Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

500-651 Exam Dumps - Security Architecture for Systems Engineer (SASE)

Question # 4

Which is a key feature of Cisco Defense Orchestra?

A.

Profiles devices connected to customer ’s network

B.

Orchestrates security policy management form one place

C.

Consolidates configuration management

D.

Protects customer’s network against zero-day attacks

Full Access
Question # 5

Which are two main challenges of securing web and e -mail? (Choose two.)

A.

90% of cyber criminals use DNS in attacks

B.

Protecting against data centers

C.

Cyber Crime is a growing industry

D.

Securing could apps

Full Access
Question # 6

Which two Cisco solution are part of the Mobile threat centric solution? (Choose two.)

A.

Cisco AnyConnect

B.

Cisco Umbrella

C.

Cisco NGFW

D.

Cisco NGIPS

E.

Cisco Defense Orchestrator

Full Access
Question # 7

What are two key point s of the Cisco Security and Threat Landscape module? (Choose two.)

A.

The Cisco Security Solutions Portfolio drives customer business outcomes by providing threat-centric defense, visibility and control, and flexible solutions.

B.

The threat landscape is expanding, becoming more complex, and threats are increasingly costing more to customers.

C.

The Cisco Security Solutions Portfolio stops all threat from entering a customers network.

D.

Customers need several solutions to protect their environment.

Full Access
Question # 8

Which three options does Cisco provide customers in terms of “Visibility and Control” against today’s threats? (Choose three.)

A.

Granular device visibility and management

B.

Unparalleled network a nd endpoint visibility

C.

18-month device release cycle

D.

Bandwith Utilization Monitoring

E.

Comprehensive policy enforcement

F.

Fast device policy updates

Full Access
Question # 9

Which feature of AMP tracks the movement of a file within the environment and monitors its disposition over time?

A.

Trajectory

B.

Fuzzy Fingerprinting

C.

Machine Learning

D.

ThreatGrid

Full Access
Question # 10

Which feature of ISE is Terminal Access Control System (TACACS) a part of?

A.

Device Administration

B.

Device Profiling

C.

Centralized policy management

D.

Guest access management

Full Access
Question # 11

Which Policy and Access solution technology combines posture checks and authentication across wired, wireless, and VPN networks?

A.

Cisco AnyConnect

B.

Next Generation Intrusion Prevention System

C.

Cisco Stealthwatch

D.

ASA 2100 series

Full Access
Question # 12

Which three options are attack vectors protected by Email Security? (Choose three.)

A.

Endpoints

B.

Offline Devices

C.

Mobile

D.

E-mail

E.

Voicemail

F.

Backups

Full Access
Question # 13

Which Cisco solution features recursive DNS capabilities?

A.

Cisco Defense Orchstrator

B.

Identity Services Engine

C.

Umbrella

D.

Cognitive Threat Analytics

Full Access