500-265 Flashcards

1
Q

What is the single best set of benefits form a Cisco switched campus solution? Select exactly 1 answer(s) from the following:
A. Streamlined communications, customer responsiveness, and operational efficiency
B. Software-based routing capabilities and enhanced QoS
C. Network intelligence, enhanced QaS, borderless security, availability, resiliency
D. Intelligent network devices combined with integrated application modules

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Cisco Secure Access solution provides centralized policy management to give administrators more granular control over access authorization?
A. Cisco Identity Services Engine
B. Cisco TrustSec
C. Cisco Advanced Malware Protection for Endpoints
D. Cisco AnyConnect
E. Cisco ASA Next-Generation Firewall

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the main reason that customers need Cisco Secure Access?
A. Companies use more social media than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More devices are connecting on and off campus.
F. More business is done using the web and email than ever before.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a customer complains that employees access websites for work but then waste time with games and videos, which solution should you suggest, and why?
A. Cisco AMP, for protection before, during, and after attacks
B. Cisco WSA, for its URL filtering ability
C. Cisco RSA, for its data loss prevention
D. Cisco WSA, for its application visibility and control
E. Cisco ESA, for its global threat operations
F. Cisco ESA, for its antivirus capabilities

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cisco Email Security is ideal for which type of customer?
A. customers who need sensitive data to remain onsite
B. customers whose expectations are set
C. customers who do not need cloud services
D. customers who want to move services to the cloud

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After a user prepares and sends an encrypted message to a recipient, what is the next step?
A. The decrypted message is displayed to the recipient.
B. The encrypted message is displayed to the recipient.
C. The email is forwarded to new users to be authenticated.
D. The encryption key is stored in the Cisco ESA servers.
E. The customer receives an encrypted message that requires a decryption

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On average, email security Outbreak Filters identify and stop threats how many hours sooner than the next major AV vendor?
A. 24 hours sooner
B. 13 hours sooner
C. one hour sooner
D. no sooner, because Outbreak Filters do not identify and stop threats

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
The first phase of email security analyzes “who-what-where-when-how” information and context-based policies during which component of threatdetection?
A. antivirus defense
B. advanced malware protection for email
C. outbreak filters
D. data loss prevention
E. encryption
F. antispam defense
A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which option best describes granular app control using application visibility and control?
A. blocking harmful sites based on content, such as pokerstars.com
B. blocking World of Warcraft but allowing Google+
C. blocking Facebook games but allowing Facebook posts
D. blocking Twitter to increase employee productivity

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which two advanced malware protection features are available on Cisco AMP for Content? (Choose two.)
A. URL filtering
B. retrospective security
C. attack chain weaving
D. breach hunting
E. trajectory
F. Behavioral indication of compromise
A

A B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reputation filtering performs which two functions? (Choose two.)
A. rates each site based on a reputation score
B. automatically updates devices based on threats
C. tunes itself according to relevance to the network
D. communicates with Cisco SenderBase, which is a common security database
E. analyzes in-depth parameters for anything that requests network access

A

A D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?
A. dynamic content analysis
B. Cisco Application Visibility and Control
C. centralized management and reporting
D. encryption

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Cisco technology solution can resolve a customer’s inability to properly restrict and authorize access to protected resources, while still introducingnew applications, devices, and business partnerships?
A. Cisco TrustSec
B. Cisco Data Center Management Policy Implementation
C. Cisco Data Center Virtualization and Cloud
D. Cisco Cyber Threat Defense
E. Cisco Application Centric Infrastructure
F. Cisco Secure Data Center
G. Cisco Security Intelligence Operations

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Why do companies need the quickly scalable Cisco Secure Data Center virtualization and cloud technology solution?
A. Fifty-six percent of employees who leave a company take private information with them.
B. Competitors are gaining a 33 percent market share.
C. Administrators are allowing a growing number of BYOD devices.
D. Staff is unable to keep up with newer data center technology.
E. Provisioning time for data centers has decreased from eight weeks to 15 minutes.
F. Management is expected to decrease IT budgets by 25 percent.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do companies need Cisco Cyber Threat Defense?
A. They have a lack of segmented or differentiated access.
B. They are inundated with advanced persistent threats.
C. They need to add and provision servers faster than ever.
D. They have increased bandwidth needs, and they allow BYOD.
E. They have an infrastructure of overlapping rule sets, complex inheritance, and oversubscription.
F. They need cost-effective security management outsourcing.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which integrated technology solution deals with application-centric infrastructures?
A. Cisco Unified Access
B. Cisco Security as a Service
C. Cisco Cyber Threat Defense
D. Cisco Secure Data Center
E. Cisco TrustSec
A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
Which Cisco Secure Access solution should you recommend to a customer who is experiencing access complications due to too many policies and toomany user groups?
A. Cisco AnyConnect
B. Cisco TrustSec
C. Cisco ISE
D. Cisco AMP for Endpoints
E. Cisco site-to-site VPN
F. Cisco SIO
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How does the Device Trajectory feature work?
A. It searches for potential threats based on identified activities.
B. It tracks file behavior across the network to see which devices it enters and exits.
C. It analyzes the data from file and process retrospection to provide a new level of threat intelligence.
D. It isolates suspicious files and runs tests to determine their authenticity.
E. It tracks file behavior on a device to pinpoint the root cause of a compromise.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
Consider the process that begins with file retrospection, continues to interrogate the file and update its disposition over time, then records the pathwaythat the software and files take from device to device. This process is an example of which Cisco AMP feature?
A. file reputation
B. attack chain weaving
C. breach hunting
D. file sandboxing
E. machine learning
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
In the Cisco TrustSec “User to Data Center Access Control” use case, which users typically have access to the company data center?
A. suppliers
B. employees
C. noncompliant users
D. guests
A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
Which two features of Cisco ISE contribute to guest access management? (Choose two.)
A. employee-sponsored network access
B. faster device onboarding
C. guest access and activity tracking
D. accelerated security options
E. site-to-site VPNs
F. clientless network access
A

A C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
Which Cisco Identity Services Engine feature controls access and policies for campuses and branches, wired and wireless devices, and guests, from a single location?
A. centralized policy management
B. compliance
C. URL filtering
D. SSL decryption
E. extensive BYOD support
A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
Which two add-ons are available for the AnyConnect Premium license? (Choose two.)
A. mobile license
B. basic license
C. management license
D. essentials license
E. advanced endpoint assessment
F. BYOD license
A

A E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
Which two features of Cisco AnyConnect contribute to secure remote access? (Choose two.)
A. guest access management
B. superior clientless network access
C. accelerated security options
D. compliance and tracking
E. context-aware access
F. extensive BYOD support
G. centralized management
A

B F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the primary reason that customers need content security today?
A. Companies are more spread out than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More business is done using the web and email than ever before.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which solution is the most effective for virus cleanup?
A. Cisco Firewall with Authorized Access
B. Cisco DMVPN with GRE Tunnels
C. Cisco Easy VPN with Remote-Site Device Management
D. Cisco AMP for Networks with File Trajectory
E. Cisco SIO with Increased Visibility
F. Cisco ISE with Automated Policy Tuning

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
Which two features of AMP are available in Cisco AMP for Networks that are not available in Cisco AMP for Content alone? (Choose two.)
A. trajectory
B. retrospective security
C. dynamic analytics
D. behavioral indications of compromise
E. fuzzy fingerprinting
F. one-to-one signature
A

A D

28
Q
Which Cisco IPS feature adapts in real time to detect and block intrusions that range from never- before-seen worms to the most sophisticated andsubtle criminal attacks?
A. file-type detection
B. intelligent detection
C. user identity tracking
D. SSL decryption
E. impact assessment
F. automated policy tuning
A

B

29
Q

Which two options are benefits of Cisco Application Visibility and Control for administrators? (Choose two.)
A. It ensures device compliance.
B. It restricts only entire applications.
C. It limits individual or group-based access to certain application components.
D. You can gain greater visibility into devices that are accessing the network.
E. You can access the contents of each device remotely.

A

A C

30
Q

Which component of Cisco network security builds on basic firewall capabilities by adding web filtering, web email controls, and Cisco ApplicationVisibility and Control?
A. Cisco Advanced Malware Protection for Networks
B. Cisco ASA Next-Generation Firewall
C. Sourcefire Next-Generation Intrusion Prevention System
D. Cisco Web Security Appliance

A

B

31
Q

Which component of Cisco network security is updated after an attack to help prevent threats before they encounter the network again?
A. Cisco site-to-site VPN
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco ASA Next-Generation Firewall
G. Cisco Security Intelligence Operations

A

G

32
Q
On average, how many pieces of new malware are created every second?
A. one
B. four
C. 20
D. 100
A

B

33
Q
Which feature is a primary feature of Cisco AnyConnect?
A. role-based policy management
B. context-aware access
C. secure and flexible remote access
D. SSL decryption
A

C

34
Q
Cisco Secure Access Solutions delivers a secure connection to a continually growing number of endpoints. This statement is an example of which Cisco value?
A. time-to-value
B. protection
C. control
D. scalability
E. flexibility
F. agility
A

E

35
Q

Which three solutions are Cisco Secure Access solutions? (Choose three.)
A. Cisco Remote-Access VPN
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco Advanced Malware Protection for Endpoints
G. Cisco security appliance
H. Cisco Security Manager

A

A B G

36
Q
Which two features are part of site-to-site VPN? (Choose two.)
A. web email controls
B. user identity traction
C. SSL decryption
D. Snort technology
E. remote access
F. seamless connection with Cisco ASA
A

E F

37
Q
Cisco network security offers unmatched visibility and control of network and application traffic.
This statement describes which Cisco value?
A. time-to-value
B. protection
C. control
D. scalability
E. flexibility
F. agility
A

C

38
Q
Which Cisco ASA Next-Generation Firewall service restricts websites and web application usage based on the reputation of the site?
A. Cisco Web Security Appliance
B. Cisco Web Security Essentials
C. Intelligent Detection
D. Authorized Access
E. SSL Decryption
A

B

39
Q
Which four solutions are Cisco network security solutions? (Choose four.)
A. Cisco site-to-site VPN technologies
B. Cisco Identity and Access Control
C. Cisco Email Security
D. Cisco Web Security Appliance
E. Sourcefire Next-Generation Intrusion Prevention System
F. Cisco ASA Next-Generation Firewall
G. Cisco security appliance
H. Cisco Remote-Access VPN
A

A E F G

40
Q
Which two features are components of the Cisco Web Security Appliance? (Choose two.)
A. encryption
B. URL filtering
C. user identity tracking
D. antispam defense
E. impact assessment
F. Cisco Application Visibility and Control
G. context awareness
H. device profiling and onboarding
A

B F

41
Q
Cisco Content Security integrates seamlessly with existing security and network infrastructures.
This statement describes which Cisco value?
A. time-to-value
B. protection
C. control
D. scalability
E. flexibility
F. agility
A

E

42
Q

Which two solutions are main components of Cisco Content Security? (Choose two.)
A. Cisco ASA Next-Generation Firewall
B. Cisco Web Security
C. Cisco Remote-Access VPN
D. Sourcefire Next-Generation Intrusion Prevention System
E. Cisco Email Security
F. Cisco Advanced Malware Protection

A

B E

43
Q

Which Cisco security technology delivers the best real-time threat intelligence?
A. Cisco ASA Next-Generation Firewall
B. Cisco Identity Services Engine
C. Cisco Security Manager
D. Cisco Security Intelligence Operations
E. Cisco TrustSec

A

D

44
Q
Which three values should you use to position Cisco security solutions? (Choose three.)
A. time-to-value
B. protection
C. control
D. integration
E. flexibility
F. agility
G. scalability
A

B C E

45
Q

In the Cisco future solutions architecture framework, the security solutions are directly built upon which component?
A. management and intelligence capabilities
B. Cisco security platforms
C. third-party applications
D. security intelligence operations

A

B

46
Q
The current Cisco comprehensive framework solutions are divided into which three categories? (Choose three.)
A. Content Security
B. Cloud Security
C. Network Security
D. Access Security
E. Data Center Security
F. Internet Security
G. Advanced Malware Protection
A

A C D

47
Q
Which three options describe the main problems with traditional security solutions? (Choose three.)
A. fragmented solutions
B. the lack of management solutions
C. missing components
D. solutions being pieced together
E. the lack of a cloud solution
F. the lack of a firewall
G. security gaps
A

A D G

48
Q
Which two business use trends have surfaced in the last five years and require nontraditional security? (Choose two.)
A. BYOD
B. Wi-Fi connections
C. partial URL and application blocking
D. third-party applications
E. web and email attacks
F. a large number of remote employees
A

A F

49
Q

Which feature of the Cisco security appliance provides “who-what-where-when-how” information about any requests for network access?
A. basic management
B. web application controls
C. authorized access
D. Cisco Application Visibility and Control
E. context awareness

A

E

50
Q
Which VPN offering removes the need for point-to-point GRE tunnels?
A. standard IPsec VPN
B. Cisco Easy VPN
C. Cisco GRE-based VPN
D. Cisco DMVPN
E. Cisco GET VPN
A

E

51
Q

ISE

A
Before:
Centralized Policy Management
Guest Management
Context Aware access
Device Profiling and Onboarding
After:
Rapid Threat Containment
52
Q

AMP for Network

A
Before:
File reputation
During:
File sandboxing
File reputation
53
Q

AMP for Endpoints

A
Behavioral indication of compromise
retrospective security
attack chain weaving
breach hunting
trajectory
54
Q

Web Security

A
Before:
Web Filtering
Web reputation
Application Visibility and Control
During:
Web Page
Anti-Malware
File Reputation-AMP
Outbreak Intelligence
DLP Integration
After:
File Sandboxing
File Retrospection
Cognitive Threat Analytics
55
Q

Email Security

A
  1. Anti Spam Defense
  2. Outbreak Filters
  3. Antivirus Engines/Defense
  4. AMP
  5. DLP
  6. Encryption
56
Q
Which Feature has Cisco partnered with Sophos and McAfee to provide as part of email security solution?
A. advanced malware prtection
B.encryption
C. Outbreak filters
D. antivirus defense
A

D

57
Q
Which feature of Cisco cyber threat Defense use mote than 40 detectors to process every HTTP or Https request in the network?
A. event classification
B.anomaly detection
C.relationship modeling
D. trust modeling
A

B

58
Q
Which feature of web Security breaks a webpage into it core components such as HTML,scripts and Flash and then analyzes how each component net behaves before allowing access?
A. Security intelligence opertions
B. core webpage analyzer
C. real-time snadboxing
D. outbreak intelligence engine
A

D

59
Q
Which management solution is ideal for customers who require a cloud-based policy management solution?
A. Cisco Firepower management Center
B. Cisco Defense Orchestrator
C. FireSight
D. Cisco ASDM
E. Cisco Talos
A

B

60
Q
Which two options are standard functions of stateful firewall? Choose two
A. IP fragmentation
B. NGIPS
C.access control list
D. NGFW
E. File trajectory
A

A C

61
Q
Which feature of Cisco Stealthwatch leverages deep network visibility to get a full picture of network activity and identity suspicious behaviors?
A. Cisco AMP
B. threat-based anomaly detection
C. forensic investigation
D. Netflow monitoring.
A

B

62
Q
Which two options are features of the threat analysis capability of NGIPS? Choose two
A. Network Behavior 
B. User identity tracking
C. file reputation
D. impact analysis
E. Behavior assessment
A

A B

63
Q

Which two actions does reputation filtering take which are an important part web security threat defense?
A. communicates with Cisco Sender Base
B. rates each site based on a reputation score
C. auto updates devices based on threats
D. tunes itself according to relevance to the network
E. analyzes in-depth parameters for anything requestiong network access.

A

A B

64
Q

Which two statements about the Cisco IronPort WSA and Cisco ASA CX Context-Aware
Security are true? (Choose two.)
A. The Cisco WSA operates on all TCP-based ports, while Cisco ASA CX inspects TCP port 80 only.
B. The Cisco WSA is a secure web proxy, while Cisco ASA CX is an inline device.
C. The Cisco WSA offers comprehensive web security, while Cisco ASA CX offers next- generation firewall features.
D. The Cisco WSA is available as a cloud service, while Cisco ASA CX performs on-site security services.
E. Cisco ASA CX provides better anti-malware scanning performance than the Cisco WSA.
question_answerVIEW ANSWER

A

B C

65
Q

Which statement best describes Cisco ISE?
A. Cisco ISE provides AAA features, guest provisioning, and device profiling features in the
base feature set; link encryption policies, host posture, and security group access require the advanced feature set.

B. Cisco ISE combines the capabilities of Cisco Secure ACS and Cisco Virtual Security
Gateway into one product.

C. Cisco ISE consolidates user authentication with NAC components into one solution.

D. Cisco ISE consolidates user AAA, Security Group Access features, and ScanSafe
functionality into one product.

A

C

66
Q
What policy and Access solution technology combines posture checks and authentication across wired,wireless and Vpn networks to provide consistent connection to the corporate network anywhere
A.Cisco NGIPS
B. Cisco Trust Sec
C. Cisco ISE
D. Cisco Anyconnect
A

D