646-573

Cisco Lifecycle Services Advanced Security(LCSAS)


QUESTION NO: 1
What describes the Business Requirements Development service component in the prepare phase?
A. meetings with different customer stakeholders to gather the customer's requirements for the security solution
B. a process by which the partner can determine if the security solution that is being proposed matches the customer's security requirements
C. the creation of a model network that replicates the proposed security solution
D. the creation of a topology map for the solution and the identification of products and services that will be required to implement the solution
E. a process that identifies the customer's security reporting requirements
Answer: A


QUESTION NO: 2
Which service component in the plan phase must be finished before Security Readiness Assessment?
A. High Level Design
B. Technology Strategy Assessment
C. Detail Design
D. Site Readiness Assessment
Answer: D

QUESTION NO: 3
Which service component is in the operate phase?
A. Operation Assessment
B. System Acceptance Test
C. Operations Design
D. Configuration Management
Answer: D
QUESTION NO: 4

When is the escalation procedure template used in the plan phase?
A. Conduct Site Assessment Gap Analysis
B. Assess Current Security Management Procedures
C. Assess Low Level Design Complexity
D. High Level Design Development
E. Change Management Process
Answer: B
QUESTION NO: 5 DRAG DROP
Look at the picture.

Answer:

QUESTION NO: 6

Which task is part of the verify policies activity in a CSA installation?
A. Selecting an SQL Server
B. Build CSA agent installation kits to support the data collection process that is required to fine tune the CSA default policies.
C. Installing the Sensor
D. Checking Connectivity Between CSA End User and CSA Management Center

Answer: B


QUESTION NO: 7
What is the purpose of the Technology Strategy Development service component in the prepare phase?
A. Help identify and document the customer's current network architecture and security policies and create a gap analysis.
B. Create a breakdown of project task and responsibilities.
C. Include a statement of work that defines the scope of work to be completed for the proposed security solution
D. Create a network diagram that contains network topology and location of each management console.
E. Create a model network that will allow the customer to see how the proposed security technology solution will work.
Answer: A

QUESTION NO: 8
Which key task is conducted as part of Problem Management?
A. Remotely Backup Endpoint Solution Configuration and Databases
B. Select Fault Management Tools and Products
C. Provide Software Upgrades, Updates, and Bug Fixes for the Endpoint Solution System
D. Conduct Move, Adds, Changes
Answer: C


QUESTION NO: 9
Which service component in the security solution design phase provides a step-by-step plan detailing the installation activities and tasks to be performed in a controlled environment?

A. Staging Plan Development
B. Detailed Design Development
C. Implementation Plan
D. Operations Design
Answer: A


QUESTION NO: 10
Which resource is the most critical in writing a custom CSA policy?
A. CSA Reference Customer Policy
B. CSA Installation Guide
C. Technology Requirements Document
D. CSA Agent Profiler
Answer: D


QUESTION NO: 11
For a security solution, which two tasks are associated with the Business Requirements Development service component? (Choose two.)
A. Document Current Topology, Hardware and Software
B. Identify CSA, IPS or MARS System Requirements for Supporting Current Operating System Software
C. Perform Preliminary Gap Analysis
D. Identify Key Stakeholders/Business Owners for the Business Requirements Workshop and Send Invitations
E. Document Departmental Business Initiatives Requirements
F. Assess Technical Infrastructure for the Security Solution
Answer: D,E
QUESTION NO: 12
Which two key tasks are conducted in the Security Readiness Assessment service component in the plan phase? (Choose two.)
A. Determine Security Specification for Security Solution
B. Assess Technical Infrastructure for the Security Solution

C. Identify Network Security Requirements for VMS Servers
D. Determine Security Solution Feature and Function
E. Analyze Gaps Between Current Infrastructure and Requirements for Security Solution
Answer: B,E

QUESTION NO: 13
In which service component is the analysis of the customer's current security policies and procedures performed?
A. Detail Design Development
B. Site Readiness Assessment
C. Security Readiness Assessment
D. Kickoff Meeting

Answer: C


QUESTION NO: 14
In which service component of the plan phase are the customers notified about their specific responsibilities for the project?
A. Proposal Delivery
B. Account Planning
C. Site Readiness Assessment
D. Project Management
Answer: D

QUESTION NO: 15
What belongs to the implement phase?
A. Change Management
B. Operations Setup
C. Select Fault Management Tools and Products
D. Staff Training
Answer: D QUESTION NO: 16


Which activity is conducted by using CSA release notes as a resource?
A. Implement Policies and Groups
B. Fine Tune the Custom Policy
C. Install S/W and Achieve Connectivity
D. Determine CSA Feature and Function Design Specifications
Answer: C


QUESTION NO: 17
Which service component is part of the design phase?
A. Site Readiness Assessment
B. Implementation Plan
C. High Level Design Development
D. Project Planning
Answer: B


QUESTION NO: 18
What will the Security Assessment service component in the optimize phase help to do?
A. Document New High Level Training Requirements
B. Ensure Specified CSA Network Connectivity Requirements Are Met
C. Document New Logical-Level Functionality Requirements for CSA, IPS, or MARS
D. Gain Customer Agreement for Detailed Security Design Requirements
E. Identify Changes That Should Be Made to Security Policies, Procedures, or Software/Hardware Products
Answer: E

QUESTION NO: 19
Which service component is in the plan phase?
A. Physical Design Workshop
B. Operations Planning
C. Security Readiness Assessment

D. Project Milestones
Answer: C


QUESTION NO: 20
Security management tools and products are selected in which service component?
A. Detailed Design Development
B. Physical Design Workshop
C. Feature/Functional Design Workshop
D. Operations Design Development
Answer: D


QUESTION NO: 21
Which two tasks are parts of the (CSA) Security System Installation? (Choose two.)
A. Identify SQL Server Requirements
B. Determine CSA Feature and Function Design Specifications
C. Identify a Set of Systems That Will Be Protected in a Pilot Implementation Based upon Guidelines
D. Ensure Specified CSA Network Connectivity Requirements Are Met
Answer: C,D
QUESTION NO: 22
Which service component is typically performed prior to the handover to the customer's operations organization?
A. Systems Integration
B. Project Close Out
C. Skill Assessment
D. Security Check
E. Acceptance Testing
Answer: E QUESTION NO: 23



Which service component draws upon the information that is collected throughout the prepare, plan, and design phases?
A. Package and Price Design
B. Implementation Plan
C. Staging Plan
D. System Acceptance Test Plan
Answer: B


QUESTION NO: 24
Which service component should be executed before Change Management?
A. Operation Assessment
B. Escalation Process
C. Operations Design
D. Operations Setup
Answer: D


QUESTION NO: 25
What is a key objective within the Business Case Alignment service component in the optimize phase?
A. Conduct an analysis of the customer's security posture after the system has been in operation over time
B. Present the system readiness assessment report
C. Clearly articulate the customer's pain points and motivation to change
D. Document integration/migration requirements for new solution
E. Gather implementation requirements
F. Conduct a discovery workshop
Answer: A


QUESTION NO: 26
Which two tasks are part of conducting a discovery workshop in the Physical Design Workshop service component? (Choose two.)

A. Perform Risk Mitigation
B. Create a Design Specification Document
C. Create a Network Diagram
D. Define Policies and Groups
E. Discuss the Customer's System Implementation Strategy
Answer: A,E
QUESTION NO: 27
Which two key tasks belong to Acceptance Testing? (Choose two.)
A. Get Acceptance from the Customer for the Design and Project Plan
B. Coordinate Required Customer Involvement
C. Tune Policies Further if Needed
D. Stage Equipment
E. Proof of Concept
Answer: B,C

QUESTION NO: 28
Which task must be completed during the System Acceptance Test Plan service component?
A. Create a Plan to Ensure That All Hardware and Software Functions Are Included
B. Agreement on the Logistics of the Implementation with the Customer and Stakeholders
C. Determine Network Elements That Will Be Tested
D. Customer Signs a "Letter of Understanding" Based on the Design Created

Answer: C


QUESTION NO: 29
Which partner benefit is associated with executing a comprehensive System Acceptance Test Plan?
A. ensuring all necessary hardware and software products are included in the design
B. ensuring tools and procedures are in place for operating the solution on an ongoing basis.
C. correctly implementing the customer's security policies in security solution configurations
D. helping to improve margins and profitability by reducing the possibility of prolonged engagements.

Answer: D


QUESTION NO: 30
Policies and procedure guides can be used to help conduct which activity?
A. Add a Hardware-Based Reporting Device into CS-MARS
B. Execute Test Cases
C. Develop the CSA Detailed Design
D. Connect the IDS Sensor to the Management Station
E. Ensure Specified CSA Network Connectivity Requirements Are Met
Answer: C


QUESTION NO: 31
In which service component are gaps between current infrastructure and requirements for CSA analyzed?
A. CSA Operations Implementation
B. Site Readiness Assessment
C. High Level Design for CSA
D. Security Readiness Assessment
Answer: B

QUESTION NO: 32
Which task is conducted as part of developing a detailed design for IPS or IDS?
A. Identify SQL Server Requirements
B. Define Configuration Database Design
C. Define Sensor Maintenance Procedures
D. Review LAN/WAN Configurations
Answer: C
QUESTION NO: 33
In which service component of the operate phase would an escalation notification plan be used?

A. Change Management
B. Problem Management
C. Project Management
D. Operations Setup
Answer: B


QUESTION NO: 34
The Business Requirements Development service component in the prepare phase can help to document which of the following in a customer environment? (Choose two.)
A. Logical-Level System Functionality
B. System Level Functionality
C. Physical Topology Maps
D. Project Scope and Plan
E. Security Solution Feature and Function Specifications
F. Security Alerts and Notification Requirements
Answer: A,C
QUESTION NO: 35
In which service component should troubleshooting of the endpoint solution be executed?
A. System Monitoring
B. Incident or Problem Management
C. Security Administration
D. Configuration Management
Answer: B
QUESTION NO: 36 DRAG DROP
Look at the picture.


Answer:



QUESTION NO: 37
Which resource is commonly used when a CSA component is installed?
A. Low Level Design
B. Policy Guides
C. Sensor Maintenance Procedures
D. Release Notes
Answer: D
QUESTION NO: 38 DRAG DROP
Look at the picture.


Answer:


QUESTION NO: 39
Where are the current escalation procedures of the customer typically documented?
A. Security Readiness Assessment
B. Business Requirements Document
C. Preliminary Discovery Document
D. High Level Design
Answer: A


QUESTION NO: 40
The preliminary technology discovery is an important activity in the prepare phase. Which two tasks are directly associated with this activity? (Choose two.)
A. Create a Model Network That Will Allow the Customer to See How the Technology Will Function

B. Monitor VMS Event Log for Security Events
C. Document Logical-Level Functionality
D. Define Feature and Function Requirements for the Proposed Security Solution
E. Perform Preliminary Gap Analysis
F. Document Current Topology, Hardware and Software
Answer: E,F
QUESTION NO: 41
Which resource is most often used during the Detailed Design Development: Feature/Functionality Design Development?
A. System Readiness Assessment Report
B. Business Requirements Document
C. Product Configuration Checklist
D. Site Survey
E. Acceptance Test Plan

Answer: C


QUESTION NO: 42
Which activity is conducted as part of the Security Readiness Assessment?
A. Assess and Document Infrastructure Requirements for the Proposed Solution
B. Document Logical-Level Functionality
C. Document Location of Legacy Equipment
D. Assess Existing Software Operating Procedures
E. Perform Preliminary Gap Analysis
Answer: D

QUESTION NO: 43
Which task is conducted in the optimization workshop?
A. Review Security Solution Network Availability
B. Determine Network Elements That Will Be Tested
C. Verify Network Redundancy
D. Conduct User Community/Adoption Absorption Analysis

E. Review Security Solution Install Guides, Release Notes, and User Guides
Answer: D


QUESTION NO: 44
Which two service components are performed during the implement phase? (Choose two.)
A. Staff Training
B. Design Review
C. Security Readiness Assessment
D. Configuration Management
E. Project Kickoff
F. Site Readiness Specification
Answer: A,E
QUESTION NO: 45
What describes an activity during Staging?
A. Review LAN/WAN Configuration
B. Define a Reporting Infrastructure
C. Execute the Staging Test Plan and Acceptance Test Subset
D. Verify Policies
Answer: C


QUESTION NO: 46
Which task is performed during the development of a detailed design for CSA?
A. Determine Network Availability/Redundancy Specifications
B. Determine CSA Feature and Function Design Specifications
C. Define Policies and Groups
D. Review and Generate an IP Addressing Scheme
Answer: C
QUESTION NO: 47

Which activity is performed in Security Readiness Assessment?
A. Assessment and Remediation Planning
B. Assess Existing Software Operations Procedures
C. Preliminary Technology Discovery
D. Survey Facility Site
Answer: B


QUESTION NO: 48
During a CSA implementation, which activity would typically immediately follow core CSA product installation?
A. Create and Enable Rules
B. Configure Core Products
C. Implement Policies
D. Verify Policies
E. Tune Signature Files
Answer: B


QUESTION NO: 49
What is an objective of the Account Planning service component in the prepare phase?
A. Complete a Competitive Analysis
B. Review the Customer's Network Topology Maps
C. Create a Successful Demonstration of the Proposed Security Solution
D. Define the Customer's Security Pain Points
E. Review the Customer's Security Policy Documents
Answer: A


QUESTION NO: 50
Which two tasks are associated with the technology strategy meeting in the prepare phase? (Choose two.)
A. Document Security Policy Requirements
B. Determine the Security Solution Feature and Function C. Assess Current Security Management Procedures

D. Identify a Set of Systems That Will Be Protected in a Pilot Implementation Based upon Guidelines
E. Document the Customer's Current and Future Technology Projects
Answer: A,E
QUESTION NO: 51
Which activity should be finished before creating the security readiness assessment report?
A. Technology Strategy Development
B. Implementation Plan
C. Assessment of Current Security Management Procedures
D. Low Level Design

Answer: C


QUESTION NO: 52
Which two activities in a MARS implementation should be done before conducting Acceptance Testing? (Choose two.)
A. Tune for False Positives
B. Create Rules
C. Connect the Sensor to the Management Station
D. Assess Existing Software Operation Procedures
Answer: A,B
QUESTION NO: 53
For a security solution, which task is associated with the Business Requirements Development service component in the prepare phase?
A. Assess Technical Requirements for the Proposed Security Solution
B. Document System Level Functionality
C. Document Current Topology, Hardware and Software
D. Analyze the Security Solution Integration Requirements with Existing Legacy Platforms
E. Review Security Alerts and Notification Requirements


Answer: B


QUESTION NO: 54
Who has the responsibility to act as an advocate for both partner and customer?
A. Network Operation Center Engineer
B. Project Manager
C. Field Engineer
D. Account Manager
Answer: B


QUESTION NO: 55
In which service component of the operate phase are incidents analyzed to identify trends?
A. Security Administration
B. System Monitoring
C. Incident or Problem Management
D. Operations Setup
Answer: C


QUESTION NO: 56
In which service component is the electronic notification tool used?
A. Change Management
B. Security Administration
C. Configuration Management
D. Operations Setup
E. System Monitoring
Answer: E
QUESTION NO: 57
Which task is conducted during the Physical Design Workshop?

A. Create Design Specifications Document
B. Review LAN/WAN Configurations
C. Determine CSA/IDS/IPS/MARS Design Configuration
D. Generate a Physical Topology Map
Answer: B


QUESTION NO: 58
Which task may be performed as part of an IPS mode implementation?
A. Conduct POC Updates
B. Enable and Disable a Rule
C. Connect the Sensor to the Management Station
D. Select an SQL Server
Answer: C


QUESTION NO: 59
Which service component in the prepare phase consists of creating a topology map for the solution and identifying all of the products and services that will be required to implement the security solution?
A. Site Readiness Assessment
B. Detailed Design Development
C. High Level Design Development
D. Security Readiness Assessment
E. System Acceptance Test Development
F. Account Qualification
Answer: C

QUESTION NO: 60
Which task is conducted as part of the Business Case Alignment in the optimize phase?
A. Document Systems, Processes, Flow-through, Tools, People, Skills, and Best Practices
B. Monitor Endpoint Solution System Dashboard Events Summaries, Graphs, and Alarms
C. Analyze and Document Hard Dollar, Productivity, and Business Initiative Gains
D. Determine Network Availability/Redundancy Specifications

E. Conduct Network Assessment
F. List All Security Network Devices to Be Implemented
Answer: C


QUESTION NO: 61
Which task is conducted as part of the optimization workshop?
A. Document New Corporate Business Initiatives Requirements
B. Determine Network Availability/Redundancy Specifications
C. Analyze and Document Hard Dollar, Productivity, and Business Initiative Gains
D. Document Systems, Processes, Flow-through, Tools, People, Skills, and Best Practices
E. Monitor Endpoint Solution System Dashboard, Event Summaries, Graphs, and Alarms
Answer: A


QUESTION NO: 62
Which resource is commonly used in the prepare phase of a typical security engagement?
A. Security Business Requirements Documents
B. Product Release Notes
C. Security Installation Guides
D. Security Site Survey
E. Security Readiness Assessment Template
F. Security Project Plan
Answer: A

QUESTION NO: 63
Which activity is done in Project Management?
A. Discuss Detailed Design
B. Confirm Project Roles and Responsibilities
C. Business Requirements Workshop
D. Develop Staff Planning Report
Answer: B QUESTION NO: 64


Which task belongs to the Ongoing Support Handoff Meeting?
A. Develop Operations Implementation Report
B. Customize Network Ready for Use Template with Installed Feature and Functions
C. Explain How to Open and Track a Case, Explain Who from the Customer Should Open a Case, and What Should Be Done Prior to Opening a Case
D. Train Operations Staff
Answer: C


QUESTION NO: 65
What is the first activity that is conducted in an IPS mode implementation?
A. Install the Sensor, Schedule a Network Outage Prior to the Installation
B. Create a Rule from a Query
C. Fine Tune the Custom Policy
D. Tune for False Positives
Answer: A


QUESTION NO: 66
Which service component in the design phase is conducted after the System Acceptance Test Plan?
A. Detailed Design Customer Signoff
B. Staging Plan
C. Detailed Design Development: Operations Design
D. Detailed Design Development: Physical Design Workshop
E. Package and Price Design
Answer: E

QUESTION NO: 67
Which task is part of the technology strategy meeting in the prepare phase?
A. Identify Connectivity Requirements
B. Review and Generate a Logical-Level Topology Map

C. Document Security Policy Requirements
D. Review Security Alerts and Notification Requirements
E. Review LAN/WAN Configurations
Answer: C


QUESTION NO: 68
Which two tasks are conducted as part of the assess current security management procedures activity? (Choose two.)
A. Review Security Alerts and Notification Requirements
B. Identify Connectivity Requirements
C. Evaluate Escalation Procedure
D. Review and Generate IP Addressing Scheme
E. Review LAN/WAN Configurations
Answer: A,C
QUESTION NO: 69
What is a key objective of the Security Readiness Assessment?
A. Document the Customer's Current and Future Technology Projects
B. Assess Software Application Maintenance Procedures
C. Create a Design Specification Document
D. Document Power and UPS Availability
E. Assess and Document Infrastructure Requirements for the Proposed Solution
Answer: B