Valentine Day Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 700-551 Dumps

Page: 1 / 3
Total 76 questions

Express Security for Account Managers (ESAM) Questions and Answers

Question 1

Which are three small budget customer concerns? (Choose three.)

Options:

A.

Budget is controlled by sales

B.

Licenses are too cheap

C.

Multiple devices are leaving a gap in security

D.

Products are not packages together

E.

Solutions are not prioritized to threats

F.

Security budget has been decreasing

Question 2

What managed service integrates deep expertise with cutting-edge technology leading intelligence, and advanced analytics to detect and investigate threats with great speed, accuracy, and focus?

Options:

A.

Opportunity Incentive Program

B.

Data Loss Prevention

C.

Active Threat Analytics

D.

Web Security Appliance

E.

Incident Response

Question 3

Which are two attack vectors protected by Email Security? (Choose two.)

Options:

A.

Voicemail

B.

E-mail

C.

Cloud apps

D.

Endpoints

E.

SaaSapps

Question 4

Which two are attack vectors protected by Malware Protection? (Choose two.)

Options:

A.

Voicemail

B.

Cloud apps

C.

Mobile

D.

E-mail

E.

Campus and Breach

Question 5

Whichthree are key points from the Threat-Centric module? (Choose three.)

Options:

A.

Cisco Security is the #1 threat model

B.

Customers are searching for security answers without interrupting productivity

C.

Cisco Security provides flexible, simple, and integrated advanced threat detection, through a multilayerd approach

D.

The Cisco Security Portfolio provide security across the entire business environment

E.

An effective security solution can help overcome ever-growing security challenges

F.

Cisco Security provides direct simple, and balanced detection by driving customer outcomes

Question 6

What are three main customer software buying models? (Choose three)

Options:

A.

Security ELA Program

B.

Security Software Volume Purchasing Program

C.

Cisco360

D.

Not for Resale Program

E.

CiscoONE

F.

Technology Migration Program

Question 7

Which two options drive successful business outcomes for customers? (Choose two.)

Options:

A.

Comprehensive threat protection

B.

Software based firewalls

C.

Enhanced visibility

D.

Firewall protection

E.

Hardened solutions

Question 8

How does Cisco's Policy & Access solution handle a changing user base in a growing company?

Options:

A.

Cisco Talos Security Intelligence and Research Group integrates into all security solutions, providing advanced protection against new threats

B.

Cisco's architecture offers the lowest TCO by providing products that integrate, lowering the cost of IT setup, management, and maintenance

C.

Cisco delivers centralized policy management that grants user access with easily configured policies

D.

Cisco provides you the ability to monitor and resftrict application usage

Question 9

Which are two attack vectors protected by DNS-Layer security? (Choose two.)

Options:

A.

Mobile

B.

Webmail

C.

Cloud technology

D.

E-mail

E.

Voicemail

Question 10

Which are three key products and benefits of the mobile threat-centric solution? (Choose three.)

Options:

A.

Software-defined segmentation through TrustSec

B.

Mobile cyber enforcement with AMP

C.

Enforced device security policies with Meraki

D.

Device phishing protection through Talos and Umbrellas

E.

Automated policy enforcement with ASAv

F.

Enhanced control access with ISE and Cloudlock

Question 11

What NGIPS appliance would you use if your customer is at the enterprise level and requires modular architecture that is scalable?

Options:

A.

Cisco 4000 series ISR

B.

FirePOWER 8000 series

C.

ASA 7000 series

D.

Cisco 800 series ISR

E.

FirePOWER 2100 series

Page: 1 / 3
Total 76 questions