SASE Flashcards
(80 cards)
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
A. More users
B. More devices
C. More networks
D. More IT professionals
E. More vulnerabilities
BE
B More devices
E More vulnerabilities
Which two Cisco products help manage data access policy consistently? (Choose two.)
A. Stealthwatch
B. pxGrid
C. Duo
D. AMP for Endpoints
E. Cloudlock
BE
B - Cloudlock - data usage control
E - PXGrid - integration
How does SD-WAN protect network traffic from end-to-end?
A. Management
B. Automation
C. Segmentation
D. Analyzation
C Segmentation
Which two IoT environment layers are protected by Stealthwatch? (Choose two.)
A. Access Points
B. Endpoints
C. Internet/Cloud
D. Control Layer
E. Things
DE
D Control Layer
E Things
What are two key Cisco IoT use cases? (Choose two.)
A. Industrial Security
B. Parks and Recreation
C. Connected Health
D. Financial Institutions
E. Mobile Utilities
AC
A Industrial Security
C Connected Health
What are the main features of Umbrella for Cloud-Delivered Security?
A. Protect users against DDOS attacks
B. Handles 130B+ DNS requests daily with 99% uptime
C. Runs suspicious cloud applications in a sandbox environment
D. Blocks malware, C2 callbacks, & phishing over any port/protocol
D Blocks malware, C2 callbacks, & phishing over any port/protocol
What are two core functionalities of DNS-layer security? (Choose two.)
A. Live threat intelligence
B. Proxy and file inspection
C. URL filtering
D. Real-time sandboxing
E. Data analytics and monitoring
AB
A - Live Threat Intelligence
B - Proxy and file inspection
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
A. Web
B. Cloud
C. Data Center
D. Email
E. Endpoints
BC
B Cloud
C data center
Dump is wrong - Data Centre is part of Corporate WAN.
What are two ways that Cisco helps customers secure IoT deployments? (Choose two.)
A. limited access points
B. segmentation & visibility
C. cross-architecture automation
D. secure remote access
E. network analysis
BD
B segmentation and visibility
D secure remote access
Which two security risks are created by legacy approaches to networking? (Choose two.)
A. network downtime
B. user vulnerability
C. slow containment
D. access points
E. large attack surface
CE
C Slow containment
E large attack surface
What are three security blind spots that must be addressed? (Choose three.)
A. Workloads
B. Data
C. Networks
D. IT
E. Applications
F. Email
ABE
A Workloads
B Data
E Applications
Dump is wrong
Which two IoT environment layers are protected by ISE? (Choose two.)
A. Endpoints
B. Access Points
C. Control Layer
D. Things
E. Internet/Cloud
CD
C Control Layer
D Things
Dump is wrong - Internet/Cloud is incorrect
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
A. global threat intelligence
B. security automation
C. advanced threat protection and rapid remediation
D. contextual awareness
D contextual awareness
What does ThreatGrid integrate?
A. File reputation and behavioral indications of compromise
B. Malware analysis and threat intelligence
C. Threat intelligence and access control
D. File trajectory and time signatures
B Malware analysis and TI
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
A. Block BYOD devices
B. Always verify and never trust everything inside and outside the perimeter.
C. Limit internal access to networks.
D. Only grant access to authorized users and devices.
E. Require and install agents on mobile devices.
BD
B Always verify
D Only grant access to authorized users and devices
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?
A. Platform exchange grid
B. TACACS+ Device Administration
C. Context-aware access
D. Centralized policy management
B TACACS
What are two result of utilizing a fragmented security model? (Choose two.)
A. Reduced malicious file risk through additional segmentation.
B. Decreased network accessibility through multiple applications.
C. Decreased visibility and limited understand of security coverage.
D. Increased identity controls
E. Individual components pieced together to meet requirements.
BC
B Decreased network accessibility
C Decreased visibility
Which feature of AnyConnect provides better access security across wired and wireless connections with 802.1X?
A. Flexible AAA Options
B. Trusted Network Detection
C. Secure Layer 2 Network Access
D. AnyConnect with AMP
C Secure Layer 2 Network Access
Which two products are involved in granting safe access to apps? (Choose two.)
A. ISE
B. ACI
C. TrustSec
D. Duo
E. SD-Access
AD
A ISE
D Duo
What are two solutions Cisco offers for email security? (Choose two.)
A. Tetration
B. Meraki
C. Cloudlock
D. Umbrella
E. AMP for Email Security
DE
D Umbrella
E AMP
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. AMP for Endpoints
B. Duo
C. Cisco Security Connector
D. pxGrid
E. Stealthwatch
AE
A AMP
E Stealthwatch
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. SD-Access
C. MFA
D. ISE
E. ACI
BE
B - SD-Access - establish identity and access policy
E - ACI for Data Centers
What are two critical networking challenges? (Choose two.)
A. Threat protection
B. Orchestration
C. Automation
D. Access
E. Visibility
AE
A Orchestration
E Visibility
What percent of threats did ASA with FilePOWER block that earned AMP the highest security effectiveness scores in third-party testing?
A. 98.5%
B. 95.6%
C. 99.2%
D. 100%
C 99.2%