Weekend Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Cisco 500-651 Security Architecture for Systems Engineer (SASE) Exam Practice Test

Page: 1 / 9
Total 90 questions

Security Architecture for Systems Engineer (SASE) Questions and Answers

Question 1

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?

Options:

A.

Reputation Filtering

B.

Layer-4 Monitoring

C.

Data Loss Prevention

D.

URL Filtering

Question 2

How does AMP’s device trajectory capabilities help address customer ’s issues?

Options:

A.

It determines the scope and cause of an outbreak and tracks suspicious files

B.

It searches for potential threats based on identified activities and behaviors

C.

It isolates suspicious files and runs them in a sa ndbox environment to determine their authenticity

D.

It analyses the data from suspicious files to provide a new level of threat intelligence

Question 3

Which are two main challenges of securing web and e -mail? (Choose two.)

Options:

A.

90% of cyber criminals use DNS in attacks

B.

Protecting against data centers

C.

Cyber Crime is a growing industry

D.

Securing could apps

Question 4

Which option helps customers gain insight into security threats?

Options:

A.

Limit volume of users to applications

B.

Share sensitive data across different platforms

C.

Providing remote access VPN to allow mobile users to connect securely to customers network

D.

Providing visibility into everything to allow granular security policies to be created and enforced

Question 5

Which feature of E-mail Security protects users from virus out breaks using the Talos database to quarantine suspicious messages?

Options:

A.

Antivirus defense

B.

Outbreak filters

C.

Data Loss Prevention

D.

Advanced Malware Protection

Question 6

What is a key difference between Basic Data Loss Prevention and Advanced Data Loss Prevention?

Options:

A.

Providing content analysis

B.

Instant visibility

C.

Dynamic outbreak considerations

D.

Ability to filter in real-time

Question 7

Which three options are attack vectors protected by Email Security? (Choose three.)

Options:

A.

Endpoints

B.

Offline Devices

C.

Mobile

D.

E-mail

E.

Voicemail

F.

Backups

Question 8

Which license subscription terms are available for AMP licensing?

Options:

A.

1 month, 3 months, 6 months

B.

1 year, 5 years, 10 years

C.

5 years, 10 years, 30 years

D.

1 year, 3 years, 5 years

Question 9

Which are three main elements of the Cloud App Security? (Choose three.)

Options:

A.

Cloud Data Loss Prevention

B.

Rapid Breach Remediation

C.

User and Entity Behavior Analytics

D.

Apps Firewall

E.

DNS-Layer Protection

Question 10

Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?

Options:

A.

Centralized policy management

B.

Context-aware access

C.

Patch management

D.

Platform exchange grid

Question 11

Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three.)

Options:

A.

Cloud-Brokered VPN

B.

Posture Assessment

C.

Intrusion Prevention

D.

Email Security

E.

Next Generation Firewall

F.

Profiling

Question 12

Which Cisco solutions falls under cloud security?

Options:

A.

Umbrella

B.

Identity Services Engine

C.

Firepower Threat Defense

D.

Cisco Defense Orchestrator

Question 13

Which are two main challenges of securing web and e -mail? (Choose two.)

Options:

A.

Data Loss PreventionHaving the ability to remediate issues as they arrive

B.

AMPSecuring cloud apps

C.

Protecting against data centers

D.

InvestigateDetecting issues in real-time

Page: 1 / 9
Total 90 questions