646-562 - ASAM - Advanced Security for Account Managers

Go back to Cisco

Example Questions

How does the Cisco Security Agent work in conjunction with third-part antivirus software? Which two threat-defense features allow a network to correlate events, mitigate events and audit policies? (Choose two.) A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate traffic cannot be processed, and the company cannot function. This causes which security pain point? You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this customer? When determining business pain points at the operations level of an organization, an account manager should focus on which two critical success factors? (Choose two.) A Cisco Outbreak Prevention Solution provides customers with many benefits. Within this solution, which type of Cisco network security offering acts as the first line of defense to proactively isolate infections by preventing worms or viruses from infiltrating endpoints? What is the most common reason that customers lack sufficient security? Which feature of Cisco Security MARS uses NetFlow data? Which Cisco IOS feature facilitates dynamic IPSec tunnels between spoke (branch) sites? Which security pain point can be resolved by each of these security products: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco PIX Firewall 500 Series, Cisco Security Agent, and the Cisco Guard DDoS Mitigation Appliances? Which Cisco Solution provides host protection against security violations by enforcing on the behavior of the device? In which two ways does a Cisco solution directly reduce the cost of operation?( Choose two.) Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition,. Which two items would you include in your value proposition? (Choose Two.) Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information? Which Cisco Security management product provides monitoring for NAC deployments? Which government regulation specifies which patient information must be kept private, how companies must secure the information and the standards for electronic communication between medical providers and insurance companies? In which two ways does application security protect against threats being introduced from within web-enabled applications (Choose two.) How do Cisco Security Solutions reduce TCO? Which security product supports up to three Cisco Security devices and an unlimited number of CSAs? A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall or network. Legitimate traffic can't be processed and the company can't function. This causes which security pain point? Because the initial product cost of a solution is often a fraction of the TCO over the life span of the solution, which two other factors should be considered when talking about the TCO of security? (Choose two.) How do you calculate risk quantitatively for SLE? Which security product addresses deployment and ongoing management and policy configuration needs? Which government regulation specifies which patient information must be kept private, how companies must secure the information, and the standards for electronic communication between medical providers and insurance companies? Network Containment and control provides the ability to layer sophisticated auditing, control and correlation capabilities to protect any networked element across any firewall, VPN, intrusion detection mechanism or other technology. How does this enable proactive responses to threats? Which government regulation was implemented to promote world financial stability by coordinating definitions of capital and risk assessment across countries? Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.) Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance? Which statement best describes the Cisco SDN strategy? Continuance and protection fall under which layer of the business resilience model? You are meeting with an enterprise customer that has a multivendor network. Which Cisco Security product should you position with this customer? You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer? Which business enables provides a defense against damages and losses (Such as financial, legal, commercial, image, branding, property and people), which directly affect the ability of to do business? You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this computer? In which two ways does application security protect against threats being introduced from within web-enabled applications? (Choose two.) NAC is an example of which principal characteristic of the Cisco SDN? Which Cisco SDN solution offering is designed to adapt to new security threats, and extends the Cisco SDN to remote offices? Which statement accurately describes the difference between a quantitative and a qualitative risk analysis? When building a security policy for an organization, which of these steps should you take first? Which principal characteristic of the Cisco SDN allows endpoints to be admitted to the network based on their adherence to security policy as enforced by routers and switches? wants to ensure business continuity by allowing legitimate transactions to the website while redirecting illegitimate transactions. Which Cisco SDN solution offering would satisfy this requirement? In terms of the network life-cycle, what should you consider when evaluating the TCO of a security solution? Which two of these arguments can you use to convince a business decision-maker of the need for network security? (Choose two.) Network containment and control provides the ability to layer sophisticated auditing, control, and correlation capabilities to protect any networked element across any firewall, VPN, intrusion detection mechanism, or other technology. How does this enable proactive response to threats? Which two threat-defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.) Which government regulation was implemented to promote world financial stability by coordinating definitions of capital and risk management across countries? Which government regulation affects companies in Australia and New Zealand that wish to comply with the first universal risk-management standard? How does the Cisco SDN protect organizations from worm and virus outbreaks? How does the Cisco SDN protect organization from worm and virus outbreaks? Which business enabler provides a defense against damages and losses (such as financial, legal, commercial, image, branding, property, and people), which directly affect the ability of a company to do business?