Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Cisco 500-651 - Security Architecture for Systems Engineer (SASE)

Page: 1 / 3
Total 90 questions

Which StealthWatch device monitors, analyzes, separates, categorizes, and stores information from, allowing it to create a baseline of type expected network activity?

A.

Forensic investigation

B.

Advanced malware protection

C.

Malware clustering

D.

Flow collector

Which three options does Cisco provide customers in terms of “Visibility and Control” against today’s threats? (Choose three.)

A.

Granular device visibility and management

B.

Unparalleled network a nd endpoint visibility

C.

18-month device release cycle

D.

Bandwith Utilization Monitoring

E.

Comprehensive policy enforcement

F.

Fast device policy updates

Employee-sponsored network access, guest access, and activity tracking are contributors to which feature of ISE?

A.

Device profiling

B.

Context-aware access

C.

Guest access management

D.

Platform exchange grid

Which two products are part of Cisco’s Data Center threat-centric solution? (Choose two.)

A.

Rapid threat detection through NGFW and NGFWv

B.

Enforced device security with Meraki

C.

URL filtering

D.

Relationship segmentation

E.

Automated policy enforcement with ASAv

Which are two main challenges of securing web and e -mail? (Choose two.)

A.

90% of cyber criminals use DNS in attacks

B.

Protecting against data centers

C.

Cyber Crime is a growing industry

D.

Securing could apps

Which three values are provided by NGFW and NGIPS in the “Campus NGFW”? (Choose three.)

A.

High throughput maintained while still protecting domain against threats

B.

Identity Services Engine

C.

Differentiated Mobile Access

D.

Additional firewalls across all platforms

E.

Flexible AAA Options

F.

Dynamic routing port to meet all network needs

Which are three main elements of the Cloud App Security? (Choose three.)

A.

Cloud Data Loss Prevention

B.

Rapid Breach Remediation

C.

User and Entity Behavior Analytics

D.

Apps Firewall

E.

DNS-Layer Protection

Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?

A.

Centralized policy management

B.

Context-aware access

C.

Patch management

D.

Platform exchange grid

Which is a Cisco solution feasures retrospective security?

A.

AMP for Endpoint

B.

Cisco Defense Orchestrator

C.

Umbrella

D.

Investigate

Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags to edit networks dynamically rather than with VLANs?

A.

Device profiling and onboarding

B.

Role and device segmentation

C.

Guest Access

D.

Secure remote access