cisco 700-765 practice test

Cisco Security Architecture for System Engineers


Question 1

What are the main features of Umbrella for Cloud-Delivered Security?

  • A. Protect users against DDOS attacks
  • B. Handles 130B+ DNS requests daily with 99% uptime
  • C. Runs suspicious cloud applications in a sandbox environment
  • D. Blocks malware, C2 callbacks, & phishing over any port/protocol
Answer:

D

Discussions

Question 2

What are two result of utilizing a fragmented security model? (Choose two.)

  • A. Reduced malicious file risk through additional segmentation.
  • B. Decreased network accessibility through multiple applications.
  • C. Decreased visibility and limited understand of security coverage.
  • D. Increased identity controls
  • E. Individual components pieced together to meet requirements.
Answer:

C E

Discussions

Question 3

What is a key feature of Application Visibility and Control?

  • A. Retrospective security
  • B. Control of protocol-hopping apps that evade traditional firewalls
  • C. Scalable policy inheritance
  • D. Automated remediation APIs
Answer:

B

Discussions

Question 4

What does Cisco provide via Firepower’s simplified, consistent management?

  • A. Higher value
  • B. Reduced complexity
  • C. Improved speed to security
  • D. Reduced down time
Answer:

B

Discussions

Question 5

What are two tenants of establishing an SD-perimeter? (Choose two.)

  • A. Securing device access
  • B. Securing network access
  • C. Securing user-device trust
  • D. Securing app access
  • E. Securing endpoints
Answer:

A D

Discussions

Question 6

Which two attack vectors are protected by Web Security? (Choose two.)

  • A. Web
  • B. Cloud
  • C. Voicemail
  • D. Data Center
  • E. Email
Answer:

A B

Discussions

Question 7

How does AnyConnect provide highly secure access for select enterprise mobile apps?

  • A. Per application VPN
  • B. Secure Layer 2 Network Access
  • C. Application Visibility & control
  • D. Identity Service Engine
Answer:

A

Discussions

Question 8

Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to onboard it quickly
and easily?

  • A. Device profiling
  • B. Centralized policy management
  • C. Context-aware access
  • D. Platform exchange grid
Answer:

A

Discussions

Question 9

What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the tag in the
infrastructure?

  • A. VXLAN
  • B. Ingress VLAN
  • C. Security Group Tag
  • D. Access Control List
Answer:

C

Discussions

Question 10

How does AMP’s file reputation feature help customers?

  • A. It enables secure web browsing with cognitive threat analytics
  • B. It enables point in time detection through a one-to-one engine
  • C. It increases the accuracy of threat detection with Big Data analytics
  • D. It increases the protection to systems with exact fingerprinting
Answer:

C

Discussions
To page 2