700-765 Dumps

700-765 Braindumps

700-765 Real Questions

700-765 Practice Test

700-765 Actual Questions


killexams.com


Cisco


700-765


Cisco Security Architecture for System Engineers


https://killexams.com/pass4sure/exam-detail/700-765


Question: 246


What two areas present a security challenge for customers? (Choose two.) A . IT departments

B . OT environments C . Corporate priorities D . loT devices

E . Email


Answer: D E


Question: 247


Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.) A . Cloud

B . Email

C . Endpoints D . Web

E . Data Center


Answer: DE


Question: 248


Which feature of StealthWatch aggregates and normalizes NetFlow data? A . Netflow analytics

B . Advanced malware protection C . Forensic investigation

D . FlowCollector


Answer: D


Question: 249


What is one of the reasons that customers need a Visibility & Enforcement solution? A . Businesses can’t see or protect devices on their network

B . Network traffic is growing at an exponential rate

C . Storage is moving from on-premises to cloud-based

D . Organizations need the ability to block high-risk websites


Answer: D


Question: 250


Which statement best embodies trust-centric security?

A . Protect users from attacks by enabling strict security policies.

B . Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.

C . Verify before granting access via identity-based policies for users, devices, apps, and locations. D . Verify before granting access via MDM software.


Answer: C


Question: 251


What does Cisco provide via Firepower’s simplified, consistent management? A . Reduced complexity

B . Improved speed to security C . Reduced down time

D . Higher value


Answer: A


Question: 252


What are two common customer obstacles? (Choose two.) A . Limited resources

B . Lack of solution integration C . Security system blackouts D . Compliance regulations

E . High turnover of IT professionals


Answer: C B


Question: 253


What are two solutions for Cisco Cloud Security? (Choose two.) A . cloud data security

B . cloud-delivered security

C . advanced network security D . intrusion prevention

E . cloud security

Answer: B E


Question: 254


What is used to reduce attack surfaces? A . Remediation

B . Access

C . Segmentation D . Device trust


Answer: C


Question: 255


You finished a new installation and executed Config Advisor successfully. You review the physical racking and cabling on one of the controllers, and notice an amber light that was not previously on.


Which two actions should you perform before you turn over the cluster for production? (Choose two.) A . Remove cables connected to the controller until you find the one responsible for the controller issue. B . Review AutoSupport messages which could explain the controller state.

C . Execute Config Advisor again to check for new errors.

D . Let the customer know the cluster is operating normally while the amber LED is on.


Answer: AC


Question: 256


What is an attribute of Cisco Talos? A . Real-time threat information

B . 3rd party applications integrated through comprehensive APIs C . Blocks threats in real time

D . Detection of threats communicated within 48 hours of occurrence


Answer: A


Question: 257


In the Campus NGFW use case, which capability is provided by NGFW & NGIPS? A . Flexible AAA Options

B . Identity Services Engine

C . Differentiated Mobile Access

D . High throughput maintained while still protecting domains against threats


Answer: D

Question: 258


What are two key Cisco loT use cases? (Choose two.) A . Financial Institutions

B . Mobile Utilities

C . Industrial Security

D . Parks and Recreation E . Connected Health


Answer: C E


Question: 259


What are two capabilities of Cisco’s NGFW Identity Based Policy Control feature? (Choose two.) A . security enforced at the DNS layer

B . access to multiple data layers C . access to Trojan downloader D . see and share malware details

E . threats stopped from getting in and spreading


Answer: A B


Question: 260


Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.) A . pxGrid

B . Cisco Security Connector C . Duo

D . Stealthwatch

E . AMP for Endpoints


Answer: A E


Question: 261


Which Cisco NGIPS capability provides control over users, applications. devices, threats, and provides insights to network vulnerabilities?

A . global threat intelligence

B . advanced threat protection and rapid remediation C . contextual awareness

D . security automation


Answer: B