646-563 - Advanced Security for Account Managers
Go back to Cisco
Which two of these statements describe how the Cisco Lifecycle Services approach benefits the customer? (Choose two.)
It enables the customer to make sound financial decisions by establishing the financial justification for making a technology change.
It enables operational excellence by ongoing improvement of system performance and functionality.
Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information?
Which two of these arguments can you use to convince a business decision.maker of the need for network security? (Choose two.)
Network security provides a method to balance threats with countermeasures.
Organizations that operate vulnerable networks face increasing liability.
Which two of these activities does the risk analysis process include? (Choose two.)
Determine the impact on business.
Identify potential threats.
A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate traffic cannot be processed, and the company cannot function. This causes which security pain point?
You are meeting with an enterprise customer that has a multivendor network. Which Cisco Security product should you position with this customer?
Cisco Security MARS
How does the Cisco ASA with the CSC module protect the network? (Choose two.)
It blocks incoming e-mail and web threats.
It prevents loss of sensitive information with integrated antivirus protection.
How does security technology assessment drive continuous improvements?
by recommending remediation measures, such as optimizing device configurations, planning capacity, and resolving quality issues
Which two of these describe how security contributes to profitability? (Choose two.)
by decreasing downtime and productivity losses
by enabling businesses to gain the maximum advantage from advanced technologies
Which two threat.defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
proactive threat response
network containment and control
Which statement accurately describes the difference between a quantitative and a qualitative risk analysis?
Quantitative risk analysis attempts to determine numeric values for risk that is based on a number of factors, such as impact, duration, and asset value. A qualitative approach assigns a subjective rating to each risk that typically is based on past experience or consultant opinion.
During the optimize phase, how can the account manager help the customer reach operational excellence?
by enabling ongoing improvement of system performance and functionality
What is one way that Cisco Security can decrease customer implementation costs?
by using the existing infrastructure
How does security technology assessment benefit the customer?
The customer would be made aware of their current security status.
Which Cisco solution provides host protection against security violations by focusing on the behavior of the device?
Cisco Security Agent
A company believes that buying and installing a firewall can solve their security problems. What reason for insufficient security is this customer illustrating?
lack of perceived risk
Which government regulation was designed to restore investor confidence in the financial reporting of public companies?
Why do end users need to be aware of the security policy?
Some security decisions are usually in their hands.
Regarding Cisco security solutions with TDM, which level of Cisco SDN security messaging is appropriate?
technology strategies and specific products
How do you calculate risk quantitatively for SLE?
exposure factor multiplied by the asset value
Which principal characteristic of the Cisco SDN incorporates technologies that are inherent in the secure operation of network devices, including control plane policing and CPU/memory thresholding?
Cisco's security solutions allow organizations to protect productivity gains, reduce overall operating costs and enable mission critical deployment of new and existing technologies. Which government regulation makes it possible to sell a Cisco Security Solution to companies collecting financial information?
Which security pain point can be resolved by each of these security products: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco PIX Firewall 500 Series, Cisco Security Agent, and the Cisco Guard DDoS Mitigation Appliances?
business disruption from an Internet attack, such as viruses, worms, and/or hackers
Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.)
Cisco solves the broadest suite of threats.
Cisco has established partnerships with all key players.
How does preliminary technical discovery benefit the customer?
Information regarding an existing customer network is analyzed, which allows an appropriate solution to be developed.
How do you go about assessing the impact of business disruptions?
Probe the tangible and intangible impacts of a probable disruption.
Which Cisco IOS feature facilitates dynamic IPsec tunnels between spoke (branch) sites?
A company suffered from a critical security breach and experienced considerable downtime. They decided to reassess the security policy and rebuild the network infrastructure. Which three business problems does the Self.Defending Network initiative address? (Choose three.)
damage to customer confidence
What trigger question would you use when assessing the benefit of a secure network access solution?
What type of end users and applications need to access your network?
What are three benefits of the Cisco SDN that will be recognized by business decision makers? (Choose three.)
helps to manage IT and operational risk
lowers TCO by using the existing infrastructure
helps to meet regulatory requirements
What three phases of the network lifecycle should be the focus for account managers selling security solutions? (Choose three.)
Which compliance standard will directly affect the security policy of a local bookstore?
What is the difference between Cisco Security Manager and Cisco Security MARS?
Cisco Security MARS focuses on rapid threat identification and mitigation.
After the technology strategy meeting occurs, which two of these statements describe how further value is added for the customer? (Choose two.)
The customer requirements and proposed solution are reviewed to ensure alignment.
Partners work with the customer to map appropriate security technologies to both the documented business and technical requirements.
How does business case alignment improve the overall success of network integration? (Choose two.)
by recommending change to the customer
by assessing the realization of ROI and other benefits of the security system
Which business enabler provides a defense against damages and losses (such as financial, legal, commercial, image, branding, property, and people), which directly affect the ability of a company to do business?
Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.)
qualitative information about how Cisco can help to increase revenue and reduce costs
a review of customer security pain points and business needs that you learned about during the discovery process
Which three technologies allow the Cisco SDN to adapt to new threats as they arise? (Choose three.)
Which scenario illustrates a breach in security integrity?
Someone is able to cast a large number of votes in an online poll.
Which three of these are key elements of the Adaptive Threat Defense? (Choose three.)
active management and mitigation
dynamic adjustment of risk ratings
How do you begin a meaningful security discussion with a customer?
Identify customer security needs and assets that need protection.
Which two of these statements describe why it is important to have a proactive security solution when dealing with data centers and security? (Choose two.)
Data centers are becoming more virtual and automated.
Attacks are becoming more sophisticated.
Which government regulation is designed to create a common information security structure that is based on recognized best practices, and is an internationally recognized generic standard?
BS 7799/ISO 17799
When selling secure WAN, which two of these statements can you use to promote the Cisco solution over that of Juniper? (Choose two.)
Cisco supplies end-to-end security solutions.
Juniper lacks voice integration in their routers.
Which two of these best describe how the Cisco Lifecycle Services approach provides value for partners? (Choose two.)
reduces risk in deploying and supporting technologies
improves customer satisfaction ratings
Which of these technologies would you suggest to an accounting firm that relies heavily on contract teleworkers during tax season?
What are two outcomes of preparing for the business requirements workshop? (Choose two.)
defining detailed customer requirements
How does a common management solution simplify security for customers?
by enabling centralized configuration policy management across multiple devices
Which two factors should be considered when calculating the cost of downtime? (Choose two.)
average revenue per hour
server downtime (in hours)
Why is a risk management strategy needed?
The network can never be 100 percent secure.