500-265 - Advanced Security Architecture for System Engineers
Go back to Cisco
Which is collaboration such an important trend in the economy? Select exactly 1 answer(s) from the following:
It can help increase the productivity of those processes and jobs that cannot be automated.
What are two benefits of the Cisco Unified IP Phones 9900 Series? (Choose two.) Select exactly 2 answer(s) from the following:
There is an option for an integrated video camera.
They deliver high-definiton voice.
How does the Device Trajectory feature work?
It tracks file behavior on a device to pinpoint the root cause of a compromise.
What are two reasons for virtualizing Cisco communications applications? (Choose two)
Reduce cabling, rack space, and switch port costs
Reduce carbon footprint
Reputation filtering performs which two functions? (Choose two.)
rates each site based on a reputation score
communicates with Cisco SenderBase, which is a common security database
In terms of collaboration, which elements of the typical workday does a properly implemented collaboration architecture affect? Select exactly 1 answer(s) from the following:
Processes, culture, and technology
Which feature in Cisco WebEx is the most important differentiator compared to other vendor in the collaboration technology? Select exactly 1 answer(s) from the following:
Cisco WebEx is always installed on- premises.
Which feature is a primary feature of Cisco AnyConnect?
secure and flexible remote access
In the Cisco TrustSec "User to Data Center Access Control" use case, which users typically have access to the company data center?
On average, email security Outbreak Filters identify and stop threats how many hours sooner than the next major AV vendor?
13 hours sooner
Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?
Cisco Application Visibility and Control
Consider the process that begins with file retrospection, continues to interrogate the file and update its disposition over time, then records the pathway that the software and files take from device to device. This process is an example of which Cisco AMP feature?
attack chain weaving
Which two Cisco collaboration functions are significantly improved by introducing Jabber technology? (Choose two.) Select exactly 2 answer(s) from the following:
Which Cisco security technology delivers the best real-time threat intelligence?
Cisco Security Intelligence Operations
Which component of Cisco network security builds on basic firewall capabilities by adding web filtering, web email controls, and Cisco Application Visibility and Control?
Cisco ASA Next-Generation Firewall
Where will an account manager find historical and current information about competitors around Cisco Collaboration?
Cisco competitive Edge Portal
Which Cisco Secure Access solution provides centralized policy management to give administrators more granular control over access authorization?
Cisco Identity Services Engine
Your customer wants to offer Cisco Smart Care, Why is it important to have sophisticated management tools, such as Cisco Monitor Manager or Cisco Monitor Director, to offer this service? Select exactly 1 answer(s) from the following:
These management tools enable views into potential problems before they impact a customer's business.
Which of the following is a reason why it is important to identify and collect business KPIs when designing the Cisco collaboration Architecture?
To be able to translate features and functionalities of Cisco Collaboration Architecture in to benefits for measured KPIs
Which option best describes granular app control using application visibility and control?
blocking Facebook games but allowing Facebook posts
Which of the following is the main reason to start a customer opportunity design with an assessment approach? Select exactly 1 answer(s) form the following:
to gain the trust of the customer
Services are creating additional revenue. In which way can Cisco partners benefit from offering a wide range of collaboration-related services?
Offer Cisco and partner-provided services that support customers and improve their market differentiation, thus increasing their revenues.
Which two statements describe how Cisco Validated Designs help to build BOM faster? (Choose two.) Select exactly 2 answef(s) from the following:
Cross-architectural aspects assist with proper design.
Proven, tested designs ensure BCM will not change frequently.
What are two generic features of value creation? (Choose two)
Increase margins through reduced costs in the value chain
Enhance the productivity of corporate management
Which statement about migrating to Cisco Unified Communications is true?
A phased migration purchases individual components of the system as and when they are needed.
Many tasks in an organization's processes require collaboration. Which two of the following will you need to uncover from the customer to evaluate the relevance and to properly position Cisco Collaboration Architecture? (Choose two.) Select exactly 2 answer(s) from the following:
importance of interaction to perform the task
resources that are required to perform these tasks
Which two statements indicate that the customer needs an infrastructure that can efficiently accommodate organizational changes? (Choose two)
Collaboration applications must be flexible to quickly adapt to changes in user demand.
Future success of our company depends on operational agility.
Which two characteristics would you describe as key differentiators for the Cisco ISR router compared to the competition? (Choose two)
Decoupling the delivery of software from hardware on optional service modules
Delivery of innovative security services as part of the self-defending network at wirespeed performance
Which statement best describes how Cisco Collaboration Architecture can help to improve business performance in the value network?
Cisco Collaboration Architecture must be implemented in every element of the value network to improve the business performance of an organization.
Which Cisco ASA Next-Generation Firewall service restricts websites and web application usage based on the reputation of the site?
Cisco Web Security Essentials
What is the single best set of benefits form a Cisco switched campus solution? Select exactly 1 answer(s) from the following:
Network intelligence, enhanced QaS, borderless security, availability, resiliency
Which two statements about on-premise collaboration solutions are true?(Choose two)
These solutions facilitate cost savings in case of heavy usage.
Conferencing-related transport costs and service fees can be reduced.
Cisco Email Security is ideal for which type of customer?
customers who need sensitive data to remain onsite
On average, how many pieces of new malware are created every second?
In which two ways can Cisco Collaboration Architecture help improve customer satisfaction as one of the key business drivers of an organization? (Choose two)
Cisco WebEx and Cisco Tele Presence help create new dimensions of collaboration processes with customers.
Cisco Unified Contact Center Express helps create a completely new service experience for customers.
Which feature of the Cisco security appliance provides "who-what-where-when-how" information about any requests for network access?
Security plays an essential role in the Cisco Collaboration Architecture .In which layers of the Cisco Collaboration Architecture is security implemented?
Cisco provides advanced security solutions in the infrastructure and collaboration service layer while the collaboration applications layer security is ensured by third-party solutions.
Why is collaboration such an important trend in the economy? Select exactly 1 answer(s) from the following:
It can help increase the productivity of those processes and jobs that cannot be automated.
Which integrated technology solution deals with application-centric infrastructures?
Cisco Secure Data Center
Which VPN offering removes the need for point-to-point GRE tunnels?
Cisco GET VPN
Which two of the following are the main differentiators of Cisco Collaboration against the competition? (Choose two.) Select exactly 2 answer(s) from the following:
Cisco's Collaboration solutions are designed to support interoperability with the solutions of other vendors.
Cisco solutions allow customers high operational agility, which competitive solutions do not.
In the Cisco future solutions architecture framework, the security solutions are directly built upon which component?
Cisco security platforms
Which of the following is the last step when mapping business requirements with Cisco Collaboration Architecture?
Map collaboration maps (diagrams) with Cisco Collaboration Architecture.
Cisco Collaboration Architecture differentiates from other solutions in terms of a unified workspace that creates a unique user experience. What is the main need of end users that needs to be addressed? Select exactly 1 answer(s) form the following:
to allow collaboration any time, on any device, and with any content
In which mode of operation does Cisco Unified Presence operate as an IM and presence server, supporting Cisco Unified Communications clients such as Cisco Unified Personal Communicator?
Cisco Unified Communications mode
Where will an architect find the largest source of case studies, white papers, demonstrations, and vertical-oriented information around Cisco Collaboration Architecture? Select exactly 1 answer(s) form the following:
Collaboration Business Case
Why is the financial manager an integral part of the decision-making process?
The financial manager is appointed to appraise potential investments.
After a user prepares and sends an encrypted message to a recipient, what is the next step?
The customer receives an encrypted message that requires a decryption key.
Which of the following statement best describes the capability to enable any-to-any collaboration as one of the key Cisco collaboration differentiators? Select exactly 1 answer(s) from the following:
Enable people to collaborate securely using any suitable endpoint device to exchange information.
Which two options are benefits of Cisco Application Visibility and Control for administrators? (Choose two.)
It ensures device compliance.
It limits individual or group-based access to certain application components.