Exam Code : 700-765
Exam Name : Cisco Security Architecture for System Engineers
Vendor Name :
"Cisco"
700-765 Dumps
700-765 Braindumps
700-765 Real Questions
700-765 Practice Test
700-765 Actual Questions
killexams.com
Cisco Security Architecture for System Engineers
https://killexams.com/pass4sure/exam-detail/700-765
Question: 246
What two areas present a security challenge for customers? (Choose two.) A . IT departments
B . OT environments C . Corporate priorities D . loT devices
E . Email
Question: 247
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.) A . Cloud
B . Email
C . Endpoints D . Web
E . Data Center
Question: 248
Which feature of StealthWatch aggregates and normalizes NetFlow data? A . Netflow analytics
B . Advanced malware protection C . Forensic investigation
D . FlowCollector
Question: 249
What is one of the reasons that customers need a Visibility & Enforcement solution? A . Businesses can’t see or protect devices on their network
B . Network traffic is growing at an exponential rate
C . Storage is moving from on-premises to cloud-based
D . Organizations need the ability to block high-risk websites
Question: 250
Which statement best embodies trust-centric security?
A . Protect users from attacks by enabling strict security policies.
B . Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.
C . Verify before granting access via identity-based policies for users, devices, apps, and locations. D . Verify before granting access via MDM software.
Question: 251
What does Cisco provide via Firepower’s simplified, consistent management? A . Reduced complexity
B . Improved speed to security C . Reduced down time
D . Higher value
Question: 252
What are two common customer obstacles? (Choose two.) A . Limited resources
B . Lack of solution integration C . Security system blackouts D . Compliance regulations
E . High turnover of IT professionals
Question: 253
What are two solutions for Cisco Cloud Security? (Choose two.) A . cloud data security
B . cloud-delivered security
C . advanced network security D . intrusion prevention
E . cloud security
Question: 254
What is used to reduce attack surfaces? A . Remediation
B . Access
C . Segmentation D . Device trust
Question: 255
You finished a new installation and executed Config Advisor successfully. You review the physical racking and cabling on one of the controllers, and notice an amber light that was not previously on.
Which two actions should you perform before you turn over the cluster for production? (Choose two.) A . Remove cables connected to the controller until you find the one responsible for the controller issue. B . Review AutoSupport messages which could explain the controller state.
C . Execute Config Advisor again to check for new errors.
D . Let the customer know the cluster is operating normally while the amber LED is on.
Question: 256
What is an attribute of Cisco Talos? A . Real-time threat information
B . 3rd party applications integrated through comprehensive APIs C . Blocks threats in real time
D . Detection of threats communicated within 48 hours of occurrence
Question: 257
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS? A . Flexible AAA Options
B . Identity Services Engine
C . Differentiated Mobile Access
D . High throughput maintained while still protecting domains against threats
Question: 258
What are two key Cisco loT use cases? (Choose two.) A . Financial Institutions
B . Mobile Utilities
C . Industrial Security
D . Parks and Recreation E . Connected Health
Question: 259
What are two capabilities of Cisco’s NGFW Identity Based Policy Control feature? (Choose two.) A . security enforced at the DNS layer
B . access to multiple data layers C . access to Trojan downloader D . see and share malware details
E . threats stopped from getting in and spreading
Question: 260
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.) A . pxGrid
B . Cisco Security Connector C . Duo
D . Stealthwatch
E . AMP for Endpoints
Question: 261
Which Cisco NGIPS capability provides control over users, applications. devices, threats, and provides insights to network vulnerabilities?
A . global threat intelligence
B . advanced threat protection and rapid remediation C . contextual awareness
D . security automation