Advanced Security for Account Managers-ASAM Number: 646-580 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/
Exam A QUESTION 1 What are three major trends that fuel the demand for security? (Choose three.) A. mobility B. collaboration C. bandwidth optimization D. cloud E. IT standardization Correct Answer: ABD /Reference: QUESTION 2 What does not need to be considered in regard to the customer's workflow? A. how the customer securely accesses the online software solutions B. the number of antivirus products that are in use on the customer's network C. how the service partner can securely use outsourced engineers D. how the service engineer accesses customer and service company information Correct Answer: B /Reference: QUESTION 3 Which three statements accurately describe the evolution of the workplace and its impact on security? (Choose three.) A. Mobility causes location borders to shift. B. Cloud services cause end-user locations to shift. C. Cloud services cause application borders to shift. D. IT consumerization causes location borders to shift. E. IT consumerization causes device borders to shift. Correct Answer: ABE /Reference: QUESTION 4 Which two statements best describe the challenges that customers encounter when providing services in a borderless world? (Choose two.) A. how to secure standardized end-user equipment
B. how to manage security C. how to access cloud applications and data securely D. how to secure access within the company network E. the type of WAN to deploy Correct Answer: BC /Reference: QUESTION 5 What are two security effects of BYOD? (Choose two.) A. TCO is reduced because employees use their privately owned devices. B. Corporate content must be secured on devices that are owned by employees. C. Numerous new devices must be securely integrated into the corporate infrastructure. D. Corporate users expect the same look and feel when using their own devices. Correct Answer: BC /Reference: QUESTION 6 Which statement best describes the impact of cloud applications? http://www.gratisexam.com/ A. Moving applications to the cloud simplifies security. B. Access to cloud applications is only possible from dedicated endpoints. C. There is no need to inspect data coming from the cloud for malicious content. D. Using cloud services causes loss of control, which needs to be addressed by additional security measures. Correct Answer: D /Reference: QUESTION 7 Which statement is true regarding the security of IPv6? A. IPsec is an integrated part of IPv6 and, therefore, all IP-related security threats are eliminated when using an IPv6-only network.
B. Existing IPv4 firewalls can secure IPv6 traffic if IPv6 is tunneled over IPv4. C. Existing IPv4 firewalls can secure IPv6 traffic unless IPv6 is tunneled over IPv4. D. Endpoints that tunnel IPv6 over IPv4 can traverse firewalls without inspection of the IPv6 traffic. Correct Answer: D /Reference: QUESTION 8 What is a major challenge in the retail market? A. supply chain reduction B. enabling IPsec VPN connectivity to the customers C. securing critical data, such as payment information D. sharing confidential content with customers Correct Answer: C /Reference: QUESTION 9 What are two requirements to enable centralized PoS applications? (Choose two.) A. physical security at the stores B. IP surveillance at the stores C. secure network infrastructure D. implementing intrusion prevention at the network edge of the stores E. reliable and highly available network infrastructure Correct Answer: CE /Reference: QUESTION 10 What is a major challenge of manufacturing markets? A. managing global supply chains B. creating a comprehensive learning experience C. securing online payment information D. sharing confidential content with a large audience Correct Answer: B /Reference:
QUESTION 11 What are two challenges that are specific to the education market? (Choose two.) A. share confidential content securely with a large audience B. create a comprehensive learning experience C. manage global supply chains D. high capital expenditure E. global competition Correct Answer: AB /Reference: QUESTION 12 Which vertical segment is most affected by operating regulatory requirements? A. education B. finance C. anufacturing D. etail Correct Answer: B /Reference: QUESTION 13 What are the three main drivers for changing operations? (Choose three.) A. change of market trends B. change of competition C. change of application software version D. change of relative strengths E. change of networking equipment in the network F. change of ISP G. change of internal collaboration solutions Correct Answer: ABD /Reference: QUESTION 14 What are two common requirements of most tasks in business processes? (Choose two.) A. interaction
B. sharing office spaces C. collaboration D. globalization E. managing external resources Correct Answer: AC /Reference: QUESTION 15 Which statement correctly describes the relevance of security within a business process? A. In order to create a streamlined business process, all devices and applications must be integrated securely and reliably. B. Each business process on its own relies on a small fragment of the overall security implementation. C. Operations are a key enabler of security. D. Security is influenced by quality, performance, cost, and time of a business process. Correct Answer: A /Reference: QUESTION 16 From a business perspective, what is the main advantage of Cisco security architecture? A. ability to maintain high operational agility while changes to operations, processes, staff, and infrastructure occur B. ease of management C. reduction of TCO D. ability to easily adapt business processes based on changes in the security architecture Correct Answer: A /Reference: QUESTION 17 What are two major differentiators between Cisco and the competition? (Choose two.) A. BYOD architecture B. Cisco SecureX architecture and services C. Cisco Secure ACS D. Cisco TrustSec E. Cisco ASA Correct Answer: BD
/Reference: QUESTION 18 Which two statements are true regarding Cisco leadership in security technologies? (Choose two.) A. Cisco is the market leader in enterprise security revenue. B. Gartner evaluated Cisco as the leader in IP surveillance, SSL VPN, and email security. C. Gartner evaluated Cisco as the leader in SSL VPN, secure web gateway, network access D. Cisco has a background of more than 25 years of proven firewall development. Correct Answer: AC /Reference: QUESTION 19 Which two statements best describe an enterprise architecture? (Choose two.) A. The organizing logic for business processes and IT infrastructure reflects the integration and standardization requirements of the company's operating model. B. The organizing logic for business processes and communication paths reflect the requirements of the company's operational model. C. The alignment of various elements and systems into one holistic entity. D. The operating model is the desired state of business process integration and business process standardization for delivering goods and services to customers. E. The operational model is the desired state of the IT infrastructure that is required for delivering goods and services. Correct Answer: AD /Reference: QUESTION 20 What are three foundational principles of Cisco SecureX Architecture? (Choose three.) A. network management B. content access control C. context-aware security enforcement D. virtual office management E. network and global intelligence F. context-aware policy G. virtual security Correct Answer: CEF
/Reference: QUESTION 21 Which two statements describe Cisco Security Intelligence Operations? (Choose two.) A. Cisco Security Intelligence Operations is a service that is included with initial product purchases and SMARTnet support contracts. B. Cisco Security Intelligence Operations is a free service. C. Cisco Security Intelligence Operations collects real-time security information from sensors that are deployed across the globe. D. Security data is collected, collated, and processed at sensors, and identified threats are reported to Cisco security operations centers. Correct Answer: AC /Reference: QUESTION 22 What is the role of Cisco AnyConnect in a borderless network? A. Cisco AnyConnect is the network component that provides access control to switch ports. B. Cisco AnyConnect enables secure, reliable, and seamless connectivity of authorized devices within the borderless network. C. Cisco AnyConnect enables malicious content to be filtered from HTTP traffic. D. Cisco AnyConnect is a host intrusion prevention application that includes a personal firewall. Correct Answer: B /Reference: QUESTION 23 Which two statements apply to a collaboration architecture that is integrated with Cisco SecureX? (Choose two.) A. Security services are available at the network level. B. Security services are available for collaboration appliances only. C. Security services are available for collaboration services. D. Security services are not available for client services. E. Cisco AnyConnect does not support secure connectivity to enable access to collaborative applications from mobile devices. Correct Answer: AC /Reference: QUESTION 24
What are two core components of a highly secure Cisco BYOD solution? (Choose two.) A. mobile code B. diverse access infrastructure C. contextual policy D. complex management E. efficient and seamless security Correct Answer: CE /Reference: QUESTION 25 What are four advanced BYOD use cases? (Choose four.) A. guest Wi-Fi B. corporate Wi-Fi C. personal mobile device with profiling and provisioning D. VPN access E. mobile mail F. wired BYOD G. mobile voice and video access Correct Answer: CDFG /Reference: QUESTION 26 What is the primary requirement for collaboration and social media? A. enabling BYOD transformation B. protecting network edges C. authorizing content use D. securing cloud transition Correct Answer: C /Reference: QUESTION 27 What are two driving factors for implementing an open, yet secure, network solution? (Choose two.) A. the need for lower TCO B. the need to access the Internet and cloud-based services from within the enterprise C. the need to access assets that are located within the enterprise from remote locations
D. the need for less downtime E. the need to access assets within the enterprise from office desks Correct Answer: BC /Reference: QUESTION 28 Which two statements are correct concerning Cisco Validated Design? (Choose two.) A. Cisco Validated Design consists of systems that are designed, tested, and documented to facilitate and improve customer deployments. B. Cisco Validated Design incorporates a limited range of technologies and products into a portfolio of solutions that have been developed to address the business needs of customers. C. The design zone for security cannot offer validated designs for several categories. D. SMARTnet provides access to a demonstration lab for each validated design. Correct Answer: AC /Reference: QUESTION 29 Which two statements are true about Cisco Smart Business Architecture? (Choose two.) A. Cisco Smart Business Architecture shifts the view from short term and tactical to long term and strategic. B. Cisco Smart Business Architecture protects IT investments by making sure that all spending is linked to a long-term return on investment. C. Cisco Smart Business Architecture helps build a comprehensive, unified architecture that matches current and future demands. D. Cisco Smart Business Architecture guides are interactive, allowing step-by-step creation of designs that fit individual requirements.embedded Cisco Smart Business Architecture maps are available for download at each step. E. Cisco Smart Business Architecture framework supports enterprise network design without remote locations. Correct Answer: AC /Reference: QUESTION 30 What are two business values of Cisco Validated Design and Cisco Smart Business Architecture? (Choose two.) A. cost reduction B. vision C. agility D. redundancy
Correct Answer: AC /Reference: QUESTION 31 What are two driving factors for new security challenges? (Choose two.) A. increasing number of security patches distributed by operating system vendors B. increasing number of outdated encryption algorithms C. increasing number of attacks from inside the network D. increasing number of employee-owned devices accessing the corporate network E. adoption of virtualization and cloud services Correct Answer: DE /Reference: QUESTION 32 What is the best measure to cope with the new security challenges that are derived from borderless networks? A. Identify new potential entry points of attacks and deploy the appropriate security solutions at the corresponding network access point. B. Identify the vulnerabilities of newly deployed services and protect them at the appropriate point device. C. Move to a more architectural approach of security. D. Update existing security products to the latest hardware and software versions. Correct Answer: C /Reference: QUESTION 33 What are four major solution areas of Cisco SecureX Architecture? (Choose four.) A. secure network and branch B. secure access C. secure mobility D. secure data center and cloud E. secure management F. secure WAN Correct Answer: ABCD /Reference:
QUESTION 34 Which security challenge applies specifically to data center and cloud computing environments? A. lack of IEEE 802.1X support in most of the components B. cloud high availability C. lack of scaling demands D. lack of expertise on how to secure virtual and dynamic environments Correct Answer: D /Reference: QUESTION 35 What are two security products and solutions in the Cisco data center security portfolio? (Choose two.) A. Cisco IP Phone VPN B. Cisco Virtual Security Gateway C. Cisco Nexus 1000V Switch D. Context-Based Access Control Correct Answer: BC /Reference: QUESTION 36 Which product provides zone-based and policy-driven security via a virtual firewall? A. Cisco Virtual Security Gateway B. Cisco ASA 5505v C. Cisco Nexus 1000V D. IPS sensor Correct Answer: A /Reference: QUESTION 37 Which statement correctly describes Cisco VXI security? A. Cisco Virtual Security Gateway protects the virtual environment within the data center. B. Cisco IOS security features secure the data center to defend against unauthorized access. C. Cisco ScanSafe establishes trust between an authorized client and the data center. D. Cisco VXI offers a holistic approach to VDI for customers, but does not include a high-quality rich-media experience.
Correct Answer: A /Reference: QUESTION 38 What are two security challenges of the distributed edge? (Choose two.) A. limited user awareness B. exponential growth in bandwidth C. limited device awareness D. easy policy consistency enforcement E. Internet connectivity redundancy Correct Answer: AC /Reference: QUESTION 39 What are five devices that are suitable to protect the branch and the distributed edge? (Choose five.) A. Cisco ASA B. Cisco IPS C. Cisco IronPort Web Security Appliance D. Cisco Virtual Security Gateway E. Cisco ISR G2 F. Cisco ScanSafe G. SaaS Gateway Correct Answer: ABCEF /Reference: QUESTION 40 What are two security-related challenges in a BYOD mobility environment? (Choose two.) A. internal security audit B. government-defined security compliance C. data loss, stolen devices D. authorized access E. battery lifetime F. IPv6 versus IPv4 TCP/IP stack on the device Correct Answer: CD
/Reference: QUESTION 41 What are three services that are provided to a mobility environment by the Cisco AnyConnect Secure Mobility Solution? (Choose three.) A. comprehensive policy enforcement B. granular policy controls C. secure connectivity D. built-in antivirus software E. host intrusion prevention system Correct Answer: ABC /Reference: QUESTION 42 Which two challenges are related to secure mobile access? (Choose two.) A. Context-Based Access Control B. increased computational requirements in the data center C. policy-based decision whether data need to be secured D. increased TCO E. determine, based on operating system, whether data needs to be secured Correct Answer: AC /Reference: QUESTION 43 Which statement best describes Cisco TrustSec? A. Cisco TrustSec is a Cisco security solution that comprises Cisco Identity Service Engine and Cisco Security Agent. B. Cisco TrustSec is a solution that offers integrated posture, profiling, and guest services to make contextaware access control decisions. C. Cisco TrustSec is an appliance that offers integrated posture, profiling, and guest services to make contextaware access control decisions. D. Cisco TrustSec is a Cisco security product that mitigates security risks by providing comprehensive visibility into who and what is connecting across the entire network infrastructure, as well as exceptional control over what and where they can go. Correct Answer: B
/Reference: QUESTION 44 What is the role of the Cisco AnyConnect Secure Mobile Solution in a mobility environment using Cisco TrustSec? A. Cisco AnyConnect is a unified client that provides secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution automatically detects the networking environment and applies an appropriate security policy. B. Cisco AnyConnect is a client for PCs and laptops, providing secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution automatically detects the networking environment and applies an appropriate security policy. C. Cisco AnyConnect is a unified client that provides secure and intelligent always-on connectivity.the Cisco AnyConnect Secure Mobile Solution natively provides comprehensive security features. D. Cisco AnyConnect is a client for smart phones and tablets only, providing secure and intelligent always-on connectivity.cisco AnyConnect supports Cisco ScanSafe web security to protect mobile devices from malicious web content and threats. Correct Answer: A /Reference: QUESTION 45 Which of these is not a key point when selling security solutions? A. being aware of market trends and challenges B. identifying the stakeholders C. asking the right questions D. understanding all the technical details of the new features at the bit level Correct Answer: D /Reference: QUESTION 46 What are three important components of a business plan? (Choose three.) A. implementation plan B. design of the technical solution, Bill of Materials C. impact on business, key performance indicators D. updated security policy E. value creation Correct Answer: BCE /Reference:
QUESTION 47 Which statement best describes total cost of ownership? A. TCO is the sum of all capital expenditures. B. TCO consists of direct costs (CapEx) and indirect costs, such as labor and training. C. TCO consists of direct costs (CapEx) and indirect costs, such as training, user productivity, competitive advantage, and potential of growth. D. TCO is relevant to the finance manager only. Correct Answer: B /Reference: QUESTION 48 Which statement is true regarding TCO calculations? A. Different stakeholders have the same expectations regarding the TCO calculation. B. Cisco Capital financing offers is a service that provides simple budgeting services and helps customers to convert OpEx to CapEx. C. Business benefits that are beyond the TCO and cannot be measured exactly should not be part of the TCO calculation and therefore should not be presented to the customer. D. Account managers should emphasize strategic values of Cisco SecureX by showing how Cisco SecureX supports the main current market transitions (mobility, collaboration, cloud services, and IT consumerization). Correct Answer: D /Reference: QUESTION 49 Customers might believe that a multivendor solution that is the best product in its category allows more choices and is generally cheaper.what is the weakest argument against this belief? A. The maximum TCO premium of Cisco over other vendors, in most cases, is not more than 7 percent due to IT savings and extended product lifecycles.in addition, Cisco SecureX provides architectural benefits. B. Labor constitutes up to 50 percent of TCO and Cisco delivers 5 to 10 percent labor savings driven by the Cisco end-to-end security approach and single-vendor platform. C. The Cisco architectural approach delivers quality solutions that include improved network uptime, higher user productivity, and lower threat of security breaches. D. Cisco addresses the higher costs with Cisco Capital financing offers. Correct Answer: D /Reference: QUESTION 50
Considering the large number of security vendors, customers may be confused about the role that Cisco has in this market.which two statements correctly describe the Cisco market share? (Choose two.) A. With a market share of more than 20 percent, Cisco is the leader in security appliances and software. B. With a market share of more than 30 percent, Cisco is second in security appliances and software. C. In addition to the security-related products, Cisco SecureX Architecture fully integrates all architectures across the widest networking, collaboration, and data center portfolio in the marketplace. D. Considering Cisco security-related products and security services, the Cisco market share is more than 85 percent. Correct Answer: AC /Reference: QUESTION 51 Business priorities, or customer pain points, are what influence most customer decisions.cisco Smart Services address which three critical business priorities? (Choose three.) A. increase operational efficiency B. deliver training C. improve network availability, compliance, and security D. enable business agility E. organize files F. improve customer satisfaction Correct Answer: ACD /Reference: QUESTION 52 Cisco Collaborative Professional Services allows partners to combine their resources with Cisco assets to perform which three tasks? (Choose three.) A. expand or augment partner professional services B. increase customer satisfaction C. encourage high-margin service revenues D. enable sales of complex networks and architectures E. shift focus to Cisco F. replace partner services Correct Answer: ACD /Reference: QUESTION 53 What are three advantages of a Cisco smart-enabled network? (Choose three.)
A. capture of real-time data B. identification of stresses and potential points of failure C. excessive device monitoring cost D. complex asset and contract management E. time to resolution increases F. reduction of business disruption and internal customer support Correct Answer: ABF /Reference: QUESTION 54 What are four capabilities that are inherent to all Cisco Smart Services? (Choose four.) A. installed base management B. alerts C. device diagnostics D. smart interactions E. 24-hour network monitoring F. trending analysis Correct Answer: ABCD /Reference: QUESTION 55 What are three value statements of SMARTnet Total Care? (Choose three.) A. It provides a more accurate picture of the installed base. B. It reduces administrative effort at time of renewal. C. It eliminates the need for foundational technical support. D. It provides improved risk management. E. It provides professional services assistance. F. It includes network assessment services. Correct Answer: ABD /Reference: QUESTION 56 What are three important indicators or drivers for a Cisco Network Optimization Service engagement? (Choose three.) A. no changes to the customer network
B. issues with network stability C. new technologies that might be disruptive to the network D. acquisition of a new company and in need of merging IT infrastructures E. fast, reliable, easy-to-complete network audits F. ample IT staff to conduct extensive trending and benchmarking analysis Correct Answer: BCD /Reference: http://www.gratisexam.com/