700-765
Free trial
Verified
Question 1
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
- A: More users
- B: More devices
- C: More networks
- D: More IT professionals
- E: More vulnerabilities
Question 2
Which two security risks are created by legacy approaches to networking? (Choose two.)
- A: network downtime
- B: user vulnerability
- C: slow containment
- D: access points
- E: large attack surface
Question 3
What are three security blind spots that must be addressed? (Choose three.)
- A: Workloads
- B: Data
- C: Networks
- D: IT
- E: Applications
- F: Email
Question 4
Which two IoT environment layers are protected by ISE? (Choose two.)
- A: Endpoints
- B: Access Points
- C: Control Layer
- D: Things
- E: Internet/Cloud
Question 5
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
- A: global threat intelligence
- B: security automation
- C: advanced threat protection and rapid remediation
- D: contextual awareness
Question 6
What does ThreatGrid integrate?
- A: File reputation and behavioral indications of compromise
- B: Malware analysis and threat intelligence
- C: Threat intelligence and access control
- D: File trajectory and time signatures
Question 7
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
- A: Block BYOD devices
- B: Always verify and never trust everything inside and outside the perimeter.
- C: Limit internal access to networks.
- D: Only grant access to authorized users and devices.
- E: Require and install agents on mobile devices.
Question 8
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?
- A: Platform exchange grid
- B: TACACS+ Device Administration
- C: Context-aware access
- D: Centralized policy management
Question 9
What are two result of utilizing a fragmented security model? (Choose two.)
- A: Reduced malicious file risk through additional segmentation.
- B: Decreased network accessibility through multiple applications.
- C: Decreased visibility and limited understand of security coverage.
- D: Increased identity controls
- E: Individual components pieced together to meet requirements.
Question 10
Which feature of AnyConnect provides better access security across wired and wireless connections with 802.1X?
- A: Flexible AAA Options
- B: Trusted Network Detection
- C: Secure Layer 2 Network Access
- D: AnyConnect with AMP
Question 11
Which two products are involved in granting safe access to apps? (Choose two.)
- A: ISE
- B: ACI
- C: TrustSec
- D: Duo
- E: SD-Access
Question 12
Which two Cisco products help manage data access policy consistently? (Choose two.)
- A: Stealthwatch
- B: pxGrid
- C: Duo
- D: AMP for Endpoints
- E: Cloudlock
Question 13
What are two solutions Cisco offers for email security? (Choose two.)
- A: Tetration
- B: Meraki
- C: Cloudlock
- D: Umbrella
- E: AMP for Email Security
That’s the end of your free questions
You’ve reached the preview limit for 700-765Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!