You are on page 1of 28

Cisco - 700-765

Question #:1

Which feature of StealthWatch aggregates and normalizes NetFlow data?

A. Netflow analytics

B. Advanced malware protection

C. Forensic investigation

D. FlowCollector

Answer: A

Question #:2

What does Cisco provide via Firepower's simplified, consistent management?

A. Reduced complexity

B. Improved speed to security

C. Reduced down time

D. Higher value

Answer: B

Question #:3

What is an attribute of Cisco Talos?

A. Real-time threat information

B. 3rd party applications integrated through comprehensive APIs

C. Blocks threats in real time

D. Detection of threats communicated within 48 hours of occurrence

Answer: A

Question #:4

1 of 28
Cisco - 700-765

What are two core functionalities of DNS-layer security? (Choose two.)

A. Live threat intelligence

B. Real-time sandboxing

C. Proxy and file inspection

D. Data analytics and monitoring

E. URL filtering

Answer: A B

Question #:5

What are two key Cisco loT use cases? (Choose two.)

A. Financial Institutions

B. Mobile Utilities

C. Industrial Security

D. Parks and Recreation

E. Connected Health

Answer: C E

Question #:6

What are three security blind spots that must be addressed? (Choose three.)

A. IT

B. Workloads

C. Applications

D. Networks

E. Email

F. Data

Answer: C D F

2 of 28
Cisco - 700-765

Question #:7

What are two solutions for Cisco Cloud Security? (Choose two.)

A. cloud data security

B. cloud-delivered security

C. advanced network security

D. intrusion prevention

E. cloud security

Answer: B E

Question #:8

Which two attack vectors are protected by NGFW? (Choose two.)

A. Mobile

B. Data Center

C. Email

D. Web

E. Cloud

Answer: B D

Question #:9

Which two products are involved in discovering, classifying, and verifying profiles? (Choose two.)

A. Cisco Security Connector

B. Identity Services Engine

C. Industrial Network Director

D. Duo

E.

3 of 28
Cisco - 700-765

E. Advanced Malware Protection

Answer: A D

Question #:10

What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?

A. Hackers vs safety

B. Malfunctions vs. output

C. Security vs availability

D. Innovation vs. manufacturing

Answer: A

Question #:11

What is a key feature of Application Visibility and Control?

A. Automated remediation APIs

B. Retrospective security

C. Scalable policy inheritance

D. Control of protocol-hopping apps that evade traditional firewalls

Answer: D

Question #:12

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

A. pxGrid

B. Cisco Security Connector

C. Duo

D. Stealthwatch

E. AMP for Endpoints

4 of 28
Cisco - 700-765

Answer: A E

Question #:13

Which three customer business objectives does Cisco's Advanced Threat solutions address? (Choose three.)

A. Accelerated firewall implementation

B. Lower TCO through intelligent API management

C. Complete protection with holistic defense

D. Visibility and control with a managed environment

E. Comprehensive support with flexible solutions

F. Secure communications with advanced access

Answer: D E

Question #:14

Which two attack vectors are protected by Cloud Security? (Choose two.)

A. Endpoints

B. Web

C. Data Center

D. Cloud

E. Email

Answer: A E

Question #:15

What is a key feature of Duo?

A. Provides SSL VPN

B. Authenticates user identity for remote access

C.

5 of 28
Cisco - 700-765

C. Automates policy creation for IT staff

D. Supports pxGrid

Answer: A

Question #:16

What is a continuous protection feature of Advanced Malware Protection?

A. Behavioral Indicators of Compromise

B. Sandboxing File Analysis

C. Global Threat Intelligence

D. File Reputation

Answer: A

Question #:17

Which feature of ISE has the capability to encounter a device new on the market, and correctly profile it to
onboard it quickly and easily?

A. Centralized policy management

B. Platform exchange grid

C. Context-aware access

D. Device profiling

Answer: C

Question #:18

What do customers receive when implementing TrustSec?

A. SL decryption enabling secure communications on and off company networks

B. Context-aware access enhancing the forensic capabilities available to their IT team

C. Device profiling and onboarding, enabling businesses to control company role policies across all
network services 1

6 of 28
Cisco - 700-765

D. Dynamic role-based access control that enables them to enforce business role policies across all network
services

Answer: D

Question #:19

Which two areas require secure access? (Choose two.)

A. Workforce

B. Workflow

C. Workspace

D. Worktable

E. Workloads

Answer: B E

Question #:20

Which two security areas are part of Cisco's campus & branch solutions? (Choose two.)

A. Network Analytics

B. Mobile Access

C. Behavioral Indication of Compromise

D. Remote Access VPN

E. File Retrospection and Trajectory

Answer: C D

Question #:21

What are two steps organizations must take to secure loT? (Choose two )

A. prevent blackouts

B. update equipment

7 of 28
Cisco - 700-765

C. acquire subscription solutions

D. block contractors

E. remediate malfunctions

Answer: C E

Question #:22

Which two loT environment layers are protected by Stealthwatch? (Choose two.)

A. Things

B. Endpoints

C. Internet/Cloud

D. Access Points

E. Control Layer

Answer: A D

Question #:23

What are two solutions Cisco offers for web security? (Choose two.)

A. CRES

B. NGFW

C. Cloudlock

D. AMP for Web Security

E. Cognitive Intelligence

Answer: D E

Question #:24

What are two solutions Cisco offers for email security? (Choose two.)

A. Cloudlock

8 of 28
Cisco - 700-765

B. AMP for Email Security

C. Umbrella

D. Meraki

E. Tetration

Answer: A C

Question #:25

Which Cisco NGIPS capability provides control over users, applications. devices, threats, and provides
insights to network vulnerabilities?

A. global threat intelligence

B. advanced threat protection and rapid remediation

C. contextual awareness

D. security automation

Answer: B

Question #:26

What does remote access use to verify identity?

A. MFA

B. Agents

C. Remote Access VPN

D. AMP for Endpoints

Answer: C

Question #:27

What two areas present a security challenge for customers? (Choose two.)

A. IT departments

B. OT environments

9 of 28
Cisco - 700-765

C. Corporate priorities

D. loT devices

E. Email

Answer: D E

Question #:28

What is used to reduce attack surfaces?

A. Remediation

B. Access

C. Segmentation

D. Device trust

Answer: A

Question #:29

Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover
potential behavior anomalies?

A. Network Visibility Module

B. Trusted Network Detection

C. Differentiated Mobile Access

D. Secure Layer 2 Network Access

Answer: B

Question #:30

Which two loT environment layers are protected by ISE? (Choose two )

A. Access Points

B. Endpoints

C.

10 of 28
Cisco - 700-765

C. Internet/Cloud

D. Control Layer

E. Things

Answer: A C

Question #:31

Which two attack vectors are protected by Web Security? (Choose two.)

A. Data Center

B. Email

C. Voicemail

D. Cloud

E. Web

Answer: A E

Question #:32

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)

A. security enforced at the DNS layer

B. access to multiple data layers

C. access to Trojan downloader

D. see and share malware details

E. threats stopped from getting in and spreading

Answer: A B

Question #:33

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

A. Flexible AAA Options

11 of 28
Cisco - 700-765

B. Identity Services Engine

C. Differentiated Mobile Access

D. High throughput maintained while still protecting domains against threats

Answer: D

Question #:34

Which feature of AnyConnect provides better access security across wired and wireless connections with
802.1X?

A. Trusted Network Detection

B. Secure Layer 2 Network Access

C. Flexible AAA Options

D. AnyConnect with AMP

Answer: D

Question #:35

What are three main areas of the Cisco Security Portfolio? (Choose three )

A. Roaming Security

B. Advanced Threat

C. Cloud Security

D. D. loT Security

E. Voice & Collaboration

F. Firewalls

Answer: B C D

Question #:36

How do AMP's device trajectory capabilities help address customers' breach remediation issues?

12 of 28
Cisco - 700-765

A. It tracks file behavior across the network to see which devices it enters and exits

B. It analyzes the data from suspicious files to provide a new level of threat intelligence

C. It searches for potential threats based on identified activities and behaviors

D. It determines the scope and cause of an outbreak and tracks suspicious files

Answer: A

Question #:37

What does ThreatGrid integrate?

A. File trajectory and time signatures

B. Threat intelligence and access control

C. File reputation and behavioral indications of compromise

D. Malware analysis and threat intelligence

Answer: D

Question #:38

Where do you start to achieve true network visibility?

A. OT

B. Branches

C. IT

D. Fabric Level

Answer: D

Question #:39

What are two result of utilizing a fragmented security model? (Choose two.)

A. Individual components pieced together to meet requirements.

B. Increased identity controls.

13 of 28
Cisco - 700-765

C. Reduced malicious file risk through additional segmentation.

D. Decreased network accessibility through multiple applications

E. Decreased visibility and limited understand of security coverage.

Answer: D E

Question #:40

Which two loT environment layers are protected by AMP for Endpoints? (Choose two.)

A. Internet/Cloud

B. Control Layer

C. Data Center

D. Access Points

E. Things

Answer: B D

Question #:41

Which statement best embodies trust-centric security?

A. Protect users from attacks by enabling strict security policies.

B. Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.

C. Verify before granting access via identity-based policies for users, devices, apps, and locations.

D. Verify before granting access via MDM software.

Answer: B

Question #:42

Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)

A. Cloud

B.

14 of 28
Cisco - 700-765

B. Email

C. Endpoints

D. Web

E. Data Center

Answer: B E

Question #:43

Which feature of ISE provides role-based access control and command level authorization with logging for
auditing?

A. Platform exchange grid

B. TACACS+Device Administration

C. Context-aware access

D. Centralized policy management

Answer: B

Question #:44

What are two features provided by ISE? (Choose two.)

A. Guest Management

B. DDOS attack prevention

C. Network visibility

D. Centralized policy management

E. Device Firewalling

Answer: B D

Question #:45

How does AnyConnect provide highly secure access for select enterprise mobile apps?

A.

15 of 28
Cisco - 700-765

A. Application Visibility & control

B. Secure Layer 2 Network Access

C. Identity Service Engine

D. Per application VPN

Answer: C

Question #:46

What are two common customer obstacles? (Choose two.)

A. Limited resources

B. Lack of solution integration

C. Security system blackouts

D. Compliance regulations

E. High turnover of IT professionals

Answer: C D

Question #:47

Which two features are part of Cisco Web security? (Choose two.)

A. intrusion prevention

B. user authentication

C. user identity tracking

D. URL filtering & dynamic content analysis

E. device profiling and onboarding

Answer: A D

Question #:48

On average, how many days elapse before businesses discover that they have been hacked?

16 of 28
Cisco - 700-765

A. 70

B. 50

C. 10

D. 30

Answer: C

Question #:49

Which two products empower customers to create secure next-gen networks? (Choose two.)

A. ISE

B. AMP

C. MFA

D. ACI

E. SD-Access

Answer: A E

Question #:50

What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)

A. Require and install agents on mobile devices.

B. Block BYOD devices.

C. Limit internal access to networks

D. Always verify and never trust everything inside and outside the perimeter.

E. Only grant access to authorized users and devices.

Answer: B E

Question #:51

17 of 28
Cisco - 700-765

Which two Cisco products help manage data access policy consistently? (Choose two.)

A. Duo

B. Cloudlock

C. AMPforEndpoints

D. pxGrid

E. Steathwatch

Answer: B D

Question #:52

How does SD-WAN protect network traffic from end-to-end'?

A. Management

B. Analyzation

C. Segmentation

D. Automation

Answer: C

Question #:53

Which two security risks are created by legacy approaches to networking'? (Choose two.)

A. slow containment

B. user vulnerability

C. large attack surface

D. network downtime

E. access points

Answer: C D

Question #:54

18 of 28
Cisco - 700-765

How does AMP's file reputation feature help customers?

A. It increases the protection to systems with exact fingerprinting

B. It increases the accuracy of threat detection with Big Data analytics

C. It enables point in time detection through a one-to-one engine

D. It enables secure web browsing with cognitive threat analytics

Answer: C

Question #:55

What is one of the reasons that customers need a Visibility & Enforcement solution?

A. Businesses can't see or protect devices on their network

B. Network traffic is growing at an exponential rate

C. Storage is moving from on-premises to cloud-based

D. Organizations need the ability to block high-risk websites

Answer: B

Question #:56

Which two elements does Advanced Malware Protection provide? (Choose two.)

A. dynamic URL filtering

B. advanced analytics

C. dynamic data analysis

D. intrusion analysis

E. reputation analytics

Answer: B C

Question #:57

What are two critical networking challenges? (Choose two.)

19 of 28
Cisco - 700-765

A. Orchestration

B. Automation

C. Access

D. Threat protection

E. Visibility

Answer: A C

Question #:58

What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to
achieve pervasive and consistent enforcement?

A. Context telemetry, and profiling sources

B. intelligence sources, telemetry, and shared intelligence

C. Telemetry, shared intelligence, and profiling sources

D. Context, telemetry and intelligence sources

Answer: A

Question #:59

What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness
scores in third-party testing?

A. 99 2%

B. 956%

C. 100%

D. 98 5%

Answer: A

Explanation
https://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html

20 of 28
Cisco - 700-765

Question #:60

Which two attack vectors are protected by Visibility and Enforcement? (Choose two.)

A. Cloud

B. Mobile

C. Endpoints

D. Email

E. Web

Answer: A E

Question #:61

What are two tenants of establishing an SD-perimeter? (Choose two.)

A. Securing device access

B. Securing app access

C. Securing user-device trust

D. Securing endpoints

E. Securing network access

Answer: A B

Question #:62

What are the main features of Umbrella for Cloud-Delivered Security?

A. Protects users against DDOS attacks

B. Blocks malware, C2 callbacks & phishing over any port/protocol

C. Runs suspicious cloud applications in a sandbox environment

D. Handles 130B+ DNS requests daily with 99% uptime

Answer: D

21 of 28
Cisco - 700-765

Question #:63

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)

A. network analysis

B. secure remote access

C. segmentation & visibility

D. cross-architecture automation

E. limited access points

Answer: C E

Question #:64

Which two attack vectors are protected by MFA? (Choose two.)

A. Endpoints

B. Mobile

C. Cloud

D. Web

E. Data center

Answer: D E

Question #:65

Which two attack vectors are protected by Malware Protection? (Choose two.)

A. Voicemail

B. Email

C. Web

D. Mobile

E. Data Center

22 of 28
Cisco - 700-765

Answer: B D

Question #:66

Which two products are involved in granting safe access to apps? (Choose two.)

A. SD-Access

B. Duo

C. TrustSec

D. ACI

E. ISE

Answer: A C

Question #:67

What are three key benefits of Cisco NGFW? (Choose three.)

A. Reduces throughput

B. Prepares defenses

C. Reduces complexity

D. Identifies anomalous traffic

E. Detects and remediates threats faster

F. Increases traffic latency

Answer: B C E

Question #:68

What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)

A. Malware scanning

B. Off-network security

C. Predictive intelligence

23 of 28
Cisco - 700-765

D. Breach mitigation

E. Reputation filtering

F. Recursive DNS

Answer: A E F

Question #:69

What is one of the key features of Cognitive Intelligence?

A. It enables safe email usage with event analytics

B. It enhances anonymity with URL filtering

C. Allows visibility into anonymous and encrypted communications

D. It enables greater threat intelligence with entity modeling

Answer: D

Question #:70

What are three major features of StealthWatch? (Choose three )

A. Threat-based anomaly detection

B. Malware clustering

C. Netflow monitoring

D. Data Loss Prevention

E. Real-time sandboxing

F. Forensic investigation

Answer: B D

Question #:71

In which two ways should companies modernize their security philosophies? (Choose two.)

A.

24 of 28
Cisco - 700-765

A. Expand their IT departments

B. Decrease internal access and reporting

C. Complement threat-centric tactics with trust-centric methods

D. Reinforce their threat-centric security tactics

E. Rebuild their security portfolios with new solutions

Answer: A C

Question #:72

What are two key capabilities of Meraki? (Choose two.)

A. application visibility and control

B. security automation

C. contextual awareness

D. device profiling

E. identity-based and device-aware security

Answer: A D

Question #:73

What are three main solutions areas for Advanced Threat? (Choose three.)

A. Network Analytics

B. Threat Analytics

C. Threat Defense

D. Malware Protection

E. NGFW

F. Intrusion Analytics

Answer: A C

25 of 28
Cisco - 700-765

Question #:74

What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)

A. More users

B. More devices

C. More IT professionals

D. More networks

E. More vulnerabilities

Answer: B E

Question #:75

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?

A. Event classification

B. Anomaly detection

C. Anomaly modeling

D. Trust modeling

Answer: B

Question #:76

What are two key advantages of Cisco's Security Solutions Portfolio? (Choose two.)

A. Cisco Security provides flexible, simple, and integrated advanced threat detection, through a
multilayered approach.

B. The Cisco Security Portfolio offers realtime access control and event monitoring to drive business
outcomes.

C. The Cisco Security Portfolio provides security across the entire business environment.

D. Cisco Security provides direct, simple, and balanced detection by driving customer outcomes.

E. An effective security solution portfolio can help customers overcome ever-growing security challenges.

26 of 28
Cisco - 700-765

Answer: A B

Question #:77

What are two features of Advanced Malware Protection (AMP)? (Choose two )

A. Local Threat Intelligence

B. Automatic Behavioral Authorization

C. File Retrospection and Trajectory

D. Dynamic Malware Analysis

E. Automated Policy Management

Answer: B C

Question #:78

What does TrustSec assign to the user or device traffic at ingress that enforces the access policy based on the
tag in the infrastructure?

A. Ingress VLAN

B. Security Group Tag

C. VXLAN

D. Access Control List

Answer: B

Question #:79

In which two ways has digitization transformed today's security threat landscape'? (Choose two.)

A. Decreasing 3rd party applications

B. Expanding complexity

C. Growing ecosystem

D. Decreasing endpoint ecosystem

E. Increasing access points

27 of 28
Cisco - 700-765

Answer: A B

Question #:80

What are two common seller obstacles? (Choose two.)

A. Unresponsive potential customers

B. Overcrowded portfolios

C. Complexity of solution components

D. Seller competition

E. Fragmented solutions

Answer: A C

28 of 28

You might also like