Adv anced Security Architecture for Systems Engineers v1.0

Page:    1 / 7   
Exam contains 91 questions

Which Stealthwatch component is a physical or virtual appliance that aggregates and normalizes NetFlow data?

  • A. Stealthwatch Management Center
  • B. Flow Collector
  • C. UDP Director
  • D. Flow Sensor


Answer : B

How does the Cisco AnyConnect AMP Module help to protect customer's networks?

  • A. AMP is a unified agent that combines posture check and authentication across wired wireless, and VPN networks.
  • B. AMP Module can profile devices before allowing them to connect
  • C. AMP provides highly secure access for select enterprise mobile applications
  • D. AnyConnect can deploy AMP for Endpoints for Windows or OSX


Answer : D

Explanation:
ASAS Policy and Access SE Module 5

Which two Cisco solution are part of the Mobile threat centric solution? (Choose two.)

  • A. Cisco AnyConnect
  • B. Cisco Umbrella
  • C. Cisco NGFW
  • D. Cisco NGIPS
  • E. Cisco Defense Orchestrator


Answer : AB

Explanation:
ASAS Security Threat Centric Solutions - AM and SE Module 7

Which are two main features of Intrusion Prevention?(Choose two.)

  • A. Threat analysis through network behavior analysis
  • B. Protecting against Zero-Day attacks
  • C. Layer-4 traffic monitoring across platforms
  • D. Vulnerability-based threat management


Answer : AD

Which three options does Cisco provide customers in terms of "Visibility and Control" against today's threats? (Choose three)

  • A. Granular device visibility and management
  • B. Unparalleled network and endpoint visibility
  • C. 18-month device release cycle
  • D. Bandwidth Utilization Monitoring
  • E. Comprehensive policy enforcement
  • F. Fast device policy updates


Answer : ABF

Which Cisco solution falls under Advanced Threat?

  • A. Identity Services Engine
  • B. Stealthwatch
  • C. Threat Grid
  • D. Umbrella


Answer : B

Explanation:
ASAS Security Advanced Threats SE Module 6

Which three NGFW and NGIPS features support the 'Complex Remote Access' use case? (Choose three.)

  • A. Support for device onboarding
  • B. Users protected regardless of physical location
  • C. Fuzzy Fingerprinting
  • D. Detection of anomalous traffic
  • E. Controls and protections extended beyond VPN controls
  • F. Secure access extended to all users


Answer : BEF

Explanation:
ASAS Security NGFW and NGIPS SE Module 4

Which two solutions are part of the data-center threat-centric solution module? (Choose two.)

  • A. Rapid threat detection through NGFW and NGFWv
  • B. Enforced device security with Meraki
  • C. URL filtering
  • D. Relationship segmentation
  • E. Automated policy enforcement with ASAv


Answer : AE

Explanation:
ASAS Security Threat Centric Solutions - AM and SE Module 7

Which option helps customers gain insight into security threats?

  • A. Limit volume of users to applications
  • B. Share sensitive data across different platforms
  • C. Providing remote access VPN to allow mobile users to connect securely to customers network
  • D. Providing visibility into everything to allow granular security policies to be created and enforced


Answer : D

Which feature of CTA can separate statistically normal traffic form anomalous traffic?

  • A. URL filtering
  • B. Trust modeling
  • C. Anomaly detection
  • D. Event classification


Answer : C

Explanation:
ASAS Security Advanced Threats SE Module 6

What are three major features of Cisco Defense Orchestrator? (Choose three.)

  • A. Providing retrospective security to protect against malware
  • B. Receive notifications about any unplanned changes to security policies and objects
  • C. Plan and model security changes before deploying them across the cloud
  • D. Identifying anomalous traffic in customer's network
  • E. Ability to deploy changes across virtual environments in real time or offline
  • F. Tracking suspicious files through the network


Answer : BCE

Explanation:
ASAS Cisco Cloud Security SE - Module 3

Which feature of AMP tracks the movement of a file within the environment and monitors its disposition over time?

  • A. Fuzzy Fingerprinting
  • B. Machine Learning
  • C. ThreatGrid
  • D. Trajectory


Answer : D

Explanation:
ASAS Security Advanced Threats SE Module 6

Which three are deployment options for E-mail Security? (Choose three.)

  • A. ESA
  • B. CES
  • C. WSAv
  • D. AMP
  • E. ESAv
  • F. WebRoot


Answer : ABE

Explanation:
ASAS Security Web and Email SE Module 2

Which two options are attack vectors protected by Identity and Access Control? (Choose two)

  • A. Backups
  • B. Mobile
  • C. Endpoints
  • D. Cloud apps
  • E. Voicemail


Answer : BC

Explanation:
ASAS Security Threat Centric Solutions - AM and SE Module 7

Which are two key Cisco products that are part of the web threat-centric solution? (Choose two)

  • A. Cisco Umbrella
  • B. Cisco Identity Services Engine
  • C. Cisco Web Security Appliance
  • D. Cisco Email Security Appliance
  • E. Cisco Defense Orchestrator


Answer : AC

Explanation:
ASAS Security Threat Centric Solutions - AM and SE Module 7

Page:    1 / 7   
Exam contains 91 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy