646-580 - Advanced Security for Account Managers

Go back to Cisco

Example Questions

A company suffered from a critical security breach and experienced considerable downtime. They decided to reassess the security policy and rebuild the network infrastructure. Which three business problems does the Self.Defending Network initiative address? (Choose three.) Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information? Which statement best describes Cisco TrustSec? During the optimize phase, how can the account manager help the customer reach operational excellence? Which two of these statements describe how the systems approach benefits customers? (Choose two.) What is the role of the Cisco AnyConnect Secure Mobile Solution in a mobility environment using Cisco TrustSec? Which two of these describe how security contributes to profitability? (Choose two.) Select a government regulation according to the following description. It is an internationally recognized generic standard and is implemented to create a common information security structure based on recognized best practices. What is it? How do you go about assessing the impact of business disruptions? Which two factors should be considered when calculating the cost of recovery? (Choose two.) How does preliminary technical discovery benefit the customer? Which Cisco Security Solution helps organizations to effectively avoid disruptions that are caused by worms or viruses, while also helping to control the costs of deploying and maintaining a secure network? Continuance and protection fall under which layer of the business resilience model? Which principal characteristic of the Cisco SDN allows endpoints to be admitted to the network based on their adherence to security policy as enforced by routers and switches? What are two challenges that are specific to the education market? (Choose two.) You are meeting with a financial customer who is concerned about Internet worms, viruses, and other threats. A worm or virus would cost millions of dollars in lost productivity, and malware or spyware could result in information theft. How should you position Anti-X defenses with this customer? Which government regulation specifies which patient information must be kept private, how companies must secure the information, and the standards for electronic communication between medical providers and insurance companies? A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate traffic cannot be processed, and the company cannot function. This causes which security pain point? The ScanSafe SearchAhead feature does what? Which two statements best describe the challenges that customers encounter when providing services in a borderless world? (Choose two.) What are three services that are provided to a mobility environment by the Cisco AnyConnect Secure Mobility Solution? (Choose three.) What does not need to be considered in regard to the customer's workflow? Which two factors should be considered when calculating the cost of downtime?(Choose two.) When determining business pain points at the operations level of an organization, an account manager should focus on which two critical success factors? (Choose two.) Which two of these statements describe why Cisco offers the security solution with the lowest operational cost? (Choose two.) You are meeting with an enterprise customer that has a multivendor network. Which Cisco Security product should you position with this customer? Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.) What is one way that Cisco Security can decrease customer implementation costs? What are two driving factors for new security challenges? (Choose two.) You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this customer? After the technology strategy meeting occurs, which two of these statements describe how further value is added for the customer? (Choose two.) Which availability has ScanSafe maintained over the last seven years? Which statement best describes the Cisco IronPort S-Series? Which two Cisco SDN benefits would you emphasize when discussing security solutions with a business decision-maker? (Choose two.) How is the Cisco SDN strategy collaborative? Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance? Which two of these statements describe how the Cisco Lifecycle Services approach benefits the customer? (Choose two.) What are two core components of a highly secure Cisco BYOD solution? (Choose two.) How is the Cisco ASA 5500 Series adaptive in terms of the principal characteristics of the Cisco SDN strategy? Which statement is true regarding TCO calculations? You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer? Which two of these describe how NAC increases enterprise resilience? (Choose two.) Which two of these choices describe how the secure network access solution provides value to the customer? (Choose two.) Which statement best describes the Cisco SDN strategy? Which two threat defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.) Which two of these best describe how the Cisco Lifecycle Services approach provides value for partners? (Choose two.) Which two statements are correct concerning Cisco Validated Design? (Choose two.) Which security product supports up to three Cisco Security devices and an unlimited number of CSAs? Which two statements are true about Cisco Smart Business Architecture? (Choose two.) How do you calculate risk quantitatively for SLE?