646-580 - Advanced Security for Account Managers
Go back to
Cisco
Example Questions
A company suffered from a critical security breach and experienced considerable downtime. They decided to reassess the security policy and rebuild the network infrastructure. Which three business problems does the Self.Defending Network initiative address? (Choose three.)
asset exposure
legal liability
damage to customer confidence
Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information?
GLB Act
Which statement best describes Cisco TrustSec?
Cisco TrustSec is a solution that offers integrated posture, profiling, and guest services to make context- aware access control decisions.
During the optimize phase, how can the account manager help the customer reach operational excellence?
by enabling ongoing improvement of system performance and functionality
Which two of these statements describe how the systems approach benefits customers? (Choose two.)
It provides greater visibility.
It simplifies the environment.
What is the role of the Cisco AnyConnect Secure Mobile Solution in a mobility environment using Cisco TrustSec?
Cisco AnyConnect is a unified client that provides secure and intelligent always-on connectivity.The Cisco AnyConnect Secure Mobile Solution automatically detects the networking environment and applies an appropriate security policy.
Which two of these describe how security contributes to profitability? (Choose two.)
by decreasing downtime and productivity losses
by enabling businesses to gain the maximum advantage from advanced technologies
Select a government regulation according to the following description. It is an internationally recognized generic standard and is implemented to create a common information security structure based on recognized best practices. What is it?
BS7799/ISO 17799
How do you go about assessing the impact of business disruptions?
Probe the tangible and intangible impacts of a probable disruption.
Which two factors should be considered when calculating the cost of recovery? (Choose two.)
time (in hours) to rebuild servers
number of compromised servers
How does preliminary technical discovery benefit the customer?
Information regarding an existing customer network is analyzed,which allows an appropriate solution to be developed.
Which Cisco Security Solution helps organizations to effectively avoid disruptions that are caused by worms or viruses, while also helping to control the costs of deploying and maintaining a secure network?
Outbreak Prevention Solution
Continuance and protection fall under which layer of the business resilience model?
applications resilience
Which principal characteristic of the Cisco SDN allows endpoints to be admitted to the network based on their adherence to security policy as enforced by routers and switches?
collaboration
What are two challenges that are specific to the education market? (Choose two.)
share confidential content securely with a large audience
create a comprehensive learning experience
You are meeting with a financial customer who is concerned about Internet worms, viruses, and other threats. A worm or virus would cost millions of dollars in lost productivity, and malware or spyware could result in information theft. How should you position Anti-X defenses with this customer?
Anti-X defenses provide broad attack-mitigation capabilities and distribute defenses throughout the network, including to critical system endpoints.
Which government regulation specifies which patient information must be kept private, how companies must secure the information, and the standards for electronic communication between medical providers and insurance companies?
HIPAA
A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate traffic cannot be processed, and the company cannot function. This causes which security pain point?
DDoS attack
The ScanSafe SearchAhead feature does what?
works with major search engines, indicating in advance whether each result of a user search will be allowed or blocked if clicked
Which two statements best describe the challenges that customers encounter when providing services in a borderless world? (Choose two.)
how to manage security
how to access cloud applications and data securely
What are three services that are provided to a mobility environment by the Cisco AnyConnect Secure Mobility Solution? (Choose three.)
comprehensive policy enforcement
granular policy controls
secure connectivity
What does not need to be considered in regard to the customer's workflow?
the number of antivirus products that are in use on the customer's network
Which two factors should be considered when calculating the cost of downtime?(Choose two.)
server downtime (in hours)
average revenue per hour
When determining business pain points at the operations level of an organization, an account manager should focus on which two critical success factors? (Choose two.)
aligning network and security goals
implementing the new technology vision
Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.)
Cisco solves the broadest suite of threats.
Cisco has established partnerships with all key players.
You are meeting with an enterprise customer that has a multivendor network. Which Cisco Security product should you position with this customer?
Cisco Security MARS
Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.)
qualitative information about how Cisco can help to increase revenue and reduce costs
a review of customer security pain points and business needs that you learned about during the discovery process
What is one way that Cisco Security can decrease customer implementation costs?
by using the existing infrastructure
What are two driving factors for new security challenges? (Choose two.)
increasing number of employee-owned devices accessing the corporate network
adoption of virtualization and cloud services
You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this customer?
The Cisco Self-Defending Network includes NAC, which evaluates devices that may not have the latest antivirussoftware or operating system patch, and either denies access to those devices or quarantines them.
After the technology strategy meeting occurs, which two of these statements describe how further value is added for the customer? (Choose two.)
The customer requirements and proposed solution are reviewed to ensure alignment.
Partners work with the customer to map appropriate security technologies to both the documented business and technical requirements.
Which availability has ScanSafe maintained over the last seven years?
100%
Which statement best describes the Cisco IronPort S-Series?
designed from the ground up as a web security appliance
Which two Cisco SDN benefits would you emphasize when discussing security solutions with a business decision-maker? (Choose two.)
Cisco SDN protects corporate information assets.
Cisco SDN helps meet regulatory requirements.
How is the Cisco SDN strategy collaborative?
Security features allow for communication between endpoints,network elements,and policy enforcement.
Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance?
Cisco Security MARS
Which two of these statements describe how the Cisco Lifecycle Services approach benefits the customer? (Choose two.)
It enables the customer to make sound financial decisions by establishing the financial justification for making a technology change.
It enables operational excellence by ongoing improvement of system performance and functionality.
What are two core components of a highly secure Cisco BYOD solution? (Choose two.)
contextual policy
efficient and seamless security
How is the Cisco ASA 5500 Series adaptive in terms of the principal characteristics of the Cisco SDN strategy?
The Adaptive Identification and Mitigation services architecture of the Cisco ASA 5500 Series allows businesses to adapt and extend the security services profile through highly customizable flow-specific security policies. These policies tailor security needs to application requirements while providing performance and security services when and where they are needed.
Which statement is true regarding TCO calculations?
Account managers should emphasize strategic values of Cisco SecureX by showing how Cisco SecureX supports the main current market transitions (mobility, collaboration, cloud services, and IT consumerization).
You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer?
Cisco SDN solutions are adaptive,allowing for innovative behavioral methods to be deployed in order to automatically recognize new types of threats as they arise. Mutual awareness can exist among and between security services and network intelligence,thus increasing security effectiveness and enabling a much more proactive response to new types of threats.
Which two of these describe how NAC increases enterprise resilience? (Choose two.)
prevents noncompliant and rogue endpoints from impacting network availability
provides comprehensive admission control across all types of networks (LAN,WAN,wireless,VPN)
Which two of these choices describe how the secure network access solution provides value to the customer? (Choose two.)
makes mobility more cost-effective
reduces the amount of equipment
Which statement best describes the Cisco SDN strategy?
The SDN strategy is to protect business processes and the network of an organization by identifying, preventing,and adapting to security threats and by including integrated, collaborative, and adaptive security elements throughout thenetwork.
Which two threat defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
proactive threat response
network containment and control
Which two of these best describe how the Cisco Lifecycle Services approach provides value for partners? (Choose two.)
reduces risk in deploying and supporting technologies
improves customer satisfaction ratings
Which two statements are correct concerning Cisco Validated Design? (Choose two.)
Cisco Validated Design consists of systems that are designed, tested, and documented to facilitate and improve customer deployments.
The design zone for security cannot offer validated designs for several categories.
Which security product supports up to three Cisco Security devices and an unlimited number of CSAs?
CiscoWorks VPN/Security Management Solution Basic
Which two statements are true about Cisco Smart Business Architecture? (Choose two.)
Cisco Smart Business Architecture shifts the view from short term and tactical to long term and strategic.
Cisco Smart Business Architecture helps build a comprehensive, unified architecture that matches current and future demands.
How do you calculate risk quantitatively for SLE?
exposure factor multiplied by the asset value