Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Number: 500-651
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
Vendor: Cisco
Innovior ITTech
Q&A
(61 Questions)
http://www.facebook.com/InnoviorITTech
A. Umbrella
B. ASAv
C. Meraki MX
D. Cloudlock
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
Which feature of Cisco AnyConnect allows pre-login authentication using windows machines, or single sign-on
user authentication using Windows logon credentials?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
Which Stealthwatch component is a physical or virtual appliance that aggrages and normalizes NetFlow data?
A. Investigate
B. Stealthwatch Management Center
C. Flow Collector
D. UOP Director
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
Which is a main element of FirePOWER Device Manager?
Explanation/Reference:
QUESTION 5
How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to
detect and block?
A. Reputation Filtering
B. Layer-4 Monitoring
C. Data Loss Prevention
D. URL Filtering
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
Which feature discovers and controls malicious cloud apps connected to the corporate environment?
A. Umbrella
B. Cognitive Threat Analytics
C. Cloudlock
D. Investigate
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 7
Which two Cisco products are a part of the "endpoints" threat-centric solution module? (Choose two.)
A. Cisco Umbrella
B. Cisco Defense Orchestrator
C. Cisco VPN 3000
D. Cisco Stealthwatch
E. Cisco AMP for Endpoints
Correct Answer: AE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
Which two features are part of the ISE Plus license? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9
Which feature of Cisco Web Security leverages the Outbreak Intelligence Engine to scan individual pieces of
websites before allowing access?
A. Antivirus Monitoring
B. Dynamic Content Analysis
C. Real-time Sandboxing Analysis
D. Visibility control
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10
Which is a feature mentioned in the DNS security module?
A. Layer-4 monitoring
B. Umbrella
C. Real-time sandboxing
D. Data Loss Prevention
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
How many web requests does Talos process per month?
A. 1.5 million
B. 100,000
C. 130 billion
D. 130 million
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Which license subscription terms are available for AMP licensing?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
Which two Cisco solution are part of the Mobile threat centric solution? (Choose two.)
A. Cisco AnyConnect
B. Cisco Umbrella
C. Cisco NGFW
D. Cisco NGIPS
E. Cisco Defense Orchestrator
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
How does AMP's device trajectory capabilities help address customer's issues?
A. It determines the scope and cause of an outbreak and tracks suspicious files.
B. It searches for potential threats based on identified activities and behaviors.
C. It isolates suspicious files and runs them in a sandbox environment to determine their authenticity.
D. It analyses the data from suspicious files to provide a new level of threat intelligence.
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
Which feature of CTA can separate statistically normal traffic form anomalous traffic?
A. URL filtering
B. Trust modeling
C. Anomaly detection
D. Event classification
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Which is a Cisco solution feasures retrospective security?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Which Cisco Product is integrated with the AnyConnect Web Security Module?
A. Cisco Stealthwatch
B. Cisco Defense Orchestrator
C. Cisco Cloud Web Security
D. Cisco Email Security Appliance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Which are two main features of Intrusion Prevention? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19
Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)
Correct Answer: DE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
Which three malware categories does real-time Malware Scanning protect you from? (Choose three)
A. Antivirus Monitoring
B. Adware
C. Trojan Downloader
D. Outbreak Filters
E. Web Reputation
F. Phishing URL
Explanation/Reference:
QUESTION 21
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
A. Device Administration
B. Device Profiling
C. Centralized policy management
D. Guest access management
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22
Which feature of AMP tracks the movement of a file within the environment and monitors its disposition over
time?
A. Trajectory
B. Fuzzy Fingerprinting
C. Machine Learning
D. Threat Grid
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 23
Which three options are attack vectors protected by Email Security? (Choose three.)
A. Endpoints
B. Offline Devices
C. Mobile
D. E-mail
E. Voicemail
F. Backups
Explanation/Reference:
QUESTION 24
Which product was covered in the Cisco Cloud App Security module?
A. Cisco NGFW
B. Cisco Defense Orchestrator
C. Cisco AMP
D. Cloud Cloudlock
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
Which are two main features of ASAv and NGFWv? (Choose two.)
A. File trajectory
B. API-based management
C. File reputation
D. Agile provisioning
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
Which TrustSec feature allows customers to simplify firewall administration, avoiding the common rule
explosions that happen when new servers?
A. Firewall administration
B. Push policies
C. Traffic tagging
D. Regulate access
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27
Which Cisco solution features recursive DNS capabilities?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28
Which is a key feature that Advanced Malware Protection provides?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three.)
A. Cloud-Brokered VPN
B. Posture Assessment
C. Intrusion Prevention
D. Email Security
E. Profiling
F. Next Generation Firewall
Explanation/Reference:
QUESTION 30
Which Cisco solution falls under cloud security?
A. Umbrella
B. Identity Services Engine
C. Firepower Threat Defense
D. Cisco Defense Orchestrator
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Which Cisco solution falls under Advanced Threat?
A. Umbrella
B. Identity Services Engine
C. Stealthwatch
D. Threat Grid
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Which three are deployment options for E-mail Security? (Choose three.)
A. ESA
B. CES
C. WSAv
D. AMP
E. ESAv
F. WebRoot
Correct Answer: ABE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than
with VLANs?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
Employee-sponsored network access, guest access, and activity tracking are contributors to which feature of
ISE?
A. Device profiting
B. Context-aware access
C. Guest access management
D. Platform exchange grid
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 35
Which is a security product that was covered in the Policy and access security module?
A. Cisco NFGW
B. Cisco Identity Services Engine
C. Cisco NGIPS
D. Cisco Defense Orchestrator
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36
Which two options are attack vectors of the threat-centric defense? (Choose two.)
A. Voicemail
B. Backups
C. Mobile
D. Video surveillance
E. Cloud apps
Correct Answer: CE
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)
Correct Answer: BD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
Which is a Cisco recommended driver for network security?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate
access?
Explanation/Reference:
QUESTION 40
Which three options are attack vectors protected by Web Security? (Choose three.)
A. Endpoints
B. Mobile
C. Offline Devices
D. Backups
E. Voicemail
F. Web
Explanation/Reference:
QUESTION 41
What is key feature of Cognitive Threat Analytics?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 42
What two challenges do customers face in their Campus and Branch deployments? (Choose two.)
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43
Which are two main features of Advanced Malware Protection? (Choose two.)
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
Which three Cisco solutions are covered in the Advanced Threat module? (Choose three.)
Explanation/Reference:
QUESTION 45
Which are two main features of FirePOWER Threat Defense? (Choose two.)
Correct Answer: AD
Section: (none)
Explanation
Explanation/Reference:
QUESTION 46
Which two options are attack vectors protected by Identity and Access Control? (Choose two.)
A. Backups
B. Mobile
C. Endpoints
D. Cloud apps
E. Voicemail
Correct Answer: BC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47
Which options describes how Cisco solutions enable customer's businesses?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
Which is a component of Cisco's Web and E-mail Security Solution?
A. Device Profiling
B. Next Generation Intrusion Prevention System
C. Next Generation Firewall
D. DNS-Layer security
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Which AMP feature is provided by fuzzy fingerprinting?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 50
What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51
Which three options ate attack vectors protected by DNS-Layer security? (Choose three.)
A. Voicemail
B. Backups
C. Web
D. E-mail
E. Cloud apps
F. Video Surveillance
Explanation/Reference:
QUESTION 52
Which feature of Cisco AnyConnect allows pie-login authentication using windows machines, or single sign-on
user authentication using Windows logon credentials?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
How does the Cisco AnyConnect AMP Module help to protect customer's networks?
A. AMP is a unified agent that combines posture check and authentication across wired wireless, and VPN
networks.
B. AMP Module can profile devices before allowing them to connect.
C. AMP provides highly secure access for select enterprise mobile applications.
D. AnyConnect can deploy AMP for Endpoints for Windows or OSX.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Which three features provided by NGFW and NGIPS support the "Internet Edge" use case? (Choose three.)
Explanation/Reference:
QUESTION 55
Which option helps customers gain insight into security threats?
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56
What are three major features of Cisco Defense Orchestrator? (Choose three.)
QUESTION 57
What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)
Explanation/Reference:
QUESTION 58
Which is a key feature of Cisco Defense Orchestra?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59
Which three NGFW and NGIPS features support the "Complex Remote Access" use case? (Choose three.)
Explanation/Reference:
QUESTION 60
Which are two main features of Stateful Firewalling? (Choose two.)
A. Clientless lagging
B. File retrospection
C. Full VX LAN support
D. File reputation
Correct Answer: AC
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61
What are two key points of the Cisco Security and Threat Landscape module? (Choose
two.)
A. The Cisco Security Solutions Portfolio drives customer business outcomes by providing
threat-centric defense, visibility and control, and flexible solutions
B. The threat landscape is expanding, becoming more complex, and threats are increasingly costing more to
customers
C. The Cisco Security Solutions Portfolio stops all threat from entering a customers network.
D. Customers need several solutions to protect their environment.
Correct Answer: AB
Section: (none)
Explanation
Explanation/Reference: