646-578 - Advanced Security for Account Managers
Go back to Cisco
NAC is an example of which principal characteristic of the Cisco SDN?
How does security technology assessment benefit the customer?
The customer would be made aware of their current security status
ScanSafe scans traffic and enforces policies for which kind of traffic?
inbound and outbound traffic via HTTP, HTTPS, and FTP over HTTP
Which two of these actions describe how management and analysis tools help customers monitor their network security? (Choose two.)
reporting and validating threats
creating network-wide and device-level security policies
Which two of these describe how security contributes to profitability? (Choose two.)
by enabling businesses to gain the maximum advantage from advanced technologies
by decreasing downtime and productivity losses
How does the Cisco SDN protect organizations from worm and virus outbreaks?
by protecting network endpoints, preventing infections from spreading through the network infrastructure, and monitoring the network in order to respond rapidly to outbreaks
Why do end users need to be aware of the security policy?
Some security decisions are usually in their hands.
How do you calculate risk quantitatively for SLE?
exposure factor multiplied by the asset value
How does preliminary technical discovery benefit the customer?
Information regarding an existing customer network is analyzed, which allows an appropriate solution to be developed
Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.)
Cisco solves the broadest suite of threats.
Cisco has established partnerships with all key players.
The ScanSafe SearchAhead feature does what?
works with major search engines, indicating in advance whether each result of a user search will be allowed or blocked if clicked
During the optimize phase, how can the account manager help the customer reach operational excellence?
by enabling ongoing improvement of system performance and functionality
Which statement best illustrates how to communicate to a potential customer the consequences of not having a secure network?
When assets are threatened, there is potential for loss of revenue, compliance fines, and the loss of good customers.
Which compliance standard will directly affect the security policy of a local bookstore?
Which statement is true?
Three-year commitments cost less per year than three consecutive one-year commitments.
Which government regulation was designed to restore investor confidence in the financial reporting of public companies?
You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer?
Cisco SDN solutions are adaptive, allowing for innovative behavioral methods to be deployed in order to automatically recognize new types of threats as they arise. Mutual awareness can exist among and between security services and network intelligence, thus increasing security effectiveness and enabling a much more proactive response to new types of threats.
Which two of these activities does the risk analysis process include? (Choose two.)
Identify potential threats.
Determine the impact on business.
Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information?
What is a benefit of Cisco IOS IPS?
protects investments by using the existing network infrastructure
How does a common management solution simplify security for customers?
by enabling centralized configuration policy management across multiple devices
Which two of these statements describe how the systems approach benefits customers? (Choose two.)
It provides greater visibility.
Individual products are easier to deploy.
The Cisco IronPort S-Series is the first product that provides complete, high-performance web security. What is another feature?
What three phases of the network lifecycle should be the focus for account managers selling security solutions? (Choose three.)
What is the most common reason for purchasing the Cisco IronPort S-Series?
need to spy on users
After the technology strategy meeting occurs, which two of these statements describe how further value is added for the customer? (Choose two.)
The customer requirements and proposed solution are reviewed to ensure alignment.
Partners work with the customer to map appropriate security technologies to both the documented business and technical requirements
Why is a risk management strategy needed?
The network can never be 100 percent secure.
Which government regulation was implemented to promote world financial stability by coordinating definitions of capital and risk assessment across countries?
Which two of these choices describe how the secure network access solution provides value to the customer? (Choose two.)
makes mobility more cost-effective
reduces the amount of equipment
How do you go about assessing the impact of business disruptions?
Probe the tangible and intangible impacts of a probable disruption.
When selling secure WAN, which two of these statements can you use to promote the Cisco solution over that of Juniper? (Choose two.)
Juniper lacks voice integration in their routers.
Cisco supplies end-to-end security solutions.
Which of these secure solutions provides a multipurpose appliance that allows customers to deploy security services, such as IPS, SSL VPN, and content filtering, on an as-needed basis to meet business requirements?
secure network access
What is the earliest block to new web threats?
Web Reputation Filtering with Exploit prevention
Which two factors should be considered when calculating the cost of recovery? (Choose two.)
number of compromised servers
time (in hours) to rebuild servers
What is the difference between Cisco Security Manager and Cisco Security MARS?
Cisco Security MARS focuses on rapid threat identification and mitigation.
Which statement best describes the Cisco IronPort S-Series?
optimized for family friendly web filtering
Which government regulation specifies which patient information must be kept private, how companies must secure the information, and the standards for electronic communication between medical providers and insurance companies?
Which of these technologies would you suggest to an accounting firm that relies heavily on contract teleworkers during tax season?
Which government regulation is designed to create a common information security structure that is based on recognized best practices, and is an internationally recognized generic standard?
BS 7799/ISO 17799
How do you begin a meaningful security discussion with a customer?
Identify customer security needs and assets that need protection.
Your prospect is unwilling to make major network changes to try the Cisco IronPort web security appliance. What would be an appropriate response?
Using explicit forward proxy mode minimizes changes to the network.
Which two factors should be considered when calculating the cost of downtime? (Choose two.)
server downtime (in hours)
average revenue per hour
Which two of these statements describe why it is important to have a proactive security solution when dealing with data centers and security? (Choose two.)
Attacks are becoming more sophisticated.
Data centers are becoming more virtual and automated.
Which availability has ScanSafe maintained over the last seven years?
What trigger question would you use when assessing the benefit of a secure network access solution?
What type of end users and applications need to access your network?
The customer wants to hire employees during the coming year. What should you do?"
In accordance with theCisco Iron Port policy, ask if you can quote the customer for the anticipated user count at the end of the year.
How does security technology assessment drive continuous improvements?
by recommending remediation measures, such as optimizing device configurations, planning capacity, and resolving quality issues
Which two Cisco SDN benefits would you emphasize when discussing security solutions with a business decision-maker? (Choose two.)
Cisco SDN helps meet regulatory requirements.
Cisco SDN protects corporate information assets. 3
What is one way that Cisco Security can decrease customer implementation costs?
by using the existing infrastructure
How does the Cisco SDN relate to compliance?
It addresses a large majority of PCI requirements.