Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cisco 700-765 Dumps

Page: 1 / 3
Total 92 questions

Cisco Security Architecture for System Engineers Questions and Answers

Question 1

What is a continuous protection feature of Advanced Malware Protection?

Options:

A.

Sandboxing File Analysis

B.

Global Threat Intelligence

C.

Behavioral Indicators of Compromise

D.

File Reputation

Question 2

Which two attack vectors are protected by Cyber Threat Defense&Network Analytics? (Choose Two)

Options:

A.

Web

B.

Endpoints

C.

Cloud

D.

Email

E.

Data Center

Question 3

Which two loT environment layers are protected by Stealthwatch? (Choose Two)

Options:

A.

Things

B.

Control Layer

C.

Endpoints

D.

Internet/Cloud

E.

Access Points

Question 4

Which two loT environment layers are protected by AMP for Endpoints? (Choose Two)

Options:

A.

Data Center

B.

Internet/Cloud

C.

Control Layer

D.

Access Points

E.

Things

Question 5

What is an attribute of Cisco Talos?

Options:

A.

Detection of threats communicated within 48 hours of occurrence

B.

3d party applications integrated through comprehensive APIs

C.

Real-time threat information

D.

Blocks threats in real time

Question 6

Which feature of ISE provides role based access control and command level authorization with logging for auditing?

Options:

A.

Context-aware access

B.

Centralized policy management

C.

Platform exchange grid

D.

TACACS+ Device Administration

Question 7

Which two Cisco products help manage data access policy consistently? (Choose Two)

Options:

A.

Cloudlock

B.

pxGrid

C.

Steathwatch

D.

Duo

E.

AMP for Endpoints

Question 8

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?

Options:

A.

Trust modeling

B.

Anomaly modeling

C.

Anomaly detection

D.

Event classification

Question 9

What are two key Cisco loT use cases? (Choose Two)

Options:

A.

Connected Health

B.

Parks and Recreation

C.

Industrial Security

D.

Financial Institutions

E.

Mobile Utilities

Question 10

In which two ways has digitization transformed today's security threat landscape'? (Choose two.)

Options:

A.

Growing ecosystem

B.

Expanding complexity

C.

Increasing access points

D.

Decreasing endpoint ecosystem

E.

Decreasing 3rd party applications

Question 11

What are two key capabilities of Meraki? (Choose Two)

Options:

A.

contextual awareness

B.

identity-based and device aware security

C.

device profiling

D.

security automation

E.

application visibility and control

Question 12

What are two features provided by ISE? (Choose Two)

Options:

A.

DDOS attack prevention

B.

Network visibility

C.

Device Firewalling

D.

Centralized policy management

E.

Guest Management

Question 13

What are three main solutions areas for Advanced Threat? (Choose Three)

Options:

A.

Threat Defense

B.

Intrusion Analytics

C.

Threat Analytics

D.

Network Analytics

E.

NGFW

F.

Malware Protection

Page: 1 / 3
Total 92 questions