Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Cisco > Systems Engineer > 500-651

500-651 Security Architecture for Systems Engineer (SASE) Question and Answers

Question # 4

Which is a feature mentioned in the DNS security module?

A.

Layer-4 monitoring

B.

Umbrella

C.

Real-time sandboxing

D.

Data Loss Prevention

Full Access
Question # 5

Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three.)

A.

Cloud-Brokered VPN

B.

Posture Assessment

C.

Intrusion Prevention

D.

Email Security

E.

Next Generation Firewall

F.

Profiling

Full Access
Question # 6

Which is a key feature of Cisco Defense Orchestra?

A.

Profiles devices connected to customer ’s network

B.

Orchestrates security policy management form one place

C.

Consolidates configuration management

D.

Protects customer’s network against zero-day attacks

Full Access
Question # 7

How does AMP’s device trajectory capabilities help address customer ’s issues?

A.

It determines the scope and cause of an outbreak and tracks suspicious files

B.

It searches for potential threats based on identified activities and behaviors

C.

It isolates suspicious files and runs them in a sa ndbox environment to determine their authenticity

D.

It analyses the data from suspicious files to provide a new level of threat intelligence

Full Access
Question # 8

Which Cisco solution falls under Advanced Threat?

A.

Email Defense

B.

Identity Services Engine

C.

Malware Protection

D.

Anti-spoofing

Full Access
Question # 9

Which are three key features of DNS-layer security? (Choose three.)

A.

Resolves all DNS request s through a single recursive DNS service

B.

Retrospective Analysis

C.

Acts as first level of protection by providing security at DNS layer

D.

Provides visibility into all Internet activity

E.

Real-time sandboxing

F.

Data Loss Prevention

Full Access
Question # 10

Which of AMP’s File capabilities deals with the problem of files passing through perimeter defenses that are later discovered to be a threat?

A.

Dynamic Analytics

B.

Malware Security

C.

File Retrospection

D.

Trajectory

Full Access
Question # 11

Which Policy and Access solution technology combines posture checks and authentication across wired, wireless, and VPN networks?

A.

Cisco AnyConnect

B.

Next Generation Intrusion Prevention System

C.

Cisco Stealthwatch

D.

ASA 2100 series

Full Access
Question # 12

What is a main benefit of Cisco’s Clouldlock Data Loss Prevention feature?

A.

Reduces cost with easy implementation and installation

B.

Provides in depth cloud app analytics and tracking

C.

Allow organizations to retroactively identify malware within their environment

D.

Includes 70+ out of the box policies for enforcement, such as PCI, HIPAA, etc.

Full Access
Question # 13

Which feature of Cisco AnyConnect allows pre-login authentication using windows machines, or single sign-on user authentication using Windows logon credentials?

A.

Secure Layer-2 Network Access

B.

Flexible AAA Options

C.

Differentiated Mobile Access

D.

Trusted Network Detection

Full Access