cisco 700-765 practice test

cisco security architecture for system engineers

Last exam update: Nov 14 ,2024
Page 1 out of 7. Viewing questions 1-10 out of 62

Question 1

Which feature of StealthWatch aggregates and normalizes NetFlow data?

  • A. Netflow analytics
  • B. Forensic investigation
  • C. Advanced malware protection
  • D. FlowCollector
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

What are two areas present a security challenge for customers? (Choose two.)

  • A. Email
  • B. Corporate priorities
  • C. IoT devices
  • D. IT departments
  • E. OT environments
Mark Question:
Answer:

ac

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 3

What are two key capabilities of Meraki? (Choose two.)

  • A. identity-based and device-aware security
  • B. application visibility and control
  • C. device profiling
  • D. contextual awareness
  • E. security automation
Mark Question:
Answer:

ab

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 4

What does remote access use to verify identity?

  • A. Agents
  • B. MFA
  • C. Remote Access VPN
  • D. AMP for Endpoints
Mark Question:
Answer:

a

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

What are two common customer obstacles? (Choose two.)

  • A. Compliance regulations
  • B. Security system blackouts
  • C. High turnover of IT professionals
  • D. Limited resources
  • E. Lack of solution integration
Mark Question:
Answer:

rdae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 6

What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?

  • A. Telemetry, shared intelligence, and profiling sources
  • B. Context, telemetry and intelligence sources
  • C. Intelligence sources, telemetry, and shared intelligence
  • D. Context, telemetry, and profiling sources
Mark Question:
Answer:

d

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What are two result of utilizing a fragmented security model? (Choose two.)

  • A. Reduced malicious file risk through additional segmentation.
  • B. Decreased network accessibility through multiple applications.
  • C. Decreased visibility and limited understand of security coverage.
  • D. Increased identity controls
  • E. Individual components pieced together to meet requirements.
Mark Question:
Answer:

ce

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 8

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

  • A. AMP for Endpoints
  • B. Duo
  • C. Cisco Security Connector
  • D. pxGrid
  • E. Stealthwatch
Mark Question:
Answer:

ae

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 9

What are two features provided by ISE? (Choose two.)

  • A. Device Firewalling
  • B. Guest Management
  • C. DDOS attack prevention
  • D. Centralized policy management
  • E. Network visibility
Mark Question:
Answer:

bd

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000

Question 10

What are two tenants of establishing an SD-perimeter? (Choose two.)

  • A. Securing device access
  • B. Securing network access
  • C. Securing user-device trust
  • D. Securing app access
  • E. Securing endpoints
Mark Question:
Answer:

ad

User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
vote your answer:
A
B
C
D
E
0 / 1000
To page 2