Deck 50: Cisco Security Architecture for System Engineers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/56
Play
Full screen (f)
Deck 50: Cisco Security Architecture for System Engineers
1
Which two attack vectors are protected by Malware Protection? (Choose two.)
A) Voicemail
B) Web
C) Mobile
D) Email
E) Data Center
A) Voicemail
B) Web
C) Mobile
D) Email
E) Data Center
Web
Email
2
What are three security blind spots that must be addressed? (Choose three.)
A) Workloads
B) Data
C) Networks
D) IT
E) Applications
F) Email
A) Workloads
B) Data
C) Networks
D) IT
E) Applications
F) Email
Data
Networks
Applications
Networks
Applications
3
What is one of the key features of Cognitive Intelligence?
A) Allows visibility into anonymous and encrypted communications
B) It enables greater threat intelligence with entity modeling
C) It enables safe email usage with event analytics
D) It enhances anonymity with URL filtering
A) Allows visibility into anonymous and encrypted communications
B) It enables greater threat intelligence with entity modeling
C) It enables safe email usage with event analytics
D) It enhances anonymity with URL filtering
Allows visibility into anonymous and encrypted communications
4
Which two IoT environment layers are protected by AMP for Endpoints? (Choose two.)
A) Control Layer
B) Internet/Cloud
C) Data Center
D) Things
E) Access Points
A) Control Layer
B) Internet/Cloud
C) Data Center
D) Things
E) Access Points
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
5
What are three major features of StealthWatch? (Choose three.)
A) Real-time sandboxing
B) Forensic investigation
C) Threat-based anomaly detection
D) Data Loss Prevention
E) Netflow monitoring
F) Malware clustering
A) Real-time sandboxing
B) Forensic investigation
C) Threat-based anomaly detection
D) Data Loss Prevention
E) Netflow monitoring
F) Malware clustering
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
6
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A) AMP for Endpoints
B) Duo
C) Cisco Security Connector
D) pxGrid
E) Stealthwatch
A) AMP for Endpoints
B) Duo
C) Cisco Security Connector
D) pxGrid
E) Stealthwatch
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
7
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
A) Web
B) Cloud
C) Data Center
D) Email
E) Endpoints
A) Web
B) Cloud
C) Data Center
D) Email
E) Endpoints
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
8
Which two areas require secure access? (Choose two.)
A) Worktable
B) Workspace
C) Workloads
D) Workforce
E) Workflow
A) Worktable
B) Workspace
C) Workloads
D) Workforce
E) Workflow
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
9
What are two core functionalities of DNS-layer security? (Choose two.)
A) Live threat intelligence
B) Proxy and file inspection
C) URL filtering
D) Real-time sandboxing
E) Data analytics and monitoring
A) Live threat intelligence
B) Proxy and file inspection
C) URL filtering
D) Real-time sandboxing
E) Data analytics and monitoring
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
10
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
A) Telemetry, shared intelligence, and profiling sources
B) Context, telemetry and intelligence sources
C) Intelligence sources, telemetry, and shared intelligence
D) Context, telemetry, and profiling sources
A) Telemetry, shared intelligence, and profiling sources
B) Context, telemetry and intelligence sources
C) Intelligence sources, telemetry, and shared intelligence
D) Context, telemetry, and profiling sources
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
11
What are two features of Advanced Malware Protection (AMP)? (Choose two.)
A) File Retrospection and Trajectory
B) Dynamic Malware Analysis
C) Local Threat Intelligence
D) Automated Policy Management
E) Automatic Behavioral Authorization
A) File Retrospection and Trajectory
B) Dynamic Malware Analysis
C) Local Threat Intelligence
D) Automated Policy Management
E) Automatic Behavioral Authorization
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
12
How does SD-WAN protect network traffic from end-to-end?
A) Management
B) Automation
C) Segmentation
D) Analyzation
A) Management
B) Automation
C) Segmentation
D) Analyzation
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
13
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
A) More users
B) More devices
C) More networks
D) More IT professionals
E) More vulnerabilities
A) More users
B) More devices
C) More networks
D) More IT professionals
E) More vulnerabilities
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
14
What is a continuous protection feature of Advanced Malware Protection?
A) File Reputation
B) Behavioral Indicators of Compromise
C) Global Threat Intelligence
D) Sandboxing File Analysis
A) File Reputation
B) Behavioral Indicators of Compromise
C) Global Threat Intelligence
D) Sandboxing File Analysis
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
15
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
A) global threat intelligence
B) security automation
C) advanced threat protection and rapid remediation
D) contextual awareness
A) global threat intelligence
B) security automation
C) advanced threat protection and rapid remediation
D) contextual awareness
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
16
What are two key capabilities of Meraki? (Choose two.)
A) identity-based and device-aware security
B) application visibility and control
C) device profiling
D) contextual awareness
E) security automation
A) identity-based and device-aware security
B) application visibility and control
C) device profiling
D) contextual awareness
E) security automation
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
17
Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?
A) Differentiated Mobile Access
B) Secure Layer 2 Network Access
C) Trusted Network Detection
D) Network Visibility Module
A) Differentiated Mobile Access
B) Secure Layer 2 Network Access
C) Trusted Network Detection
D) Network Visibility Module
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
18
What are two result of utilizing a fragmented security model? (Choose two.)
A) Reduced malicious file risk through additional segmentation.
B) Decreased network accessibility through multiple applications.
C) Decreased visibility and limited understand of security coverage.
D) Increased identity controls
E) Individual components pieced together to meet requirements.
A) Reduced malicious file risk through additional segmentation.
B) Decreased network accessibility through multiple applications.
C) Decreased visibility and limited understand of security coverage.
D) Increased identity controls
E) Individual components pieced together to meet requirements.
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
19
What percent of threats did ASA with FilePOWER block that earned AMP the highest security effectiveness scores in third-party testing?
A) 98.5%
B) 95.6%
C) 99.2%
D) 100%
A) 98.5%
B) 95.6%
C) 99.2%
D) 100%
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
20
Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to onboard it quickly and easily?
A) Device profiling
B) Centralized policy management
C) Context-aware access
D) Platform exchange grid
A) Device profiling
B) Centralized policy management
C) Context-aware access
D) Platform exchange grid
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
21
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
A) Flexible AAA Options
B) Differentiated Mobile Access
C) High throughput maintained while still protecting domains against threats
D) Identity Service Engine
A) Flexible AAA Options
B) Differentiated Mobile Access
C) High throughput maintained while still protecting domains against threats
D) Identity Service Engine
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
22
How do AMP's device trajectory capabilities help address customers' breach remediation issues?
A) It analyzes the data from suspicious files to provide a new level of threat intelligence
B) It searches for potential threats based on identified activities and behaviors.
C) It determines the scope and cause of an outbreak and tracks suspicious files
D) It tracks file behavior across the network to see which devices it enters and exits
A) It analyzes the data from suspicious files to provide a new level of threat intelligence
B) It searches for potential threats based on identified activities and behaviors.
C) It determines the scope and cause of an outbreak and tracks suspicious files
D) It tracks file behavior across the network to see which devices it enters and exits
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
23
What is a key feature of Application Visibility and Control?
A) Retrospective security
B) Control of protocol-hopping apps that evade traditional firewalls
C) Scalable policy inheritance
D) Automated remediation APIs
A) Retrospective security
B) Control of protocol-hopping apps that evade traditional firewalls
C) Scalable policy inheritance
D) Automated remediation APIs
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
24
In which two ways should companies modernize their security philosophies? (Choose two.)
A) Rebuild their security portfolios with new solutions
B) Complement threat-centric tactics with trust-centric methods
C) Expand their IT departments
D) Decrease internal access and reporting
E) Reinforce their threat-centric security tactics
A) Rebuild their security portfolios with new solutions
B) Complement threat-centric tactics with trust-centric methods
C) Expand their IT departments
D) Decrease internal access and reporting
E) Reinforce their threat-centric security tactics
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
25
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
A) Decreasing endpoint ecosystem
B) Increasing access points
C) Expanding complexity
D) Decreasing 3rd party applications
E) Growing ecosystem
A) Decreasing endpoint ecosystem
B) Increasing access points
C) Expanding complexity
D) Decreasing 3rd party applications
E) Growing ecosystem
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
26
Which two features are part of Cisco Web security? (Choose two.)
A) user authentication
B) device profiling and onboarding
C) URL filtering & dynamic content analysis
D) intrusion prevention
E) user identity tracking
A) user authentication
B) device profiling and onboarding
C) URL filtering & dynamic content analysis
D) intrusion prevention
E) user identity tracking
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
27
Which feature of Cognitive intelligence can separate statistically normal traffic from anomalous traffic?
A) Anomaly modeling
B) Anomaly detection
C) Event classification
D) Trust modeling
A) Anomaly modeling
B) Anomaly detection
C) Event classification
D) Trust modeling
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
28
Which two attack vectors are protected by MFA? (Choose two.)
A) Mobile
B) Cloud
C) Data center
D) Web
E) Endpoints
A) Mobile
B) Cloud
C) Data center
D) Web
E) Endpoints
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
29
Where do you start to achieve true network visibility?
A) OT
B) Branches
C) IT
D) Fabric Level
A) OT
B) Branches
C) IT
D) Fabric Level
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
30
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
A) access to multiple data layers
B) threats stopped from getting in and spreading
C) see and share malware details
D) access to Trojan downloader
A) access to multiple data layers
B) threats stopped from getting in and spreading
C) see and share malware details
D) access to Trojan downloader
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
31
What are the competing IT and Operation Technology (OT) priorities that make securing IoT difficult?
A) Innovation vs. manufacturing
B) Hackers vs. safety
C) Malfunctions vs. output
D) Security vs. availability
A) Innovation vs. manufacturing
B) Hackers vs. safety
C) Malfunctions vs. output
D) Security vs. availability
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
32
Which two attack vendors are protected by Visibility and Enforcement? (Choose two.)
A) Web
B) Cloud
C) Endpoints
D) Email
E) Mobile
A) Web
B) Cloud
C) Endpoints
D) Email
E) Mobile
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
33
What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the tag in the infrastructure?
A) VXLAN
B) Ingress VLAN
C) Security Group Tag
D) Access Control List
A) VXLAN
B) Ingress VLAN
C) Security Group Tag
D) Access Control List
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
34
How does AnyConnect provide highly secure access for select enterprise mobile apps?
A) Per application VPN
B) Secure Layer 2 Network Access
C) Application Visibility & control
D) Identity Service Engine
A) Per application VPN
B) Secure Layer 2 Network Access
C) Application Visibility & control
D) Identity Service Engine
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
35
What is an attribute of Cisco Talos?
A) Blocks threats in real time
B) Real-time threat information
C) 3rd party applications integrated through comprehensive APIs
D) Detection of threats communicated within 48 hours of occurrence
A) Blocks threats in real time
B) Real-time threat information
C) 3rd party applications integrated through comprehensive APIs
D) Detection of threats communicated within 48 hours of occurrence
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
36
Which two attack vectors are protected by NGFW? (Choose two.)
A) Mobile
B) Data Center
C) Cloud
D) Web
E) Email
A) Mobile
B) Data Center
C) Cloud
D) Web
E) Email
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
37
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
A) Duo
B) Cisco Security Connector
C) Industrial Network Director
D) Identity Services Engine
E) Advanced Malware Protection
A) Duo
B) Cisco Security Connector
C) Industrial Network Director
D) Identity Services Engine
E) Advanced Malware Protection
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
38
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)
A) Reputation filtering
B) Malware scanning
C) Predictive intelligence
D) Breach mitigation
E) Off-network security
F) Recursive DNS
A) Reputation filtering
B) Malware scanning
C) Predictive intelligence
D) Breach mitigation
E) Off-network security
F) Recursive DNS
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
39
How does AMP's file reputation feature help customers?
A) It enables secure web browsing with cognitive threat analytics
B) It enables point in time detection through a one-to-one engine
C) It increases the accuracy of threat detection with Big Data analytics
D) It increases the protection to systems with exact fingerprinting
A) It enables secure web browsing with cognitive threat analytics
B) It enables point in time detection through a one-to-one engine
C) It increases the accuracy of threat detection with Big Data analytics
D) It increases the protection to systems with exact fingerprinting
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
40
What are two common customer obstacles? (Choose two.)
A) Compliance regulations
B) Security system blackouts
C) High turnover of IT professionals
D) Limited resources
E) Lack of solution integration
A) Compliance regulations
B) Security system blackouts
C) High turnover of IT professionals
D) Limited resources
E) Lack of solution integration
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
41
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)
A) Network Analytics
B) Behavioral Indication of Compromise
C) Remote Access VPN
D) File Retrospection and Trajectory
E) Mobile Access
A) Network Analytics
B) Behavioral Indication of Compromise
C) Remote Access VPN
D) File Retrospection and Trajectory
E) Mobile Access
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
42
What is used to reduce attack surfaces?
A) Device trust
B) Remediation
C) Segmentation
D) Access
A) Device trust
B) Remediation
C) Segmentation
D) Access
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
43
Which two elements does Advanced Malware Protection provide? (Choose two.)
A) dynamic data analysis
B) intrusion analysis
C) dynamic URL filtering
D) reputation analytics
E) advanced analytics
A) dynamic data analysis
B) intrusion analysis
C) dynamic URL filtering
D) reputation analytics
E) advanced analytics
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
44
What is one of the reasons that customers need a Visibility & Enforcement solution?
A) Storage is moving from on-premises to cloud-based
B) Network traffic is growing at an exponential rate
C) Organizations need the ability to block high-risk websites
D) Businesses can't see or protect devices on their network
A) Storage is moving from on-premises to cloud-based
B) Network traffic is growing at an exponential rate
C) Organizations need the ability to block high-risk websites
D) Businesses can't see or protect devices on their network
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
45
Which two attack vectors are protected by Web Security? (Choose two.)
A) Web
B) Cloud
C) Voicemail
D) Data Center
E) Email
A) Web
B) Cloud
C) Voicemail
D) Data Center
E) Email
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
46
On average, how many days elapse before businesses discover that they have been hacked?
A) 50
B) 30
C) 10
D) 70
A) 50
B) 30
C) 10
D) 70
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
47
What is a key feature of Duo?
A) Provides SSL VPN
B) Supports pxGrid
C) Authenticates user identity for remote access
D) Automates policy creation for IT staff
A) Provides SSL VPN
B) Supports pxGrid
C) Authenticates user identity for remote access
D) Automates policy creation for IT staff
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
48
What are three main solutions areas for Advanced Threat? (Choose three.)
A) NGFW
B) Network Analytics
C) Intrusion Analytics
D) Threat Analytics
E) Malware Protection
F) Threat Defense
A) NGFW
B) Network Analytics
C) Intrusion Analytics
D) Threat Analytics
E) Malware Protection
F) Threat Defense
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
49
What are three key benefits of Cisco NGFW? (Choose three.)
A) Reduces throughput
B) Increases traffic latency
C) Detects and remediates threats faster
D) Identifies anomalous traffic
E) Prepares defenses
F) Reduces complexity
A) Reduces throughput
B) Increases traffic latency
C) Detects and remediates threats faster
D) Identifies anomalous traffic
E) Prepares defenses
F) Reduces complexity
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
50
Which feature of StealthWatch aggregates and normalizes NetFlow data?
A) Netflow analytics
B) Forensic investigation
C) Advanced malware protection
D) FlowCollector
A) Netflow analytics
B) Forensic investigation
C) Advanced malware protection
D) FlowCollector
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
51
What are two common seller obstacles? (Choose two.)
A) Seller competition
B) Overcrowded portfolios
C) Fragmented solutions
D) Unresponsive potential customers
E) Complexity of solution components
A) Seller competition
B) Overcrowded portfolios
C) Fragmented solutions
D) Unresponsive potential customers
E) Complexity of solution components
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
52
What are two areas present a security challenge for customers? (Choose two.)
A) Email
B) Corporate priorities
C) IoT devices
D) IT departments
E) OT environments
A) Email
B) Corporate priorities
C) IoT devices
D) IT departments
E) OT environments
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
53
What are three main areas of the Cisco Security Portfolio? (Choose three.)
A) IoT Security
B) Roaming Security
C) Advanced Threat
D) Cloud Security
E) Voice & Collaboration
F) Firewalls
A) IoT Security
B) Roaming Security
C) Advanced Threat
D) Cloud Security
E) Voice & Collaboration
F) Firewalls
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
54
What are two critical networking challenges? (Choose two.)
A) Threat protection
B) Orchestration
C) Automation
D) Access
E) Visibility
A) Threat protection
B) Orchestration
C) Automation
D) Access
E) Visibility
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
55
What are two solutions for Cisco Cloud Security? (Choose two.)
A) cloud data security
B) intrusion prevention
C) advanced network security
D) cloud-delivered security
E) cloud security
A) cloud data security
B) intrusion prevention
C) advanced network security
D) cloud-delivered security
E) cloud security
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck
56
What does remote access use to verify identity?
A) Agents
B) MFA
C) Remote Access VPN
D) AMP for Endpoints
A) Agents
B) MFA
C) Remote Access VPN
D) AMP for Endpoints
Unlock Deck
Unlock for access to all 56 flashcards in this deck.
Unlock Deck
k this deck