646-561

Advanced Security for Account Manager(ASAM)


QUESTION NO: 1
Which statement best describes the Cisco SDN strategy?
A. The SDN strategy is to protect standalone products at the physical perimeter of a network, where the LAN meets the WAN and corporate networks connect to the Internet.
B. The SDN is the most widely deployed network-admissions-control strategy, supporting organizations of all sizes as well as multiple access methods, including wireless, remote, LAN, WAN, and guest access.
C. The SDN strategy is to protect business processes and the network of an organization by identifying, preventing, and adapting to security threats and by including integrated, collaborative, and adaptive security elements throughout the network.
D. The SDN enables network elements to communicate with one another in a collaborative manner, for example, an IDS instructing an ACL to deny access to a connection.
Answer: C


QUESTION NO: 2
Because the initial product cost of a solution is often a fraction of the TCO over the life span of the solution, which two other factors should be considered when talking about the TCO of security? (Choose two.)
A. costs that are collected from a qualitative risk assessment
B. costs that are acquired from end-user training
C. costs that are associated with solution deployment
D. costs that are associated with other similar competitive product offerings
Answer: B,C
QUESTION NO: 3
Which Cisco Security offering provides host protection against security violations by focusing on the behavior of the device?
A. Cisco ASA 5500 Series Adaptive Security Appliances
B. Cisco PIX Firewall
C. Cisco Security Agent

D. Cisco Clean Access

Answer: C


QUESTION NO: 4
Which security management product combines network intelligence, context correlation, vector analysis, anomaly detection, hotspot identification, and automated mitigation capabilities?
A. Cisco Security MARS
B. CiscoWorks SIMS
C. CiscoWorks VPN/Security Management Solution Basic
D. Cisco VPN 3000 Concentrator
Answer: A


QUESTION NO: 5
Which principal characteristic of the Cisco SDN incorporates technologies that are inherent in the secure operation of network devices, including control plane policing and CPU/memory thresholding?
A. Cisco IOS software
B. integration
C. collaboration
D. secure infrastructure
Answer: B

QUESTION NO: 6
Continuance and protection fall under which layer of the business resilience model?
A. communications resilience
B. business resilience
C. network resilience
D. applications resilience
Answer: D QUESTION NO: 7


Which security product addresses deployment and ongoing management and policy configuration needs?
A. CiscoWorks VPN/Security Management Solution Basic
B. CiscoWorks SIMS
C. Cisco Network Assistant
D. Cisco Security MARS
Answer: A


QUESTION NO: 8
You are meeting with a customer who is concerned about remote employees connecting to the network with infected systems and spreading infection across the corporate network. How should you position the Cisco SDN with this customer?
A. The Cisco Self-Defending Network provides technologies that have intelligent insight into what is running on computers, so there is no possible way for remote employees to connect to the network with infected systems.
B. The Cisco Self-Defending Network is adaptive, distributing security technologies throughout every segment of the network to enable every network element as a point of defense.
C. The Cisco Self-Defending Network includes NAC, which evaluates devices that may not have the latest antivirus software or operating system patch, and either denies access to those devices or quarantines them.
D. The Cisco Self-Defending Network includes integration, which enables a more proactive response to threats with greater operational efficiency through the consolidation of multiple security services on the devices.
Answer: C


QUESTION NO: 9
In terms of the network life-cycle, what should you consider when evaluating the TCO of a security solution?
A. operation phase

B. planning and design phases
C. planning phase
D. implementation and operation phases
E. the entire network life-cycle
Answer: E


QUESTION NO: 10
Which two factors should be considered when calculating the cost of downtime? (Choose two.)
A. server downtime (in hours)
B. number of compromised servers
C. time (in hours) to rebuild servers
D. average revenue per hour
Answer: A,D
QUESTION NO: 11
How does the Cisco SDN protect organizations from worm and virus outbreaks?
A. by providing perimeter protection against unauthorized ingress and egress, providing network performance data to detect attacks, and securing desktops and laptops from malicious code
B. by protecting network endpoints, preventing infections from spreading through the network infrastructure, and monitoring the network in order to respond rapidly to outbreaks
C. by controlling access control through different technologies, securing remote access by using VPN technology, and monitoring and enforcing which applications can run on the desktop
D. by checking for recognizable patterns, or by using heuristic scanning that inspects executable files using operations that might denote an unknown virus
Answer: B
QUESTION NO: 12
Which threat can be traced back to the outbreak prevention pain point?

A. attacks through permitted traffic
B. user or administrator errors
C. protocol manipulation
D. reconnaissance probes

Answer: A


QUESTION NO: 13
To successfully sell security products, you must identify customer pain points, and then map those pain points to Cisco Security Solutions that solve them through successful threat mitigation. What are three Cisco Security Solutions that directly relate to common security pain points that are identified in the annual CSI/FBI Computer Crime and Security Survey? (Choose three.)
A. Application Abuse Prevention Solution
B. Theft of Information Solution
C. Internal Threat Prevention Solution
D. Anti-Spyware Solution
E. Outbreak Prevention Solution
F. DDoS Attack Solution
Answer: B,E,F
QUESTION NO: 14
A hacker initiates an attack that floods the network, overwhelming the company server, router, firewall, or network. Legitimate traffic cannot be processed, and the company cannot function. This causes which security pain point?
A. DDoS attack
B. theft of information
C. application security
D. Day Zero attack

Answer: A


QUESTION NO: 15
Which three technologies allow the Cisco SDN to adapt to new threats as they arise? (Choose three.)

A. firewalling
B. antivirus
C. network control
D. VPN
E. behavior recognition
F. application awareness
Answer: C,E,F
QUESTION NO: 16
Once you have concluded the discovery process, you will set up a meeting with the final decision maker and present the value proposition. Which two items would you include in your value proposition? (Choose two.)
A. a detailed review of the proposed technological enhancements that are provided in the security solution design
B. a high-level review of the Cisco Security portfolio and how it differs from competitive offerings
C. an analysis of the security-market business trends and related Cisco solution offerings
D. qualitative information about how Cisco can help to increase revenue and reduce costs
E. a review of customer security pain points and business needs that you learned about during the discovery process
Answer: D,E


QUESTION NO: 17
What is the most common reason that customers lack sufficient security?
A. Customers have not adequately analyzed their strategies and implementations.
B. Customers do not trust in innovative solution technologies that will protect their networks.
C. Customers have not appropriately assessed the size and scalability of their network structures.
D. Customers see security devices as easily sidestepped and their networks threatened anyway.
Answer: A


QUESTION NO: 18
How is the Cisco ASA 5500 Series daptive?in terms of the principal characteristics of the Cisco SDN strategy?

A. The Cisco ASA 5500 Series incorporates converged security functionalities, such as delivering converged firewall, IDS, network antivirus, and VPN services. This enables the Cisco ASA 5500 Series to become part of a solution that allows every network element to act as a point of defense, working together to provide a secure and adaptive system.
B. The Cisco ASA 550 Series is alerted by the Cisco Traffic Anomaly Detector XT or other standards-based detection solutions. It then diverts traffic that is destined for a targeted device (and only that traffic), and subjects it to the unique MVP architecture from Cisco. This blocks malicious activity that is responsible for the attack while allowing legitimate transactions to pass.
C. The Adaptive Identification and Mitigation services architecture of the Cisco ASA 5500 Series allows businesses to adapt and extend the security services profile through highly customizable flow-specific security policies. These policies tailor security needs to application requirements while providing performance and security services when and where they are needed.
D. The Cisco ASA 5500 Series includes easily deployed products that can automatically detect, isolate, and clean infected or vulnerable devices that attempt to access the network. They identify whether networked devices are compliant with your network security policies and repair any vulnerabilities before permitting access to the network.
Answer: C


QUESTION NO: 19
You are meeting with an enterprise customer that has a multivendor network. Which Cisco Security product should you position with this customer?
A. CiscoWorks VPN/Security Management Solution Basic
B. Cisco PIX Device Manager
C. Cisco Security MARS
D. Cisco Router and Security Device Manager
Answer: C QUESTION NO: 20


A Cisco Outbreak Prevention Solution provides customers with many benefits. Within this solution, which type of Cisco network security offering acts as the first line of defense to proactively isolate infections by preventing worms or viruses from infiltrating endpoints?
A. Cisco IOS infrastructure security
B. HIPS
C. Cisco antivirus software
D. NIPS
Answer: B


QUESTION NO: 21
How do Cisco Security Solutions reduce TCO?
A. by integrating firewall and VPN capabilities within routers
B. by protecting and controlling web-based applications and services
C. by proactively responding to threats through event correlation, mitigation, and policy auditing
D. by providing application security, Anti-X defense, and containment and control in one device
Answer: A


QUESTION NO: 22
Network containment and control provides the ability to layer sophisticated auditing, control, and correlation capabilities to protect any networked element across any firewall, VPN, intrusion detection mechanism, or other technology. How does this enable proactive response to threats?
A. It provides controls that limit the transmission of confidential data or policies.
B. It distributes mitigation points throughout key security-enforcement points in the network.
C. It examines message-level information to ascertain thentent?of the applications.
D. It aggregates and correlates security information.
Answer: D
QUESTION NO: 23
What is one way that Cisco Security can decrease customer implementation costs?

A. by using the existing infrastructure
B. through better security management products
C. by reducing the number of people to train
D. through dedicated security appliances
Answer: A


QUESTION NO: 24
Which three ultimately lead to a higher TCO in terms of network security? (Choose three.)
A. nonstandard configurations
B. centralized network management
C. multiple vendors that supply security
D. ongoing support services
E. security technology that is distributed into the network infrastructure
F. best-of-breed point products
Answer: A,C,F
QUESTION NO: 25
What are three benefits of the Cisco SDN that will be recognized by business decision makers? (Choose three.)
A. helps to manage IT and operational risk
B. effectively enforces security and confidentiality policies company-wide
C. provides network availability and reliability
D. protects against insecure or contaminated devices
E. helps to meet regulatory requirements
F. lowers TCO by using the existing infrastructure
Answer: A,E,F

QUESTION NO: 26
Which security management offering helps customers to readily and accurately identify, manage, and mitigate network attacks and to maintain network security compliance?
A. Cisco Security MARS
B. Cisco NAC

C. Cisco Network Assistant
D. CiscoWorks VPN/Security Management Solution

Answer: A


QUESTION NO: 27
The Cisco SDN allows organizations to manage the IT network security risk that is associated with the deployment of online business processes, ensuring that organizations achieve their objectives efficiently while managing associated risks. What are three key SDN components of the Cisco Application Abuse Prevention Solution that work together to offer this type of protection? (Choose three.)
A. endpoint protection solutions
B. VPN solutions
C. transaction security solutions
D. content security solutions
E. detector and guard solutions
F. access control solutions
Answer: A,C,D
QUESTION NO: 28
Which principal characteristic of the Cisco SDN allows endpoints to be admitted to the network based on their adherence to security policy as enforced by routers and switches?
A. integration
B. endpoint security
C. adaptation
D. collaboration
Answer: D


QUESTION NO: 29
How do you calculate risk quantitatively for SLE?
A. cost of recovery multiplied by the number of compromised servers
B. exposure factor multiplied by the asset value
C. single loss expectancy divided by the annualized rate of occurrence

D. average revenue per hour divided by the hourly server downtime
Answer: B


QUESTION NO: 30
Which security product supports up to three Cisco Security devices and an unlimited number of CSAs?
A. Cisco Security MARS
B. Cisco Network Assistant
C. CiscoWorks VPN/Security Management Solution Basic
D. CiscoWorks SIMS
Answer: C


QUESTION NO: 31
Which business enabler provides a defense against damages and losses (such as financial, legal, commercial, image, branding, property, and people), which directly affect the ability of a company to do business?
A. contribution to profitability
B. government regulations
C. protection
D. ubiquitous access
Answer: C

QUESTION NO: 32
NAC is an example of which principal characteristic of the Cisco SDN?
A. integration
B. differentiation
C. adaptation
D. collaboration
Answer: D QUESTION NO: 33


When determining business pain points at the operations level of an organization, an account manager should focus on which two critical success factors? (Choose two.)
A. aligning network and security goals
B. streamlining processes
C. implementing the new technology vision
D. decreasing TCO
Answer: A,C
QUESTION NO: 34
Which government regulation was implemented to promote world financial stability by coordinating definitions of capital and risk assessment across countries?
A. USA PATRIOT Act
B. HIPAA
C. Basel II
D. SOX
E. BS 7799/ISO 17799

Answer: C


QUESTION NO: 35
Which statement accurately describes the difference between a quantitative and a qualitative risk analysis?
A. Quantitative risk analysis attempts to determine numeric values for risk that is based on a number of factors, such as impact, duration, and asset value. A qualitative approach assigns a subjective rating to each risk that typically is based on past experience or consultant opinion.
B. Both quantitative and qualitative risk analyses determine numeric values for risk. However, a quantitative risk analysis focuses on objective information, whereas a qualitative approach focuses on subjective information.
C. Both quantitative and qualitative risk analyses determine numeric values for risk. However, a quantitative risk analysis focuses on subjective information, whereas a qualitative approach focuses on objective information.

D. Qualitative risk analysis attempts to determine numeric values for risk that is based on a number of factors, such as impact, duration, and asset value. A quantitative approach assigns a subjective rating to each risk that typically is based on past experience or consultant opinion.
Answer: A


QUESTION NO: 36
Which Cisco Security management product provides monitoring for NAC deployments?
A. CiscoWorks SIMS
B. Cisco PIX Device Manager
C. CiscoWorks VPN/Security Management Solution Basic
D. Cisco Router and Security Device Manager
Answer: C


QUESTION NO: 37
Which two Cisco security technologies can help organizations that have difficulty enforcing compliance to security policies that govern desktop antivirus software? (Choose two.)
A. NAC Appliance (Cisco Clean Access)
B. Cisco Integrated Services Routers
C. Firewall Services Module
D. Cisco PIX Firewall 500 Series
E. Cisco Security Agent
F. Cisco ASA 5500 Series Adaptive Security Appliances
Answer: A,E
QUESTION NO: 38
Which government regulation is designed to create a common information security structure that is based on recognized best practices, and is an internationally recognized generic standard?
A. BS 7799/ISO 17799
B. AS/NZS 4360
C. Basel II

D. SOX

Answer: A


QUESTION NO: 39
Which threat can be traced back to the application abuse pain point?
A. Day Zero worms and viruses
B. unauthorized user access
C. protocol manipulation
D. operational complexities
E. DoS attacks
Answer: C


QUESTION NO: 40
Which Cisco Security Solution helps organizations to effectively avoid disruptions that are caused by worms or viruses, while also helping to control the costs of deploying and maintaining a secure network?
A. Cisco Security Monitoring, Analysis and Response System
B. Theft of Information Solution
C. CiscoWorks VPN/Security Management Solution
D. Outbreak Prevention Solution
Answer: D


QUESTION NO: 41
The Cisco SDN is a strategy to protect the business processes and the network of an organization by identifying, preventing, and adapting to security threats. What are three principal characteristics of the SDN? (Choose three.)
A. protection
B. adaptation
C. application security
D. integration
E. collaboration
F. intelligence

Answer: B,D,E
QUESTION NO: 42
Which government regulation opens up an opportunity to sell a Cisco Security Solution to companies that collect financial information?
A. HIPAA
B. GLB Act
C. SOX
D. AS/NZS 4360
E. BS 7799/ISO 17799

Answer: B


QUESTION NO: 43
How does Anti-X defense stop attacks as far as possible from their intended destination and the core of the network?
A. Anti-X defense intelligently analyzes network payload.
B. Anti-X defense provides sophisticated auditing, control, and correlation capabilities to control and protect any networked element.
C. Anti-X defense examines message-level information to ascertain thentent?of the applications.
D. Anti-X defense distributes mitigation points throughout key security-enforcement points in the network.
Answer: D

QUESTION NO: 44
In which two ways does a Cisco SDN provide outbreak prevention? (Choose two.)
A. grants and enforces access rights and privileges to trusted, authenticated users
B. identifies, quarantines, and remediates improperly protected devices
C. enforces security compliance for all devices that access network resources
D. efficiently mitigatesDDoS attack damage
Answer: B,C QUESTION NO: 45


Which Cisco SDN solution offering is designed to adapt to new security threats, and extends the Cisco SDN to remote offices?
A. Cisco PIX Firewall 500 Series
B. Cisco Secure VPN Client
C. NAC Appliance (Cisco Clean Access)
D. Cisco ASA 5500 Series Adaptive Security Appliances
Answer: D


QUESTION NO: 46
You are meeting with a customer who is concerned about ongoing network threats and vulnerabilities within the corporate network. How should you position the Cisco SDN with this customer?
A. The Cisco Self-Defending Network is the Cisco solution that protects the network of an organization. The SDN strategy offers security products that will defend your network before attacks occur. SDN products use industry-leading technologies, which will enable your company to stay up to date on network security.
B. Cisco NAC is a complete, end-to-end security solution that enables endpoints to be admitted to the network based on their adherence to security policy as enforced by network devices, such as routers and switches. NAC is a solution that will protect business processes and the network of your organization by identifying, preventing, and adapting to security threats.
C. Most network threats and vulnerabilities arise from inefficient access control. Cisco VLAN solutions are apart of the Self-Defending Network strategy, and can segment users into different workgroups or virtual LANs based on whom they are, not where they are. In turn, VLAN solutions prohibit hackers from gaining network access, and will dramatically lessen the pains you are experiencing with network threats and vulnerabilities.
D. Cisco SDN solutions are adaptive, allowing for innovative behavioral methods to be deployed in order to automatically recognize new types of threats as they arise. Mutual awareness can exist among and between security services and network intelligence, thus increasing security effectiveness and enabling a much more proactive response to new types of threats.

Answer: D


QUESTION NO: 47
Which government regulation specifies which patient information must be kept private, how companies must secure the information, and the standards for electronic communication between medical providers and insurance companies?
A. HIPAA
B. Basel II
C. USA PATRIOT Act
D. GLB Act
Answer: A


QUESTION NO: 48
Which two factors should be considered when calculating the cost of recovery? (Choose two.)
A. server downtime (in hours)
B. time (in hours) to rebuild servers
C. number of compromised servers
D. average revenue per hour
Answer: B,C
QUESTION NO: 49
In which two ways does application security protect against threats being introduced from within web-enabled applications? (Choose two.)
A. Application security stops attacks as far as possible from their intended destination and the core of the network.
B. Application security intelligently analyzes network payload.
C. Application security provides sophisticated auditing, control, and correlation capabilities to control and protect any networked element.
D. Application security examines message-level information to ascertain thentent?of the applications.

E. Application security provides controls that limit the transmission of confidential data or policies.
Answer: B,D

QUESTION NO: 50
No one buys security for security itself: customers must be able to realize the benefits. Which three benefits can Cisco Security Solutions provide to customers? (Choose three.)
A. bandwidth optimization
B. increased profitability
C. zero percent of the network downtime
D. extended network access
E. compliance with government regulations
F. network convergence
Answer: B,D,E

QUESTION NO: 51
Which security pain point can be resolved by each of these security products: Cisco ASA 5500 Series Adaptive Security Appliances, Cisco PIX Firewall 500 Series, Cisco Security Agent, and the Cisco Guard DDoS Mitigation Appliances?
A. extension of the investment in an existing Cisco router by making it a fully secure WAN device
B. business disruption from an Internet attack, such as viruses, worms, and/or hackers
C. difficulty enforcing compliance to security policies that govern desktop antivirus software
D. firewall functionality that scales from the branch office to the network core
E. remote employees that require access to the corporate network

Answer: B


QUESTION NO: 52
Risk analysis is a critical part of assessing the security needs of a customer. What are three parts of the risk analysis process? (Choose three.)
A. determining the impact on business
B. analyzing competitive vendors
C. identifying potential threats
D. identifying regulatory compliancy issues (for example, Basel II )

E. prioritizing security needs
F. assessing the current state of network infrastructure
Answer: A,C,E
QUESTION NO: 53
You are meeting with the IT manager of a large campus network. This customer requires high availability, performance, and manageability in handling high-bandwidth applications and services, such as voice, video, and IP multicast. As web technologies and applications are deployed throughout enterprise networks, the application of Internet-class technology into intranets is necessary to scale campus networks to meet rising demands. How can this customer securely adopt new network services and applications without a significant performance impact?
A. through router-embedded security services
B. through a deployed Cisco Clean Access software solution
C. through a deployed CSA software solution
D. through centralized management viaCiscoWorks VPN/Security Management Solution

Answer: A


QUESTION NO: 54
Which two threat-defense features allow a network to correlate events, mitigate events, and audit policies? (Choose two.)
A. Anti-X defenses
B. network containment and control
C. application security
D. proactive threat response
E. control of data transmission
Answer: B,D
QUESTION NO: 55
What are three benefits of the Cisco SDN that will be recognized by technology decision makers? (Choose three.)
A. helps to meet regulatory requirements
B. effectively enforces security and confidentiality policies company-wide

C. lowers TCO by using the existing infrastructure
D. protects against insecure or contaminated devices
E. adapts to new and existing threats
F. increases ROI
Answer: B,D,E

QUESTION NO: 56
You are meeting with a financial customer who is concerned about Internet worms, viruses, and other threats. A worm or virus would cost millions of dollars in lost productivity, and malware or spyware could result in information theft. How should you position Anti-X defenses with this customer?
A. Anti-X defenses provide broad attack-mitigation capabilities and distribute defenses throughout the network, including to critical system endpoints.
B. Anti-X defenses enable proactive response to threats by aggregating and correlating security information.
C. Anti-X defenses intelligently analyze network payload so that application security tools can control port 80 misuse by rogue applications.
D. Anti-X defenses render malware and spyware harmless by managing patches more proactively.
Answer: A


QUESTION NO: 57
Which feature of Cisco Security MARS uses NetFlow data?
A. hotspot identification
B. anomaly detection
C. context correlation
D. automated mitigation capabilities
Answer: B


QUESTION NO: 58
Your customer wants to ensure business continuity by allowing legitimate transactions to the website while redirecting illegitimate transactions. Which Cisco SDN solution offering would satisfy this requirement?

A. Cisco Security MARS
B. Cisco GuardDDoS Mitigation Appliances
C. Cisco Secure ACS
D. Cisco NAC framework
Answer: B


QUESTION NO: 59
In which two ways does a Cisco solution directly reduce the cost of operation? (Choose two.)
A. by minimizing the number of vendors that supply security
B. by improving competitive advantage
C. by reducing overall management complexity
D. by addressing security pain points
E. by avoiding information theft
Answer: A,C
QUESTION NO: 60
Which government regulation affects companies in Australia and New Zealand that wish to comply with the first universal risk-management standard?
A. AS/NZS 4360
B. Basel II
C. BS 7799/ISO 17799
D. GLB Act
Answer: A