Certbus > Cisco > Cisco Security Architecture > 700-760 > 700-760 Online Practice Questions and Answers

700-760 Online Practice Questions and Answers

Questions 4

Which two attack vectors are protected by NGFW? (Choose two.)

A. Web

B. Cloud

C. Mobile

D. Data Center

E. Email

Browse 55 Q&As
Questions 5

Which two benefits of flexible purchasing does Cisco provide? (Choose two.)

A. Simplify the datacenter

B. Meet immediate needs

C. Roll out more solutions

D. Plan for the future

E. Reduce training needs

Browse 55 Q&As
Questions 6

What does remote access use to verify identity?

A. MFA

B. Remote Access VPN

C. Agents

D. AMP for Endpoints

Browse 55 Q&As
Questions 7

What are two key Cisco loT use cases? (Choose two.)

A. Mobile Utilities

B. Financial Institutions

C. Parks and Recreation

D. Industrial Security

E. Connected Health

Browse 55 Q&As
Questions 8

What are two results of utilizing a fragmented security model? (Choose two.)

A. Individual components pieced together to meet requirements.

B. Decreased visibility and limited understand of security coverage.

C. Reduced malicious file risk through additional segmentation.

D. Decreased network accessibility through multiple applications.

E. Increased identity controls.

Browse 55 Q&As
Questions 9

What are two common seller obstacles? (Choose two.)

A. Unresponsive potential customers

B. Overcrowded portfolios

C. Complexity of solution components

D. Fragmented solutions

E. Seller competition

Browse 55 Q&As
Questions 10

In which two ways should companies modernize their security philosophies? (Choose two.)

A. Reinforce their threat-centric security tactics.

B. Decrease internal access and reporting

C. Expand their IT departments.

D. Rebuild their security portfolios with new solutions

E. Complement threat-centric tactics with trust-centric methods.

Browse 55 Q&As
Questions 11

What is an attribute of Cisco Talos?

A. Detection of threats communicated within 48 hours of occurrence

B. Blocks threats in real time C. Real-time threat information

D. D. 3rd party applications integrated through comprehensive APIs

Browse 55 Q&As
Questions 12

Which two security risks are created by legacy approaches to networking? (Choose two.)

A. network downtime

B. user vulnerability

C. access points

D. slow containment

E. large attack surface

Browse 55 Q&As
Questions 13

Which two products are involved in granting safe access to apps? (Choose two.)

A. ACI

B. Identify Services Engine

C. TrustSec

D. Duo

E. SD-Access

Browse 55 Q&As
Questions 14

Which three products are Cisco Advanced Threat solutions? (Choose three.)

A. Stealthwatch

B. Web Security

C. Remote Access VPN

D. ThreatGrid

E. Advanced Malware Protection (AMP)

F. Next-Generation Firewall (NGFW)

G. Next-Generation Intrusion Prevention System (NGIPS)

Browse 55 Q&As
Questions 15

Which two types of recurring revenue sales does Cisco offer? (Choose two.)

A. Platform subscription sale

B. License sale

C. Portfolio

D. Subscription sale

E. Training

Browse 55 Q&As
Questions 16

Which two attack vectors are protected by Next-Generation Intrusion Prevention System (NGIPS)? (Choose two)

A. Cloud

B. Data Center

C. Corporate WAN

D. Endpoints

E. Email

Browse 55 Q&As
Questions 17

Which two attack vectors are protected by Email Security? (Choose two.)

A. Voicemail

B. Mobile

C. Email

D. Web

E. Cloud

Browse 55 Q&As
Questions 18

Which two aspects of Cisco solutions save customers money? (Choose two.)

A. fewer resources to manage

B. faster integration

C. replacing current infrastructure completely

D. 100% effectiveness

Browse 55 Q&As
Exam Code: 700-760
Exam Name: Cisco Security Architecture for Account Managers
Last Update: Apr 19, 2024
Questions: 55 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99