Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

700-765 Exam Dumps - Cisco Security Architecture for System Engineers

Question # 4

What is used to reduce attack surfaces?

A.

Remediation

B.

Segmentation

C.

Device trust

D.

Access

Full Access
Question # 5

How do AMP's device trajectory capabilities help address customers' breach remediation issues?

A.

It analyzes the data from suspicious files to provide a new level of threat intelligence.

B.

It determines the scope and cause of an outbreak and tracks suspicious files

C.

It tracks file behavior across the network to see which devices it enters and exits

D.

It searches for potential threats based on identified activities and behaviors

Full Access
Question # 6

Which two attack vectors are protected by MFA? (Choose Two)

A.

Mobile

B.

Endpoints

C.

Data center

D.

Web

E.

Cloud

Full Access
Question # 7

What are two tenants of establishing an SD-perimeter? (Choose Two)

A.

Securing app access

B.

Securing network access

C.

Securing device access

D.

Securing userdevice trust

E.

Securing endpoints

Full Access
Question # 8

Which attack vector is protected by Email Security?

A.

Endpoints

B.

Voicemail

C.

Mobile

D.

Web

Full Access
Question # 9

Where do you start to achieve true network visibility?

A.

Fabric Level

B.

IT

C.

OT

D.

Branches

Full Access
Question # 10

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose Two)

A.

access to multiple data layers

B.

threats stopped from getting in and spreading

C.

access to Trojan downloader

D.

security enforced at the DNS layer

E.

see and share malware details

Full Access
Question # 11

In which two ways has digitization transformed today's security threat landscape'? (Choose two.)

A.

Growing ecosystem

B.

Expanding complexity

C.

Increasing access points

D.

Decreasing endpoint ecosystem

E.

Decreasing 3rd party applications

Full Access
Question # 12

What is one of the reasons that customers need a Visibility & Enforcement solution?

A.

Storage is moving from on-premises to cloud-based

B.

Businesses can't see or protect devices on their network

C.

Organizations need the ability to block high-risk websites

D.

Network traffic is growing at an exponential rate

Full Access
Question # 13

What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)

A.

More users

B.

More IT professionals

C.

More devices

D.

More networks

E.

More vulnerabilities

Full Access