650-568 - Cisco Web Security Field Engineer Specialist
Go back to Cisco
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?
Defined separately for each Identity
In which service component should troubleshooting of the endpoint solution be executed?
Incident or Problem Management
Which task belongs to the Ongoing Support Handoff Meeting?
Explain How to Open and Track a Case, Explain Who from the Customer Should Open a Case, and What Should Be Done Prior to Opening a Case
In which of the following phase are the business requirements of the customer identified and documented?
Which of the following definitions best describes business requirements development within prepare phase?
A Set of service component activities that assess and documents the business requirements of a customer
Assessing the task performance of functional groups and comparing it with recommended best practices and the requirements of the standard operating procedures of the customer are parts of the analysis of which service component within the design phase?
Staff Plan Development
Who has the responsibility to act as an advocate for both partner and customer?
Which two operations technology strategy development activities within the prepare phase are performed recommending people, processes and tools supporting the operations and management of a system to the customer?
Analyze documented business and technology requirements of the customer
Identify and assess the operational requirements that address and meet the business objectives and goals of the customer
A single transaction can be scanned in parallel by:
Webroot and Sophos
What feature on the WSA provides Day Zero Revocation of access to third party sites such as Salesforce?
SaaS Access Control
Which of the following is an activity of the site readiness assessment service component in the plan phase
Assess Infrastructure Requirements
Which of the following is the best definition of the Cisco Lifecycle Services approach?
Defines the minimun set of services required to successfully deploy and operate Cisco technologies
Which resource is most often used during the Detailed Design Development Feature/Functionality Design Development?
Product Configuration Checklist
which statement is false?
custom URL categories cannot contain IP addresses
If a web site is blocked because it has a low web reputation score, which of the following is contained in the (un-customized) End-User Notification?
The Treat Type.
In the security design phase, which service component provides a comprehensive, implementation-ready design for a security solution for the customer?
Detailed Design Development
Bandwidth limits cannot be:
per (LDAP) group
What are PAC files used for?
explicit forward mode proxy deployments
which statement about WSA user authentication is true?
a single WSA can have multiple LDAP realms
In the implement phase, staging involves installation and testing the customer's solution components in a non-production lab environment. Which of the following defines the benefit to the partner ?
Staging validates the system and proactively identifies and resolves any network implementation issues. It demonstrates to the customers that the partner will deploy a quality network in an efficient manner and mitigates risk that the incorrect software or hardware is delivered to the installation site
Which two tasks are conducted as part of the "assess current security management procedures" activity? (Choose two)
Evaluate Escalation Procedure
Review Security Alerts and Notification Requirements
which of these is not part of the pre_ installation worksheet?
which of these provide centralized reporting for the S-Series?
sawmill for Cisco IronPort
you are helping the customer customer configure anthentication, a new asyncOS upgrade becomes available, what should you do?
schedule a convenient time to upgrade again, backing up the configuration before and after the upgrade
Which the design phase, a network development that lacks documented details and tasks related to deploying and commissioning a network infrastructure is likely to benefit from the deliverables in which service component?
Implementation Plan Development
In the access log, what does an ACL tag beginning with BLOCK_ADMIN indicate?
the transaction was manually blocked by the administrative user
Which two of these activities are included in the operations plan development service component in the security desing phase ? (Choose two)
Operational Desing Development.
why does L4TM require T1 to be in promiscuous mode?
to process traffic that is not intended for its MAC address
Which statement about using McAfee and Webroot together is true?
it is recommended: the system will detect more malware
Which two key tasks are conducted in the Security Readiness Assessment service component in the plan phase? (Choose two)
Analyze gaps between the current infrastructure and requirements for security solution
Assess technical infrastructure for the security solution
what is "stream scanning?
passing pieces of a download to the client while the download is being scanned
In which service component of the security operate phase would an escalation notification plan be used?
Incident or Problem Management
Which of these activities are included in the operate phase change management service component?
Standardize methods and procedures for authorizing, documenting, and performing changes to a security system.
Which activity is done in Project Management?
Confirm Project Roles and Responsibilities
Which of these is a drawback in using McAfee heuristic scanning?
heuristic scanning increases the probability of false positives
Which CLI command is used to create a W3C log?
Which task is conducted as part of the optimization workshop?
Document New Corporate Business initiatives requirements
During the implement phase, systems acceptance testing does which of the following for the customer?
Provides an objective means of measuring system operability and functionality
Which service component in the implement phase includes activities such as obtaining customer satisfaction, holding a lessons-learned meeting, and updating leading practices?
Which two service component are performed during the security implement phase ? (Choose two)
In Which service component are gaps between current infrastructure and requirements for CSA analyzed?
Site Readiness Assessment
In which service component of the security operate phase are network issues analyzed to identify trends?
when do you need to configure the P1 interface?
whenever you have a separate management VLAN or subnetwork
Which task may be performed as part of an IPS mode implementation?
Connect the Sensor to the Management Station
Which two of these activities comprise the mplementation plan development service component in the desing phase? (Choose Two)
Develop the System Implementation Plan.
Present System Implementation Plan
Where are the current escalation procedures of the customer typically documented?
Security Readiness Assessment
Which credentials must be entered into the S-Series GUI when joining the Active domain?
the credentials of a privileged account on the Active directory server
Which three high-level design development activities within the prepare phase are performed to create a design that addresses the business and technical needs of the customer? (Choose three.)
Identify appropriate products, features and functionalities that address business and technical requirements and goals
Analyze Business and Technology Requirements
Produce a documented High-level Design
Which Service component within the prepare phase provides a high-level, conceptual architecture of the proposed system that addresses the business requirements of the customer ?
High-Level Design Development
How is PIM usually run?
via a login script or GPO at the time that the user log on.(My Answer)