700 265
700 265
700 265
Number: 000-000
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
A. Flexible licensing
B. Faster integration
C. Fewer resources to manage
D. Less time scoping a breach
Correct Answer: D
Section: (none)
QUESTION 2
Which Cisco offering focuses on developing logical product suites grouped by domains?
A. Internet of Everything
B. SmartNet
C. Smart License
D. Cisco Expo
E. Collaborative Services
F. Cisco ONE
Correct Answer: F
Section: (none)
QUESTION 3
Refer to the exhibit.
Consolidating platforms and appliances under a single provider is an example of which customer cost saver?
Correct Answer: D
Section: (none)
QUESTION 4
Which three features does an ASA 5506-X appliance with FirePOWER Services provide? (Choose three.)
A. reliable visibility
B. data loss prevention
C. NGIPS
D. next generation firewall
E. URL filtering
F. Talos
QUESTION 5
Which three options are web and email security products? (Choose three.)
A. Umbrella
B. Cloudlock
C. Web Security Appliance
D. Investigate
E. NGFW
F. Meraki
QUESTION 6
Which three options are products and benefits of the mobile threat-centric solution? (Choose three.)
QUESTION 7
Which three options are products and benefits of the data center threat-centric solution? (Choose three.)
QUESTION 8
Which two options are products in the cloud apps threat-centric solution? (Choose two.)
A. Talos
B. Stealthwatch
C. Cloudlock
D. ISE
E. Meraki
Correct Answer: AC
Section: (none)
QUESTION 9
Which Cisco business values are demonstrated by scalable solution and network adaptability?
A. Cost effectiveness
B. Protection
C. Control
D. Flexibility
E. Completeness
Correct Answer: D
Section: (none)
QUESTION 10
Which customer use case is challenged by device incompatibility, OS diversity, and a multitude of third-party
application?
A. Compliance issue
B. Growing business
C. Vulnerable cloud
D. Small budget
E. Limited mobility
Correct Answer: A
Section: (none)
QUESTION 11
Which two aspects of Cisco solutions save customers money? (Choose two.)
Correct Answer: BC
Section: (none)
QUESTION 12
Which component of AMP provides the details that customers need to address problems after a breach is
identified?
A. context awareness
B. file sandboxing
C. rapid remediation
D. continuous analysis
E. network control
Correct Answer: C
Section: (none)
QUESTION 13
Which licensing feature enables customers to better manage their software assets and optimize their IT
spend?
A. Cisco ONE
B. Smart Accounts
C. Enterprise License Agreements
D. License Bundling
Correct Answer: B
Section: (none)
QUESTION 14
How does Cisco TrustSec help secure sensitive data and regulating network access?
A. email security
B. leverage file reputation
C. ensure compliance
D. provide customer choice
E. traffic tagging
Correct Answer: E
Section: (none)
QUESTION 15
Which two attack vectors are protected by malware protection? (Choose (two.)
A. mobile
B. campus and branch
C. email
D. cloud apps
E. voicemail
QUESTION 16
Which Cisco business values are demonstrated by increased employee productivity, confidence in data
confidentiality, and increased visibility?
A. protection
B. completeness
C. cost effectiveness
D. control
E. flexibility
Correct Answer: D
Section: (none)
QUESTION 17
Which three options must a customer look for when choosing a security solution provider? (Choose three.)
QUESTION 18
Which two options are features of the mobile threat-centric solution? (Choose two.)
Correct Answer: AB
Section: (none)
QUESTION 19
Which two options are products and benefit of the campus and branch threat-centric solutions? (choose two)
Correct Answer: AB
Section: (none)
QUESTION 20
Which attribute does Cisco Talos possess?
Correct Answer: C
Section: (none)
QUESTION 21
Which three options are major problems for customers growing their business? (choose three)
Correct Answer: CD
Section: (none)
QUESTION 23
Which two options are important drivers of the current security threat landscape? (Choose two)
A. Growing ecosystem
B. Decreasing third-party applications
C. Expanding complexity
D. Decreasing sophistication
E. Decreasing ecosystem
Correct Answer: AC
Section: (none)
QUESTION 24
In addition to protection, control, and flexibility, which two business values are included in Cisco value
propositions? (Choose two.)
A. Support
B. Completeness
C. Cost effectiveness
D. Scalability
E. Integration
Correct Answer: BC
Section: (none)
QUESTION 25
Which three options are a result of utilizing a fragmented security model? (Choose three.)
QUESTION 26
Which two options are solutions and features of the campus and branch threat-centric solution? (Choose two.)
A. NGFW and NGIPS
B. file retrospection and trajectory
C. enabled and protected investments
D. behavioral indication of compromise
E. network analytics
Correct Answer: CE
Section: (none)
QUESTION 27
Which two options are products and benefit of email threat-centric solution? (Choose two)
A. Meraki
B. Cloudlock
C. Cisco Registered Envelope Service
D. Cisco Umbrella
E. Web Filtering
F. AMP for Endpoints
Correct Answer: DF
Section: (none)
QUESTION 28
Which three options are attack vectors of the threat-centric defense? (Choose three.)
A. Linux OS
B. email
C. web
D. cloud apps
E. DNS security
F. voicemail
QUESTION 29
Which customer use case is challenged by inconsistent protection, coverage gaps, and exposing businesses
to unwanted security vulnerabilities?
A. Growing business
B. Compliance issue
C. Limited mobility
D. Vulnerable cloud
E. Small budget
Correct Answer: D
Section: (none)
QUESTION 30
Which two attack vectors are protected by identity and access control? (Choose two.)
Correct Answer: AC
Section: (none)
QUESTION 31
Which three points from the Threat-Centric module are true? (Choose three.)
A. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
B. An effective security solution can help overcome ever-growing security challenges.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Customers require inexpensive security solutions
E. Customers are searching for security answers without interrupting productivity.
F. Cisco Security provides flexible, simple, and integrated advanced threat defection, through a multilayered
approach.
QUESTION 32
Which two Cisco business values demonstrate features of end-to-end protection and protection across the
attack continuum? (Choose two.)
A. completeness
B. cost effectiveness
C. protection
D. control
E. flexibility
Correct Answer: CD
Section: (none)
QUESTION 33
Which two options are benefits of the web threat-centric solution? (Choose two.)
Correct Answer: AC
Section: (none)
QUESTION 34
Which three options are solutions and features of the data center threat-centric solution? (Choose three.)
QUESTION 35
Which three main points of the Cisco Security & Threat Landscape module are true? (Choose three.)
A. An effective security solution provides customers with the necessary tools and resources to overcome their
ever-growing security challenges.
B. The Cisco Security Solutions Portfolio drives customer business outcomes.
C. The business case for security is defined in the threat landscape.
D. The threat landscape is expanding and increasing costs for customers.
E. Customers need an easy to manage and fully integrated solution.
F. Customers must understand how vulnerable they are.
QUESTION 36
Which three options does Cisco provide to customers for visibility and control against current security threats?
(Choose three)
QUESTION 37
Which two options are features of the endpoints threat-centric solution? (Choose two.)
A. remote VPN
B. fuzzy fingerprinting
C. URL filtering
D. antivirus defense
E. web proxy
Correct Answer: BD
Section: (none)
QUESTION 38
Which three security vectors must customers monitor to overcome security challenges? (Choose three.)
A. cloud apps
B. remote and central
C. hackers device
D. campus and breach
E. malware protection
F. data center
QUESTION 39
Which three business outcomes do customers want to achieve? (Choose three.)
QUESTION 40
Why does Software Volume Purchasing streamline software strategy and asset management?
Correct Answer: B
Section: (none)
QUESTION 41
Which Cisco Security benefit is a differentiator that allows partners to plan and model their business?
Correct Answer: D
Section: (none)
QUESTION 42
Which three options are issues that nonscalability brings? (Choose three)
A. inexperienced IT staff
B. lack of intrusion prevention tools
C. no employee remote access
D. security solutions are stale
E. business growing too fast
F. outdated malware databases
QUESTION 43
Which two options are small budget customer concerns? (Choose two.)
Correct Answer: DE
Section: (none)
QUESTION 44
Which primary customer challenge is brought by the wide variety of security solution providers on the market?
Correct Answer: A
Section: (none)
QUESTION 45
Which option describes how partners can help customers using their unique relationship with Cisco award-
winning resources and support?
Correct Answer: C
Section: (none)
QUESTION 46
Which three customer use cases address the best outcome? (Choose three)
QUESTION 47
Which three options are Cisco industry differentiators? (choose three)
QUESTION 48
Which application works with customers to eliminate security gaps and ensure safe data access and storage
in the cloud across devices?
A. AnyConnect
B. Cloudlock
C. Stealthwatch
D. TrustSec
E. AMP Threat Grid
F. Next Generation Firewall
Correct Answer: C
Section: (none)
QUESTION 49
Which phase of the software lifecycle has relationship building as a critical part because it deals with
developing new licenses to meet changing customer needs?
A. extend
B. renew
C. upsell and cross sell
D. adopt
E. activate
Correct Answer: C
Section: (none)
QUESTION 50
Why do partners often have a hard time selling their new security solutions to customers?
Correct Answer: D
Section: (none)
QUESTION 51
How action do sellers help customers take during the adopt phase of the software lifecycle?
Correct Answer: D
Section: (none)
QUESTION 52
Which two options are features of Cisco Enterprise License Agreements? (Choose two.)
Correct Answer: BE
Section: (none)
QUESTION 53
Which two options are products and benefits of the mobile threat-centric solution? (Choose two)
Correct Answer: AB
Section: (none)
QUESTION 54
Which option lists business outcomes that most customers are working to achieve in response to the current
security threat landscape?
Correct Answer: D
Section: (none)
QUESTION 55
Which two options drive successful business outcomes for customers? (choose two)
A. Endpoint visibility
B. Enhanced visibility
C. Comprehensive threat protection
D. Hardend solutions
E. Firewall protection
Correct Answer: AC
Section: (none)
QUESTION 56
Which three options does Cisco provide to customers for complete protection againist current security threat?
(choose three)
A. Threat-centric defense
B. Sporadic application analysis
C. Accelerated threat identification
D. Enhanced remediation
E. Accelerated threat identification
F. Manual security intelligence updates
QUESTION 57
How does the Cisco policy and access solution handle a changing user base in growing company?
A. Cisco delivers a flexible and scalable security solution framework that can adapt to changing customer
needs
B. Cisco architecture offers the lowest TCO by providing product that integrate, which lowers the cost of IT
setup, management, and maintenance.
C Cisco Talos Security Intelligence and Research Group integrates into all security solutions, which
provides advanced protection against new threats.
C. Cisco provides you the ability to monitor and restrict application usage. As applications become more
complex, Cisco provides the flexibility to control all or subsets of the application.
Correct Answer: A
Section: (none)
QUESTION 58
Which issues are resolved with the Security Advantage programs? (Choose two)
Correct Answer: AC
Section: (none)
QUESTION 59
Which customer cost saver leverages current infrastructures without buying new appliances and avoids
lengthy customizations?
A. faster integration
B. fewer resources to manage
C. flexible licensing
D. less time scoping a breach
Correct Answer: C
Section: (none)
QUESTION 60
Which three options are main areas of the Cisco Security Portfolio? (choose three)
A. roaming security
B. ASA and NGIPS
C. advanced threat
D. web and email security
E. cloud security
F. policy and entry
QUESTION 61
Which two actions must partners do during the asset management phase of the software lifecycle? (Choose
two.)
Correct Answer: AC
Section: (none)
QUESTION 62
Which two options are Cisco policy and access solutions? (Choose two.)
Correct Answer: BF
Section: (none)
QUESTION 63
Which two benefits do partners gain when they use the software lifecycle? (Choose two.)
A. Adaptable deployment
B. Software portability
C. Improved sales performance
D. Cisco incentives
E. Increased efficiencies
F. Sales promotions
G. Customer support
Correct Answer: CE
Section: (none)
QUESTION 64
Which issue are you dealing with if a customer has different user groups that need distinct levels of access to
data?
A. limited mobility
B. growing business
C. vulnerable cloud
D. small budget
E. compliance issue
Correct Answer: E
Section: (none)
QUESTION 65
Which three features do customers get with smart license? (Choose three.)
A. PAK registration
B. company specific licensing
C. easy registration
D. manual registration
E. a complete view of software, services, and devices
F. products that have to be continually adjusted
QUESTION 66
Which two options are solutions and features of the email threat-centric solution? (Choose two.)
Correct Answer: BC
Section: (none)
QUESTION 67
Which component of Cisco Stealthwatch uses sophisticated security analytics to accelerate threat response
time?
A. network control
B. investigation
C. threat protection
D. anomaly detection
E. granular visibility
Correct Answer: B
Section: (none)
QUESTION 68
Which two attack vectors are protected by remote access VPN? (Choose two.)
Correct Answer: DE
Section: (none)
QUESTION 69
Which application works with Cisco NGFW to provide administrators powerful application and usage controls
over mobile users?
A. TrustSec
B. Cloudlock
C. Stealthwatch
D. Next Generation Firewall
E. AnyConnect
F. AMP Threat Grid
Correct Answer: D
Section: (none)
QUESTION 70
Which NGFW appliance do you use if your customer is a small business that requires multilayered protection
and task automation?
A. ASA4100 Series
B. FirePower 3100 Series
C. Cisco 4000 Series NGIPS
D. ASA5500-X with FirePOWER
E. Cisco 500 Series ISR
Correct Answer: D
Section: (none)
QUESTION 71
Which component of NGFW and NGIPS provides a unified image that includes the Cisco ASA features and
FirePOWER Services?
Correct Answer: A
Section: (none)
QUESTION 72
Which two attack vectors are protected by cloud app security? (Choose two.)
A. mobile
B. cloud apps
C. voicemail
D. email
E. campus and branch
Correct Answer: AD
Section: (none)
QUESTION 73
Which three attack vectors are protected by web security? (Choose three.)
A. voicemail
B. mobile
C. cloud apps
D. web
E. virtual machines
F. endpoints
QUESTION 74
Which three options are cloud security products? (choose three)
A. Meraki
B. Cloudlock
C. NGFW
D. Investigate
E. Web Security Appliance
F. Umbrella
QUESTION 75
Which Cisco security technology delivers the best real-time threat intelligence?
Correct Answer: A
Section: (none)
QUESTION 76
Which three issues do customers with limited mobility issues deal with? (choose three)
QUESTION 77
Which ISR appliance di you use if your customer is a small business that requires integrated switching and
routing and WAN redundancy?
Correct Answer: B
Section: (none)
QUESTION 78
Which Cisco business value is represented by features of automatic updates and post-attack guidance?
A. cost effectiveness
B. flexibility
C. protection
D. completeness
E. control
Correct Answer: C
Section: (none)
QUESTION 79
Which issue do customers with vulnerable cloud issues deal with (choose three)
QUESTION 80
Which option is the best example of how Cisco solution enable customer’s business?
Correct Answer: C
Section: (none)
QUESTION 81
Which trait of Cisco security solutions addresses the worry that a customer's security provider will leave the
market or reach end-of-life?
A. familiarity
B. functionality
C. robustness
D. cost
E. stability
Correct Answer: E
Section: (none)
QUESTION 82
Which two attack vectors are protected by email security? (Choose two.)
A. mobile
B. endpoints
C. voicemail
D. email
E. virtual machines
F. cloud apps
Correct Answer: BD
Section: (none)
QUESTION 83
Which two options are solutions and features of the web threat-centric solution? (Choose two)
A. URL filtering
B. CTA and threat defense
C. Email security
D. Identity and access control
E. Data loss prevention
Correct Answer: AE
Section: (none)
QUESTION 84
Which phase of the software lifecycle deals with anticipating customer needs and bundling and adding
products accordingly?
QUESTION 85
Which two benefit of a partner selling Cisco security solutions are true? (Choose two.)
A. Incentives programs
B. Lower total cost of ownership
C. Simplified architecture solution
D. Opportunities for new revenue
E. Partner referrals
Correct Answer: CD
Section: (none)
QUESTION 86
Which three options are products and benefits of the mobile threat-centric solution? (choose three)
A. AnyConect
B. URL filter
C. Enhanced access and usage control with ISE
D. Enforced device security policies with Meraki
E. Secure off-network connection with Stealthwatch
F. CRD and network Analytics
QUESTION 87
Which NGIPS appliance do you use if you customer is at the enterprise level and requires modular
architecture that is scalable?
Correct Answer: C
Section: (none)
QUESTION 88
Which two options are issues that customers with compliance standards issues are dealing with? (Choose
two)
A. Device incompatibility
B. Lack of access policies
C. Malware attacks
D. Email exposure
E. Inconsistent oversight
Correct Answer: AB
Section: (none)
QUESTION 89
Which three options are Cisco Advanced Threat Solutions? (Choose three.)
QUESTION 90
Which three options are solutions and features of the cloud apps threat-centric solution? (Choose three.)
QUESTION 91
Which Cisco security technology delivers the best real-time threat intelligence?
Correct Answer: B
Section: (none)
QUESTION 92
Which two options are attack vectors protected by DNS-layer security? (Choose two.)
A. voicemail
B. virtual machines
C. Linux OS
D. email
E. web
Correct Answer: DE
Section: (none)
QUESTION 93
On average, how much do network attacks cost?
A. $300K
B. $50K
C. $500k
D. $300B
Correct Answer: A
Section: (none)