You are on page 1of 19

IT Certification Guaranteed, The Easy Way!

Exam : 700-760

Title : Cisco Security Architecture for


Account Managers

Vendor : Cisco

Version : V12.75

1
IT Certification Guaranteed, The Easy Way!

NO.1 How does the Cisco policy and access solution handle a changing user base in growing
company?
A. Cisco delivers a flexible and scalable security solution framework that can adapt to changing
customer needs
B. Cisco architecture offers the lowest TCO by providing product that integrate, which lowers the
cost of IT setup, management, and maintenance.
C. Cisco Talos Security Intelligence and Research Group integrates into all security solutions, which
provides advanced protection against new threats.
D. Cisco provides you the ability to monitor and restrict application usage. As applications become
more complex, Cisco provides the flexibility to control all or subsets of the application.
Answer: A

NO.2 Which three options are products and benefits of the mobile threat-centric solution? (Choose
three)
A. AnyConect
B. URL filter
C. Enhanced access and usage control with ISE
D. Enforced device security policies with Meraki
E. Secure off-network connection with Stealthwatch
F. CRD and network Analytics
Answer: ACF

NO.3 Which three products are used to secure the cloud? (Choose three.)
A. Umbrella
B. Tetration
C. NGFW
D. ESA
E. Meraki
F. Cloudlock
Answer: ABF

NO.4 Which application works with customers to eliminate security gaps and ensure safe data access
and storage in the cloud across devices?
A. AnyConnect
B. Cloudlock
C. Stealthwatch
D. TrustSec
E. AMP Threat Grid
F. Next Generation Firewall
Answer: C

NO.5 Which two options are products and benefit of email threat-centric solution? (Choose two)
A. Meraki

2
IT Certification Guaranteed, The Easy Way!

B. Cloudlock
C. Cisco Registered Enverlope Service
D. Cisco Umbrella
E. Web Filtering
F. AMP for Endpoints
Answer: DF

NO.6 For what does ACI provide a single point of support?


A. automation
B. management
C. orchestration
D. visibility
Answer: A

NO.7 Which customer use case is challenged by inconsistent protection, coverage gaps, and
exposing businesses to unwanted security vulnerabilities?
A. Growing business
B. Compliance issue
C. Limited mobility
D. Vulnerable cloud
E. Small budget
Answer: D

NO.8 Which network security product provides a unified image on an intuitive interface?
A. Next-Generation Intrusion Prevention System
B. Advanced Malware Protection
C. Cloudlock
D. Firepower Threat Defense
Answer: B

NO.9 What are two common seller obstacles? (Choose two.)


A. Unresponsive potential customers
B. Overcrowded portfolios
C. Complexity of solution components
D. Fragmented solutions
E. Seller competition
Answer: AD

NO.10 Which option describes how partners can help customers using their unique relationship with
Cisco aswad-winning resources and support?
A. Be the first to receive new innovations
B. Take advantage of incentives programs
C. Access 24-hour support around the word

3
IT Certification Guaranteed, The Easy Way!

D. Earn higher margins on each deal sold


Answer: C

NO.11 Which two attack vectors are protected by cloud app security? (Choose two.)
A. mobile
B. cloud apps
C. voicemail
D. email
E. campus and branch
Answer: AD

NO.12 What are two steps customers can take to evolve to a trust-centric security philosophy?
(Choose two.)
A. Limit internal access to networks.
B. Require and install agents on mobile devices.
C. Always verify and never trust everything inside and outside the perimeter.
D. Block BYOD devices.
E. Only grant access to authorized users and devices.
Answer: AE

NO.13 What are two common customer obstacles? (Choose two.)


A. Lack of solution integration
B. High turnover of IT professionals
C. Compliance regulations
D. Limited resources
E. Security system blackouts
Answer: CD

NO.14 Which three options are major problems for customers growing their business? (Choose
three)
A. Inconsistent network monitoring
B. Security not extending to the cloud
C. Device incompatibility
D. No scalable solution
E. Inconsistent containment tools
F. Business growing too fast
Answer: BCD

NO.15 In which two ways should companies modernize their security philosophies? (Choose two.)
A. Reinforce their threat-centric security tactics.
B. Decrease internal access and reporting
C. Expand their IT departments.
D. Rebuild their security portfolios with new solutions

4
IT Certification Guaranteed, The Easy Way!

E. Complement threat-centric tactics with trust-centric methods.


Answer: AD

NO.16 Where do you start to achieve true network visibility?


A. Branches
B. Fabric Level
C. OT
D. IT
Answer: B

NO.17 Which two security risks are created by legacy approaches to networking? (Choose two.)
A. network downtime
B. user vulnerability
C. access points
D. slow containment
E. large attack surface
Answer: BC

NO.18 Which two attack vectors are protected by email security? (Choose two)
A. endpoints
B. virtual machines
C. email
D. mobile
E. cloud apps
F. voicemail
Answer: AC

NO.19 What are two steps organizations must take to secure loT? (Choose two.)
A. update equipment
B. block contractors
C. remediate malfunctions
D. prevent blackouts
E. acquire subscription solutions
Answer: CE

NO.20 Which two options are solutions and features of campus and branch threat-centric solution?
(Choose two)
A. Enabled and protected investment
B. File retrospection and trajectory
C. NGFW and NGIPS
D. Network analytics
E. Behavioral indication of compromise
Answer: AD

5
IT Certification Guaranteed, The Easy Way!

NO.21 Which two attack vectors are protected by NGFW? (Choose two.)
A. Web
B. Cloud
C. Mobile
D. Data Center
E. Email
Answer: CD

NO.22 Which two areas require secure access? (Choose two.)


A. Workflow
B. Workspace
C. Workforce
D. Worktable
E. Workloads
Answer: AC

NO.23 What are two ways Cisco addresses customers' growing business needs? (Choose two.)
A. Multi/hybrid cloud platforms
B. Highly-scalable DC platforms
C. Bulletproof NGFW appliances
D. Consolidated tracking and reporting
E. Multiple solution deployment choices
Answer: AB

NO.24 Which two attack vectors are protected by identity and access control? (Choose two.)
A. campus and home
B. voicemail
C. endpoints
D. data center
E. cloud apps
Answer: AC

NO.25 Which two options drive successful business outcomes for customers? (Choose two)
A. Endpoint visibility
B. Enhanced visibility
C. Comprehensive threat protection
D. Hardend solutions
E. Firewall protection
Answer: AC

NO.26 What does remote access use to verify identity?


A. MFA

6
IT Certification Guaranteed, The Easy Way!

B. Remote Access VPN


C. Agents
D. AMP for Endpoints
Answer: D

NO.27 Which two options are issues that customers with compliance standards issues are dealing
with?
(Choose two)
A. Device incompatibility
B. Lack of access policies
C. Malware attacks
D. Email exposure
E. Inconsistent oversight
Answer: AB

NO.28 Which three products are in Cisco's Web & Email Security portfolio? (Choose three.)
A. Meraki
B. ESA
C. Investigate
D. WSA
E. Umbrella
F. CES
Answer: BDF

NO.29 What are two factors that influence customer loT conversations'? (Choose two)
A. Maturity
B. Detection
C. Motivation
D. Protection
E. Prevention
Answer: CE

NO.30 Which are two reasons perimeter-based network security is no longer sufficient? (Choose
two )
A. more vulnerabilities
B. more IT professionals
C. more networks
D. more devices
E. more users
Answer: AD

NO.31 Which three options are solutions and features of the data center threat-centric solution?
(Choose three.)

7
IT Certification Guaranteed, The Easy Way!

A. constant threat protection at all levels


B. file reputation
C. enabled scalability and capability across the business
D. enhanced visibility of data, user, and device behavior
E. file trajectory
F. global threat intelligence
Answer: ACD

NO.32 Which two attack vectors are protected by Cyber Threat Defense and network analytics
(Choose two)
A. Cloud apps
B. Campus and branch
C. Email
D. Web
E. Voicemail
Answer: CD

NO.33 Which three options are Cisco industry differentiators? (Choose three)
A. uncontested threat blocking
B. unparalleled commitment to security
C. unmatched support and services
D. lowest price
E. largest selection of security solutions
F. best-in-class technologies
Answer: BCF

NO.34 Which two products empower customers to create secure next-gen networks? (Choose two.)
A. AMP
B. ISE
C. ACI
D. SD-Access
E. MFA
Answer: BC

NO.35 Which three customer use cases address the best outcome? (Choose three)
A. Propose the best scalability.
B. Offer powerful and integrated products.
C. Faster threat identification
D. Deliver flexible deployment options.
E. Enhance remediation.
F. Provide complete protection.
Answer: BDF

8
IT Certification Guaranteed, The Easy Way!

NO.36 Which three options does Cisco provide to customers for complete protection against current
security threat? (Choose three)
A. Threat-centric defense
B. Sporadic application analysis
C. Accelerated threat identification
D. Enhanced remediation
E. Accelerated threat identification
F. Manual security intelligence updates
Answer: ABC

NO.37 What are two ways that Cisco helps customers balance protection and accessibility? (Choose
two )
A. Leverage integrated tools and dynamic context to enforce policies
B. Reinforce device infrastructure with an extensive security portfolio
C. Provide vital training to ensure a skilled workforce.
D. Analyze user and device vulnerability.
E. Manage risk more effectively across the environment.
Answer: AC

NO.38 In the process of calculating the cost of recovery, which two elements will be taken into
consideration? (Choose two.)
A. number of compromised servers
B. average revenue per hour
C. time (in hours) to rebuild servers
D. server downtime (in hours)
Answer: AC

NO.39 Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. Duo
B. Identity Services Engine
C. Stealthwatch
D. Cisco Security Connector
E. AMP for Endpoints
Answer: BC
Explanation:
https://www.cisco.com/c/en_ae/products/security/portfolio.html#~stickynav=2

NO.40 Which option is the best example of how Cisco solution enable customer's business?
A. faster threat identification
B. better ability to scale and alter your environment
C. best continuous analysis
D. only comprehensive policy enforcement tool
Answer: C

9
IT Certification Guaranteed, The Easy Way!

NO.41 Which three products are Cisco Advanced Threat solutions? (Choose three.)
A. Stealthwatch
B. Web Security
C. Remote Access VPN
D. ThreatGrid
E. Advanced Malware Protection (AMP)
F. Next-Generation Firewall (NGFW)
G. Next-Generation Intrusion Prevention System (NGIPS)
Answer: ABG

NO.42 In which two ways has digitization transformed today's security threat landscape? (Choose
two.)
A. Expanding complexity
B. Growing ecosystem
C. Decreasing endpoint ecosystem
D. Decreasing 3rd party applications
E. Decreased access points
Answer: AB

NO.43 Which two attack vectors are protected by Web Security? (Choose two.)
A. Email
B. Voicemail
C. Cloud
D. Web
E. Data Center
Answer: DE

NO.44 Which three issues do customers with limited mobility issues deal with? (Choose three)
A. Remote workers that compromise security
B. Solutions that do not extend off network
C. Complex mobile management
D. Complex mobile management
E. Big data center vulnerability
F. Expensive malware attacks
Answer: ABC

NO.45 What are two of the key benefits of the Opportunity Incentive Program? (Choose two.)
A. Supports a focus on the customer lifecycle
B. Facilitates rapid quoting to decrease time to market
C. Incentivizes partner-driven opportunity creation efforts
D. Reinforces partner demand-generation capabilities
E. Strengthens customer success management

10
IT Certification Guaranteed, The Easy Way!

Answer: BD

NO.46 What are two key Cisco loT use cases? (Choose two.)
A. Mobile Utilities
B. Financial Institutions
C. Parks and Recreation
D. Industrial Security
E. Connected Health
Answer: BE

NO.47 Which ISR appliance do you use if your customer is a small business that requires integrated
switching and routing and WAN redundancy?
A. FirePower 8000 secirs
B. Cisco 4000 Series ISR
C. Cisco 800 Series ISR
D. FirePower 7000 Series
E. FirePower 2100 Series
Answer: C

NO.48 What is the primary customer challenge caused by the wide variety of security solution
providers on the market?
A. Finding a low-cost option
B. Determining the single best security product
C. Contacting all providers for information
D. Finding the right provider to offer the best value
Answer: D

NO.49 Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)
A. Mobile
B. Cloud
C. Email
D. Web
E. Endpoints
Answer: CD

NO.50 Which three options are result of utilizing a fragmented security model? (Choose three)
A. Individual components pieced together that are incompatible
B. Multiple points of access that can be exploited by cyber criminals
C. Additional fragmentation that reduces the risk from malicious files
D. Decreased network accessibility through multiple applications
E. Patchworked applications that continually increase in complex
F. Fragmented security that provides disbursed protection
Answer: ABE

11
IT Certification Guaranteed, The Easy Way!

NO.51 Which two security areas are provided by Cisco's email solutions? (Choose two.)
A. DNS-Layer Security
B. CTD & Network Analytics
C. Malware Protection
D. Identity Services
E. Cloud App Security
Answer: CD

NO.52 Which statement embodies trust-centric security?


A. Verify before granting access via MDM software
B. Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate
C. Protect users from attacks by enabling strict security policies.
D. Verify before granting access via identity-based policies for users, devices, apps. and locations
Answer: D

NO.53 Which three factors should a customer consider when choosing the ideal security solution
provider? (Choose three.)
A. Creates new market opportunities
B. Delivers excellent partner and customer support
C. Generates higher margins on each sale
D. Provides solutions at the lowest cost
E. Offers more than just niche products
F. Is committed to security
Answer: BEF

NO.54 Which two options are products in the cloud apps threat-centric solution? (Choose two.)
A. Talos
B. Stealthwatch
C. Cloudlock
D. ISE
E. Meraki
Answer: AC

NO.55 Which response is correct if a customer wants to know how the Cisco Secure Access solution
manages a changing user base in a growing company?
A. Cisco architecture offers the lowest TCO by providing products that integrate together, lowering
the cost of IT setup, management, and maintenance.
B. Cisco delivers a flexible and scalable security solution framework that can adapt to changing
customer needs.
C. Cisco Security Intelligence Operations integrate all security solutions, providing advanced
protection against new threats.
D. Cisco provides the ability to monitor and restrict application usage. As applications becomemore

12
IT Certification Guaranteed, The Easy Way!

complex. Cisco provides the flexibility to control all or subsets of the applications.
Answer: B

NO.56 Which three products are Cisco Visibility & Enforcement solutions? (Choose three.)
A. Web Security
B. AnyConnect
C. TrustSec
D. Identity Services Engine (ISE)
E. Next-Generation Firewalls (NGFW)
F. Next-Generation Intrusion Prevention System (NGIPS)
G. Advanced Malware Protection (AMP) for Endpoints
Answer: ACE

NO.57 Which two attack vectors are protected by Email Security? (Choose two.)
A. Voicemail
B. Mobile
C. Email
D. Web
E. Cloud
Answer: AC

NO.58 Which two options are solutions and features of the web threat-centric solution? (Choose
two)
A. URL filtering
B. CTA and threat defense
C. Email security
D. Identity and access control
E. Data loss prevention
Answer: AE

NO.59 What are three main areas of the Cisco Security Portfolio? (Choose three.)
A. Firewalls
B. Advanced Threat
C. Cloud Security
D. Roaming Security
E. loT Security
F. Voice & Collaboration
Answer: BCE

NO.60 Which three options are cloud security products? (Choose three)
A. Meraki
B. Cloudlock
C. NGFW

13
IT Certification Guaranteed, The Easy Way!

D. Investigate
E. Web Security Appliance
F. Umbrella
Answer: BDF

NO.61 What are two results of utilizing a fragmented security model? (Choose two.)
A. Individual components pieced together to meet requirements.
B. Decreased visibility and limited understand of security coverage.
C. Reduced malicious file risk through additional segmentation.
D. Decreased network accessibility through multiple applications.
E. Increased identity controls.
Answer: AE

NO.62 Which two options are small budget customer concerns? (Choose two.)
A. Products are not packaged together.
B. Too many security vendors to manage.
C. Licenses are too cheap.
D. Security budget has been shrinking
E. Multiple devices are leaving a gap in security.
Answer: DE

NO.63 In which two ways does Cisco address resource constraints for customers? (Choose two.)
A. Extended datacenter support
B. loT device hardware upgrades
C. Environment control via URL filtering and AVC
D. Enable many features via one appliance
E. Consolidated training
Answer: BE

NO.64 Which issues are resolved with the Security Advantage programs? (Choose two)
A. Have a defined consumption level
B. Have undefined security spend
C. Have an end-of-year budget
D. Require customized investments
E. Need an unlimited consumption model
Answer: AC

NO.65 Which customer use case is challenged by device incompatibility, OS diversity, and a
multitude of third-party application?
A. Compliance issue
B. Growing business
C. Vulnerable cloud
D. Small budget

14
IT Certification Guaranteed, The Easy Way!

E. Limited mobility
Answer: A

NO.66 Which component of AMP provides the details customers need to address problems after a
breach is identified?
A. Rapid remediation
B. Filesandboxmg
C. Continuous analysis
D. Context awareness
Answer: A

NO.67 Which three options are main areas of the Cisco Security Portfolio? (Choose three)
A. roaming security
B. ASA and NGIPS
C. advanced threat
D. web and email security
E. cloud security
F. policy and entry
Answer: CDE

NO.68 Which two options are features of the endpoints threat-centric solution? (Choose two.)
A. remote VPN
B. fuzzy fingerprinting
C. URL filtering
D. antivirus defense
E. web proxy
Answer: BD

NO.69 How can partners leverage Cisco's award-winning resources and support to help customers?
A. Access support, services, and resources whenever needed.
B. Be the first to receive new innovations.
C. Take advantage of incentives programs.
D. Earn higher margins on each deal sold.
Answer: B

NO.70 What is used to reduce attack surfaces?


A. Access
B. Remediation
C. Segmentation
D. Device trust
Answer: B

NO.71 Which two elements does Tetration provide for security posture and traffic analysis? (Choose

15
IT Certification Guaranteed, The Easy Way!

two.)
A. Device updates
B. App process information
C. App access control
D. App dependency map
E. Hardware packages
Answer: D

NO.72 Which component of StealthWatch uses sophisticated security analytics to accelerate threat
response times?
A. Network control
B. Investigation
C. Anomaly detection
D. Threat protection
Answer: B

NO.73 What are two ways Cisco helps customers navigate compliance issues? (Choose two.)
A. Providing identity verification
B. Securing email communications
C. Ensuring all employees have access to all files
D. Removing reporting requirements
E. Removing bureaucratic security tags
Answer: AC

NO.74 Which two benefits of streamlined management does Cisco provide? (Choose two.)
A. Unified management across multiple services
B. Siloed systems
C. Consolidated security monitoring
D. Centralized management
E. Device access control
Answer: BE

NO.75 On average, how much do network attacks cost?


A. $300K
B. $50K
C. $500k
D. $300B
Answer: A

NO.76 Which two benefits of flexible purchasing does Cisco provide? (Choose two.)
A. Simplify the datacenter
B. Meet immediate needs
C. Roll out more solutions

16
IT Certification Guaranteed, The Easy Way!

D. Plan for the future


E. Reduce training needs
Answer: AE

NO.77 Which two attack vectors are protected by Remote Access VPN? (Choose two.)
A. Cloud
B. Campus & Branch
C. Voicemail
D. Mobile
E. Email
Answer: DE

NO.78 Which three attack vectors are protected by web security? Choose three.
A. Mobile
B. Voicemail
C. Virtual machines
D. Web
E. Endpoint
F. Cloud apps
Answer: ADE

NO.79 Which NGFW appliance do you use if your customer is a small business that requires
multilayered protection and task automation?
A. ASA4100 Series
B. FirePower 3100 Series
C. Cisco 4000 Series NGIPS
D. ASA5500-X with FirePOWER
E. Cisco 500 Series ISR
Answer: D

NO.80 Which two types of recurring revenue sales does Cisco offer? (Choose two.)
A. Platform subscription sale
B. License sale
C. Portfolio
D. Subscription sale
E. Training
Answer: BD

NO.81 Which two attack vectors are protected by remote access VPN? (Choose two.)
A. campus and branch
B. voicemail
C. cloud apps
D. email

17
IT Certification Guaranteed, The Easy Way!

E. mobile
Answer: DE

NO.82 Which two products are involved in granting safe access to apps? (Choose two.)
A. ACI
B. Identify Services Engine
C. TrustSec
D. Duo
E. SD-Access
Answer: CE

NO.83 Which issue do customers with vulnerable cloud issues deal with? (Choose three)
A. invisible employee apps usage
B. appropriate level of access
C. solution that does not extend to cloud
D. lack of protection from cloud apps
E. complex mobile management
F. expensive malware attacks
Answer: ACD

NO.84 Which two security areas are part of Cisco's web solutions? (Choose two.)
A. URL Filtering
B. Web Security
C. Email Security
D. Identity & Access Control
E. Malware Protection
Answer: DE

NO.85 Which attribute does Cisco Talos possess?


A. ability to detect threats across all layers of defense
B. third-party applications integrated through comprehensive APIs
C. real-time threat intelligence
D. detection of threats communicated within 24 hours of occurrence
E. blocks threats in real time
Answer: C

NO.86 Which two options are products and benefits of the mobile threat-centric solution? (Choose
two)
A. enforced device security policies with Meraki
B. enhanced control access with ISE and Cloudlock
C. device phishing protection through AMP
D. automated policy enforcement with ASAv
E. software-defined segmentation through TrustSec

18
IT Certification Guaranteed, The Easy Way!

Answer: AB

NO.87 Which two products are involved in discovering, classifying, and verifying profiles? (Choose
two.)
A. Advanced Malware Protection
B. Identity Services Engine
C. Industrial Network Director
D. Cisco Security Connector
E. Duo
Answer: AD

NO.88 Which two Cisco business values demonstrate features of end-to-end protection and
protection across the attack continuum? (Choose two.)
A. completeness
B. cost effectiveness
C. protection
D. control
E. flexibility
Answer: CD

NO.89 Which two attack vectors are protected by Next-Generation Intrusion Prevention System
(NGIPS)? (Choose two)
A. Cloud
B. Data Center
C. Corporate WAN
D. Endpoints
E. Email
Answer: CE

NO.90 What is an attribute of Cisco Talos?


A. Detection of threats communicated within 48 hours of occurrence
B. Blocks threats in real time
C. Real-time threat information
D. 3rd party applications integrated through comprehensive APIs
Answer: C

19

You might also like