Quiz Flashcards

0
Q

Q1
Which two business use trends have surfaced in the last five years and require nontraditional security? (Choose two.)

A. BYOD
B. Wi-Fi connections
C. partial URL and application blocking
D. third-party applications
E. web and email attacks
F. a large number of remote employees

A

A,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Q2
Which three options describe the main problems with traditional security solutions? (Choose three.)

A. fragmented solutions
B. the lack of management solutions
C. missing components
D. solutions being pieced together
E. the lack of a cloud solution
F. the lack of a firewall
G. security gaps

A

A,D,G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q3
The current Cisco comprehensive framework solutions are divided into which three categories? (Choose three.)

A. Content Security
B. Cloud Security
C. Network Security
D. Access Security
E. Data Center Security F. Internet Security
G. Advanced Malware Protection

A

A,C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Q4
In the Cisco future solutions architecture framework, the security solutions are directly built upon which component?

A. management and intelligence capabilities
B. Cisco security platforms
C. third-party applications
D. security intelligence operations

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Q5
Which three values should you use to position Cisco security solutions? (Choose three.)

A. time-to-value
B. protection
C. control
D. integration
E. flexibility
F. agility
G. scalability

A

B,C,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q6
Which Cisco security technology delivers the best real-time threat intelligence?

A. Cisco ASA Next-Generation Firewall
B. Cisco Identity Services Engine
C. Cisco Security Manager
D. Cisco Security Intelligence Operations
E. Cisco TrustSec

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q7
Which two solutions are main components of Cisco Content Security? (Choose two.)

A. Cisco ASA Next-Generation Firewall
B. Cisco Web Security
C. Cisco Remote-Access VPN
D. Sourcefire Next-Generation Intrusion Prevention System
E. Cisco Email Security
F. Cisco Advanced Malware Protection

A

B,E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q8
Cisco Content Security integrates seamlessly with existing security and network infrastructures. This statement describes which Cisco value?

A. time-to-value
B. protection
C. control
D. scalability
E. flexibility F. agility

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Q9
Which two features are components of the Cisco Web Security Appliance? (Choose two.)

A. encryption
B. URL filtering
C. user identity tracking
D. antispam defense
E. impact assessment
F. Cisco Application Visibility and Control
G. context awareness
H. device profiling and onboarding

A

B,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Q10
Which four solutions are Cisco network security solutions? (Choose four.)

A. Cisco site-to-site VPN technologies
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco ASA Next-Generation Firewall
G. Cisco security appliance
H. Cisco Remote-Access VPN

A

A,E,F,G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q11
Cisco network security offers unmatched visibility and control of network and application traffic. This statement describes which Cisco value?

A. time-to-value
B. protection
C. control
D. scalability
E. flexibility
F. agility

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q12
Which two features are part of site-to-site VPN? (Choose two.)

A. web email controls
B. user identity traction
C. SSL decryption
D. Snort technology
E. remote access
F. seamless connection with Cisco ASA

A

E,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Q13
Which three solutions are Cisco Secure Access solutions? (Choose three.)

A. Cisco Remote-Access VPN
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco Advanced Malware Protection for Endpoints
G. Cisco security appliance
H. Cisco Security Manager

A

A,B,F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Q14
Cisco Secure Access Solutions delivers a secure connection to a continually growing number of endpoints. This statement is an example of which Cisco value?

A. time-to-value
B. protection
C. control
D. scalability
E. flexibility
F. agility

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Q15
Which feature is a primary feature of Cisco AnyConnect?

A. role-based policy management
B. context-aware access
C. secure and flexible remote access
D. SSL decryption

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Q16
On average, how many pieces of new malware are created every second?

A. one 
B. four 
C. 20 
D. 100
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Q17
Which component of Cisco network security is updated after an attack to help prevent threats before they encounter the network again?

A. Cisco site-to-site VPN
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco ASA Next-Generation Firewall
G. Cisco Security Intelligence Operations

A

G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Q18
Which component of Cisco network security builds on basic firewall capabilities by adding web filtering, web email controls, and Cisco Application Visibility and Control?

A. Cisco Advanced Malware Protection for Networks
B. Cisco ASA Next-Generation Firewall
C. Sourcefire Next-Generation Intrusion Prevention System
D. Cisco Web Security Appliance

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Q19
Which VPN offering removes the need for point-to-point GRE tunnels?

A. standard IPsec VPN
B. Cisco Easy VPN
C. Cisco GRE-based VPN
D. Cisco DMVPN
E. Cisco GET VPN

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Q20
Which feature of the Cisco security appliance provides “who-what-where-when-how” information about any requests for network access?

A. basic management
B. web application controls
C. authorized access
D. Cisco Application Visibility and Control
E. context awareness

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Q21
Which Cisco ASA Next-Generation Firewall service restricts websites and web application usage based on the reputation of the site?

A. Cisco Web Security Appliance
B. Cisco Web Security Essentials
C. Intelligent Detection
D. Authorized Access
E. SSL Decryption

A

B

21
Q

Q22
Which two options are benefits of Cisco Application Visibility and Control for administrators? (Choose two.)

A. It ensures device compliance.
B. It restricts only entire applications.
C. It limits individual or group-based access to certain application components.
D. You can gain greater visibility into devices that are accessing the network.
E. You can access the contents of each device remotely.

A

A,C

22
Q

Q23
Which Cisco IPS feature adapts in real time to detect and block intrusions that range from never- before-seen worms to the most sophisticated and subtle criminal attacks?

A. file-type detection
B. intelligent detection
C. user identity tracking
D. SSL decryption
E. impact assessment
F. automated policy tuning

A

B

23
Q

Q24
Which two features of AMP are available in Cisco AMP for Networks that are not available in Cisco AMP for Content alone? (Choose two.)

A. trajectory
B. retrospective security
C. dynamic analytics
D. behavioral indications of compromise
E. fuzzy fingerprinting
F. one-to-one signature

A

A,D

24
Q

Q25
Which solution is the most effective for virus cleanup?

A. Cisco Firewall with Authorized Access
B. Cisco DMVPN with GRE Tunnels
C. Cisco Easy VPN with Remote-Site Device Management
D. Cisco AMP for Networks with File Trajectory
E. Cisco SIO with Increased Visibility
F. Cisco ISE with Automated Policy Tuning

A

D

25
Q

Q26
What is the primary reason that customers need content security today?

A. Companies are more spread out than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More business is done using the web and email than ever before.

A

E

26
Q

Q27
Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?

A. dynamic content analysis
B. Cisco Application Visibility and Control
C. centralized management and reporting
D. encryption

A

B

27
Q

Q28
Reputation filtering performs which two functions? (Choose two.)

A. rates each site based on a reputation score
B. automatically updates devices based on threats
C. tunes itself according to relevance to the network
D. communicates with Cisco SenderBase, which is a common security database
E. analyzes in-depth parameters for anything that requests network access

A

A,D

28
Q

Q29
Which two advanced malware protection features are available on Cisco AMP for Content? (Choose two.)

A. URL filtering
B. retrospective security
C. attack chain weaving
D. breach hunting
E. trajectory
F. behavioral indications of compromise

A

A,B

29
Q

Q30

Which option best describes granular app control using application visibility and control?

A. blocking harmful sites based on content, such as pokerstars.com
B. blocking World of Warcraft but allowing Google+
C. blocking Facebook games but allowing Facebook posts
D. blocking Twitter to increase employee productivity

A

C

30
Q

Q31
The first phase of email security analyzes “who-what-where-when-how” information and context- based policies during which component of threat detection?

A. antivirus defense
B. advanced malware protection for email
C. outbreak filters
D. data loss prevention
E. encryption
F. antispam defense

A

F

31
Q

Q32
On average, email security Outbreak Filters identify and stop threats how many hours sooner than the next major AV vendor?

A. 24 hours sooner
B. 13 hours sooner
C. one hour sooner
D. no sooner, because Outbreak Filters do not identify and stop threats

A

B

32
Q

Q33
After a user prepares and sends an encrypted message to a recipient, what is the next step?

A. The decrypted message is displayed to the recipient.
B. The encrypted message is displayed to the recipient.
C. The email is forwarded to new users to be authenticated.
D. The encryption key is stored in the Cisco ESA servers.
E. The customer receives an encrypted message that requires a decryption key.

A

E

33
Q

Q34
Cisco Email Security is ideal for which type of customer?

A. customers who need sensitive data to remain onsite
B. customers whose expectations are set
C. customers who do not need cloud services
D. customers who want to move services to the cloud

A

A

34
Q

Q35
If a customer complains that employees access websites for work but then waste time with games and videos, which solution should you suggest, and why?

A. Cisco AMP, for protection before, during, and after attacks
B. Cisco WSA, for its URL filtering ability
C. Cisco RSA, for its data loss prevention
D. Cisco WSA, for its application visibility and control
E. Cisco ESA, for its global threat operations F. Cisco ESA, for its antivirus capabilities

A

D

35
Q

Q36
What is the main reason that customers need Cisco Secure Access?

A. Companies use more social media than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More devices are connecting on and off campus.
F. More business is done using the web and email than ever before.

A

E

36
Q

Q37
Which Cisco Secure Access solution provides centralized policy management to give administrators more granular control over access authorization?

A. Cisco Identity Services Engine
B. Cisco TrustSec
C. Cisco Advanced Malware Protection for Endpoints D. Cisco AnyConnect
E. Cisco ASA Next-Generation Firewall

A

A

37
Q

Q38
Which two features of Cisco AnyConnect contribute to secure remote access? (Choose two.)

A. guest access management
B. superior clientless network access
C. accelerated security options
D. compliance and tracking
E. context-aware access
F. extensive BYOD support
G. centralized management

A

B,F

38
Q

Q38
Which two features of Cisco AnyConnect contribute to secure remote access? (Choose two.)

A. guest access management
B. superior clientless network access
C. accelerated security options
D. compliance and tracking
E. context-aware access
F. extensive BYOD support
G. centralized management

A

B,F

39
Q

Q39
Which two add-ons are available for the AnyConnect Premium license? (Choose two.)

A. mobile license
B. basic license
C. management license
D. essentials license
E. advanced endpoint assessment
F. BYOD license

A

A,E

40
Q

Q40
Which Cisco Identity Services Engine feature controls access and policies for campuses and branches, wired and wireless devices, and guests, from a single location?

A. centralized policy management
B. compliance
C. URL filtering
D. SSL decryption
E. extensive BYOD support

A

A

41
Q

Q41
Which two features of Cisco ISE contribute to guest access management? (Choose two.)

A. employee-sponsored network access
B. faster device onboarding
C. guest access and activity tracking
D. accelerated security options
E. site-to-site VPNs
F. clientless network access

A

A,C

42
Q

Q42
In the Cisco TrustSec “User to Data Center Access Control” use case, which users typically have access to the company data center?

A. suppliers
B. employees
C. noncompliant users
D. guests

A

B

43
Q

Q43
Consider the process that begins with file retrospection, continues to interrogate the file and update its disposition over time, then records the pathway that the software and files take from device to device. This process is an example of which Cisco AMP feature?

A. file reputation
B. attack chain weaving
C. breach hunting
D. file sandboxing
E. machine learning

A

B

44
Q

Q44
How does the Device Trajectory feature work?

A. It searches for potential threats based on identified activities.
B. It tracks file behavior across the network to see which devices it enters and exits.
C. It analyzes the data from file and process retrospection to provide a new level of threat intelligence.
D. It isolates suspicious files and runs tests to determine their authenticity.
E. It tracks file behavior on a device to pinpoint the root cause of a compromise.

A

E

45
Q

Q45
Which Cisco Secure Access solution should you recommend to a customer who is experiencing access complications due to too many policies and too many user groups?

A. Cisco AnyConnect
B. Cisco TrustSec
C. Cisco ISE
D. Cisco AMP for Endpoints
E. Cisco site-to-site VPN
F. Cisco SIO

A

B

46
Q

Q46
Which integrated technology solution deals with application-centric infrastructures?

A. Cisco Unified Access
B. Cisco Security as a Service
C. Cisco Cyber Threat Defense
D. Cisco Secure Data Center
E. Cisco TrustSec

A

D

47
Q

Q47
Why do companies need Cisco Cyber Threat Defense?

A. They have a lack of segmented or differentiated access.
B. They are inundated with advanced persistent threats.
C. They need to add and provision servers faster than ever.
D. They have increased bandwidth needs, and they allow BYOD.
E. They have an infrastructure of overlapping rule sets, complex inheritance, and oversubscription.
F. They need cost-effective security management outsourcing.

A

B

48
Q

Q48
Why do companies need the quickly scalable Cisco Secure Data Center virtualization and cloud technology solution?

A. Fifty-six percent of employees who leave a company take private information with them.
B. Competitors are gaining a 33 percent market share.
C. Administrators are allowing a growing number of BYOD devices.
D. Staff is unable to keep up with newer data center technology.
E. Provisioning time for data centers has decreased from eight weeks to 15 minutes.
F. Management is expected to decrease IT budgets by 25 percent.

A

E

49
Q

Q49
Which Cisco technology solution can resolve a customer’s inability to properly restrict and authorize access to protected resources, while still introducing new applications, devices, and business partnerships?

A. Cisco TrustSec
B. Cisco Data Center Management Policy Implementation
C. Cisco Data Center Virtualization and Cloud
D. Cisco Cyber Threat Defense
E. Cisco Application Centric Infrastructure
F. Cisco Secure Data Center
G. Cisco Security Intelligence Operations

A

A

50
Q

Q50
What are two reasons why companies need Cisco Unified Access technology? (Choose two.)

A. Fifty-six percent of employees who leave a company take private information with them.
B. Competitors are gaining a 33 percent market share.
C. Eighty-one percent of businesses allow personal devices at work that require access.
D. Staff is unable to keep up with newer data center technology.
E. Provisioning time for data centers has decreased from eight weeks to 15 minutes. F. Management is expected to decrease IT budgets by 25 percent.
G. Companies need to secure data with unified access policies and essential controls.
H. Cloud data storage is 60 percent less cost-efficient than on-premises storage.

A

C,G