus capabilities
D
Cisco Email Security is ideal for which type of customer?
A. customers who need sensitive data to remain onsite
B. customers whose expectations are set
C. customers who do not need cloud services
D. customers who want to move services to the cloud
A
After a user prepares and sends an encrypted message to a recipient, what is the next step?
A. The decrypted message is displayed to the recipient.
B. The encrypted message is displayed to the recipient.
C. The email is forwarded to new users to be authenticated.
D. The encryption key is stored in the Cisco ESA servers.
E. The customer receives an encrypted message that requires a decryption
E
On average, email security Outbreak Filters identify and stop threats how many hours sooner than the next major AV vendor?
A. 24 hours sooner
B. 13 hours sooner
C. one hour sooner
D. no sooner, because Outbreak Filters do not identify and stop threats
B
The first phase of email security analyzes “who-what-where-when-how” information and context-based policies during which component of threatdetection? A. antivirus defense B. advanced malware protection for email C. outbreak filters D. data loss prevention E. encryption F. antispam defense
F
Which option best describes granular app control using application visibility and control?
A. blocking harmful sites based on content, such as pokerstars.com
B. blocking World of Warcraft but allowing Google+
C. blocking Facebook games but allowing Facebook posts
D. blocking Twitter to increase employee productivity
C
Which two advanced malware protection features are available on Cisco AMP for Content? (Choose two.) A. URL filtering B. retrospective security C. attack chain weaving D. breach hunting E. trajectory F. Behavioral indication of compromise
A B
Reputation filtering performs which two functions? (Choose two.)
A. rates each site based on a reputation score
B. automatically updates devices based on threats
C. tunes itself according to relevance to the network
D. communicates with Cisco SenderBase, which is a common security database
E. analyzes in-depth parameters for anything that requests network access
A D
Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?
A. dynamic content analysis
B. Cisco Application Visibility and Control
C. centralized management and reporting
D. encryption
B
Which Cisco technology solution can resolve a customer’s inability to properly restrict and authorize access to protected resources, while still introducingnew applications, devices, and business partnerships?
A. Cisco TrustSec
B. Cisco Data Center Management Policy Implementation
C. Cisco Data Center Virtualization and Cloud
D. Cisco Cyber Threat Defense
E. Cisco Application Centric Infrastructure
F. Cisco Secure Data Center
G. Cisco Security Intelligence Operations
A
Why do companies need the quickly scalable Cisco Secure Data Center virtualization and cloud technology solution?
A. Fifty-six percent of employees who leave a company take private information with them.
B. Competitors are gaining a 33 percent market share.
C. Administrators are allowing a growing number of BYOD devices.
D. Staff is unable to keep up with newer data center technology.
E. Provisioning time for data centers has decreased from eight weeks to 15 minutes.
F. Management is expected to decrease IT budgets by 25 percent.
E
Why do companies need Cisco Cyber Threat Defense?
A. They have a lack of segmented or differentiated access.
B. They are inundated with advanced persistent threats.
C. They need to add and provision servers faster than ever.
D. They have increased bandwidth needs, and they allow BYOD.
E. They have an infrastructure of overlapping rule sets, complex inheritance, and oversubscription.
F. They need cost-effective security management outsourcing.
B
Which integrated technology solution deals with application-centric infrastructures? A. Cisco Unified Access B. Cisco Security as a Service C. Cisco Cyber Threat Defense D. Cisco Secure Data Center E. Cisco TrustSec
D
Which Cisco Secure Access solution should you recommend to a customer who is experiencing access complications due to too many policies and toomany user groups? A. Cisco AnyConnect B. Cisco TrustSec C. Cisco ISE D. Cisco AMP for Endpoints E. Cisco site-to-site VPN F. Cisco SIO
B
How does the Device Trajectory feature work?
A. It searches for potential threats based on identified activities.
B. It tracks file behavior across the network to see which devices it enters and exits.
C. It analyzes the data from file and process retrospection to provide a new level of threat intelligence.
D. It isolates suspicious files and runs tests to determine their authenticity.
E. It tracks file behavior on a device to pinpoint the root cause of a compromise.
E
Consider the process that begins with file retrospection, continues to interrogate the file and update its disposition over time, then records the pathwaythat the software and files take from device to device. This process is an example of which Cisco AMP feature? A. file reputation B. attack chain weaving C. breach hunting D. file sandboxing E. machine learning
B
In the Cisco TrustSec “User to Data Center Access Control” use case, which users typically have access to the company data center? A. suppliers B. employees C. noncompliant users D. guests
B
Which two features of Cisco ISE contribute to guest access management? (Choose two.) A. employee-sponsored network access B. faster device onboarding C. guest access and activity tracking D. accelerated security options E. site-to-site VPNs F. clientless network access
A C
Which Cisco Identity Services Engine feature controls access and policies for campuses and branches, wired and wireless devices, and guests, from a single location? A. centralized policy management B. compliance C. URL filtering D. SSL decryption E. extensive BYOD support
A
Which two add-ons are available for the AnyConnect Premium license? (Choose two.) A. mobile license B. basic license C. management license D. essentials license E. advanced endpoint assessment F. BYOD license
A E
Which two features of Cisco AnyConnect contribute to secure remote access? (Choose two.) A. guest access management B. superior clientless network access C. accelerated security options D. compliance and tracking E. context-aware access F. extensive BYOD support G. centralized management
B F
What is the primary reason that customers need content security today?
A. Companies are more spread out than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More business is done using the web and email than ever before.
E
Which solution is the most effective for virus cleanup?
A. Cisco Firewall with Authorized Access
B. Cisco DMVPN with GRE Tunnels
C. Cisco Easy VPN with Remote-Site Device Management
D. Cisco AMP for Networks with File Trajectory
E. Cisco SIO with Increased Visibility
F. Cisco ISE with Automated Policy Tuning
D