Professional Documents
Culture Documents
Question #:1
A. Netflow analytics
C. Forensic investigation
D. FlowCollector
Answer: A
Question #:2
A. Reduced complexity
D. Higher value
Answer: B
Question #:3
Answer: A
Question #:4
1 of 28
Cisco - 700-765
B. Real-time sandboxing
E. URL filtering
Answer: A B
Question #:5
What are two key Cisco loT use cases? (Choose two.)
A. Financial Institutions
B. Mobile Utilities
C. Industrial Security
E. Connected Health
Answer: C E
Question #:6
What are three security blind spots that must be addressed? (Choose three.)
A. IT
B. Workloads
C. Applications
D. Networks
E. Email
F. Data
Answer: C D F
2 of 28
Cisco - 700-765
Question #:7
What are two solutions for Cisco Cloud Security? (Choose two.)
B. cloud-delivered security
D. intrusion prevention
E. cloud security
Answer: B E
Question #:8
A. Mobile
B. Data Center
C. Email
D. Web
E. Cloud
Answer: B D
Question #:9
Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)
D. Duo
E.
3 of 28
Cisco - 700-765
Answer: A D
Question #:10
What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?
A. Hackers vs safety
C. Security vs availability
Answer: A
Question #:11
B. Retrospective security
Answer: D
Question #:12
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
A. pxGrid
C. Duo
D. Stealthwatch
4 of 28
Cisco - 700-765
Answer: A E
Question #:13
Which three customer business objectives does Cisco's Advanced Threat solutions address? (Choose three.)
Answer: D E
Question #:14
Which two attack vectors are protected by Cloud Security? (Choose two.)
A. Endpoints
B. Web
C. Data Center
D. Cloud
E. Email
Answer: A E
Question #:15
C.
5 of 28
Cisco - 700-765
D. Supports pxGrid
Answer: A
Question #:16
D. File Reputation
Answer: A
Question #:17
Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to
onboard it quickly and easily?
C. Context-aware access
D. Device profiling
Answer: C
Question #:18
C. Device profiling and onboarding, enabling businesses to control company role policies across all
network services 1
6 of 28
Cisco - 700-765
D. Dynamic role-based access control that enables them to enforce business role policies across all network
services
Answer: D
Question #:19
A. Workforce
B. Workflow
C. Workspace
D. Worktable
E. Workloads
Answer: B E
Question #:20
Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)
A. Network Analytics
B. Mobile Access
Answer: C D
Question #:21
What are two steps organizations must take to secure loT? (Choose two )
A. prevent blackouts
B. update equipment
7 of 28
Cisco - 700-765
D. block contractors
E. remediate malfunctions
Answer: C E
Question #:22
Which two loT environment layers are protected by Stealthwatch? (Choose two.)
A. Things
B. Endpoints
C. Internet/Cloud
D. Access Points
E. Control Layer
Answer: A D
Question #:23
What are two solutions Cisco offers for web security? (Choose two.)
A. CRES
B. NGFW
C. Cloudlock
E. Cognitive Intelligence
Answer: D E
Question #:24
What are two solutions Cisco offers for email security? (Choose two.)
A. Cloudlock
8 of 28
Cisco - 700-765
C. Umbrella
D. Meraki
E. Tetration
Answer: A C
Question #:25
Which Cisco NGIPS capability provides control over users, applications. devices, threats, and provides
insights to network vulnerabilities?
C. contextual awareness
D. security automation
Answer: B
Question #:26
A. MFA
B. Agents
Answer: C
Question #:27
What two areas present a security challenge for customers? (Choose two.)
A. IT departments
B. OT environments
9 of 28
Cisco - 700-765
C. Corporate priorities
D. loT devices
E. Email
Answer: D E
Question #:28
A. Remediation
B. Access
C. Segmentation
D. Device trust
Answer: A
Question #:29
Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover
potential behavior anomalies?
Answer: B
Question #:30
Which two loT environment layers are protected by ISE? (Choose two )
A. Access Points
B. Endpoints
C.
10 of 28
Cisco - 700-765
C. Internet/Cloud
D. Control Layer
E. Things
Answer: A C
Question #:31
Which two attack vectors are protected by Web Security? (Choose two.)
A. Data Center
B. Email
C. Voicemail
D. Cloud
E. Web
Answer: A E
Question #:32
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
Answer: A B
Question #:33
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
11 of 28
Cisco - 700-765
Answer: D
Question #:34
Which feature of AnyConnect provides better access security across wired and wireless connections with
802.1X?
Answer: D
Question #:35
What are three main areas of the Cisco Security Portfolio? (Choose three )
A. Roaming Security
B. Advanced Threat
C. Cloud Security
D. D. loT Security
F. Firewalls
Answer: B C D
Question #:36
How do AMP's device trajectory capabilities help address customers' breach remediation issues?
12 of 28
Cisco - 700-765
A. It tracks file behavior across the network to see which devices it enters and exits
B. It analyzes the data from suspicious files to provide a new level of threat intelligence
D. It determines the scope and cause of an outbreak and tracks suspicious files
Answer: A
Question #:37
Answer: D
Question #:38
A. OT
B. Branches
C. IT
D. Fabric Level
Answer: D
Question #:39
What are two result of utilizing a fragmented security model? (Choose two.)
13 of 28
Cisco - 700-765
Answer: D E
Question #:40
Which two loT environment layers are protected by AMP for Endpoints? (Choose two.)
A. Internet/Cloud
B. Control Layer
C. Data Center
D. Access Points
E. Things
Answer: B D
Question #:41
B. Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.
C. Verify before granting access via identity-based policies for users, devices, apps, and locations.
Answer: B
Question #:42
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
A. Cloud
B.
14 of 28
Cisco - 700-765
B. Email
C. Endpoints
D. Web
E. Data Center
Answer: B E
Question #:43
Which feature of ISE provides role-based access control and command level authorization with logging for
auditing?
B. TACACS+Device Administration
C. Context-aware access
Answer: B
Question #:44
A. Guest Management
C. Network visibility
E. Device Firewalling
Answer: B D
Question #:45
How does AnyConnect provide highly secure access for select enterprise mobile apps?
A.
15 of 28
Cisco - 700-765
Answer: C
Question #:46
A. Limited resources
D. Compliance regulations
Answer: C D
Question #:47
Which two features are part of Cisco Web security? (Choose two.)
A. intrusion prevention
B. user authentication
Answer: A D
Question #:48
On average, how many days elapse before businesses discover that they have been hacked?
16 of 28
Cisco - 700-765
A. 70
B. 50
C. 10
D. 30
Answer: C
Question #:49
Which two products empower customers to create secure next-gen networks? (Choose two.)
A. ISE
B. AMP
C. MFA
D. ACI
E. SD-Access
Answer: A E
Question #:50
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
D. Always verify and never trust everything inside and outside the perimeter.
Answer: B E
Question #:51
17 of 28
Cisco - 700-765
Which two Cisco products help manage data access policy consistently? (Choose two.)
A. Duo
B. Cloudlock
C. AMPforEndpoints
D. pxGrid
E. Steathwatch
Answer: B D
Question #:52
A. Management
B. Analyzation
C. Segmentation
D. Automation
Answer: C
Question #:53
Which two security risks are created by legacy approaches to networking'? (Choose two.)
A. slow containment
B. user vulnerability
D. network downtime
E. access points
Answer: C D
Question #:54
18 of 28
Cisco - 700-765
Answer: C
Question #:55
What is one of the reasons that customers need a Visibility & Enforcement solution?
Answer: B
Question #:56
Which two elements does Advanced Malware Protection provide? (Choose two.)
B. advanced analytics
D. intrusion analysis
E. reputation analytics
Answer: B C
Question #:57
19 of 28
Cisco - 700-765
A. Orchestration
B. Automation
C. Access
D. Threat protection
E. Visibility
Answer: A C
Question #:58
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to
achieve pervasive and consistent enforcement?
Answer: A
Question #:59
What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness
scores in third-party testing?
A. 99 2%
B. 956%
C. 100%
D. 98 5%
Answer: A
Explanation
https://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html
20 of 28
Cisco - 700-765
Question #:60
Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)
A. Cloud
B. Mobile
C. Endpoints
D. Email
E. Web
Answer: A E
Question #:61
D. Securing endpoints
Answer: A B
Question #:62
Answer: D
21 of 28
Cisco - 700-765
Question #:63
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)
A. network analysis
D. cross-architecture automation
Answer: C E
Question #:64
A. Endpoints
B. Mobile
C. Cloud
D. Web
E. Data center
Answer: D E
Question #:65
Which two attack vectors are protected by Malware Protection? (Choose two.)
A. Voicemail
B. Email
C. Web
D. Mobile
E. Data Center
22 of 28
Cisco - 700-765
Answer: B D
Question #:66
Which two products are involved in granting safe access to apps? (Choose two.)
A. SD-Access
B. Duo
C. TrustSec
D. ACI
E. ISE
Answer: A C
Question #:67
A. Reduces throughput
B. Prepares defenses
C. Reduces complexity
Answer: B C E
Question #:68
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)
A. Malware scanning
B. Off-network security
C. Predictive intelligence
23 of 28
Cisco - 700-765
D. Breach mitigation
E. Reputation filtering
F. Recursive DNS
Answer: A E F
Question #:69
Answer: D
Question #:70
B. Malware clustering
C. Netflow monitoring
E. Real-time sandboxing
F. Forensic investigation
Answer: B D
Question #:71
In which two ways should companies modernize their security philosophies? (Choose two.)
A.
24 of 28
Cisco - 700-765
Answer: A C
Question #:72
B. security automation
C. contextual awareness
D. device profiling
Answer: A D
Question #:73
What are three main solutions areas for Advanced Threat? (Choose three.)
A. Network Analytics
B. Threat Analytics
C. Threat Defense
D. Malware Protection
E. NGFW
F. Intrusion Analytics
Answer: A C
25 of 28
Cisco - 700-765
Question #:74
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
A. More users
B. More devices
C. More IT professionals
D. More networks
E. More vulnerabilities
Answer: B E
Question #:75
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
A. Event classification
B. Anomaly detection
C. Anomaly modeling
D. Trust modeling
Answer: B
Question #:76
What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)
A. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a
multilayered approach.
B. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business
outcomes.
C. The Cisco Security Portfolio provides security across the entire business environment.
D. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.
E. An effective security solution portfolio can help customers overcome ever-growing security challenges.
26 of 28
Cisco - 700-765
Answer: A B
Question #:77
What are two features of Advanced Malware Protection (AMP)? (Choose two )
Answer: B C
Question #:78
What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the
tag in the infrastructure?
A. Ingress VLAN
C. VXLAN
Answer: B
Question #:79
In which two ways has digitization transformed today's security threat landscape'? (Choose two.)
B. Expanding complexity
C. Growing ecosystem
27 of 28
Cisco - 700-765
Answer: A B
Question #:80
B. Overcrowded portfolios
D. Seller competition
E. Fragmented solutions
Answer: A C
28 of 28