* Q. The Cisco Security Platform reduces complexity and strengthens operations by:
Streamlining policy and device updates
Enabling frictionless, secure access for users
Cooperating with an existing architecture
(O) All of the above
* Q. Pick the right Zero-Trust Strategy components from the following. [Choose one answer]
Workplace: Network Access
Workforce: User and device access
Workload: Application and workload access
(O) All of the above
* Q. What should you do if a customer wants to discover which applications are being used in their environment and what is communicating with their apps/data?
Demo Duo Beyond
Qualify out, tell them there isn’t a Cisco product
Conduct additional discovery on how the organization handles it today
(O) Work with your CSS to evaluate and introduce them to the Tetration team
* Q. How do customers receive Talos threat intelligence?
Purchasing a Talos subscription for their security product
Purchasing a Talos Enterpise License Subscription
Purchasing the Talos Threat Feed
(O) Cisco security products receive Talos threat intelligence for free
* Q. Which Service is a good fit for medium sized customers?
(X) ISE Implementation Service
Incident Response Retainer
(O) Segmentation Advisory Service
* Q. Cisco Security takes you from overwhelmed to empowered. Our simplified platform helps you reduce complexity and strengthen operational efficiency. So your teams can stop swiveling between products and interfaces and get time back to focus on what matters most. and Make it easier for your people and your solutions to work as a team.(True or False)
(O) True
False
* Q. Which is an example of a supply chain attack?
DNSMessenger
Sea Turtle
(O) Nyetya
VPNFilter
* Q. When was Talos acquired by Cisco?
2015
2017
(X) 2012
(O) Talos is not an acquisition
* Q. SAFE is:
A repository of validated and referenced Cisco designs
A design methodology for Security Architects
A method to align security, networking, and business outcome
(O) All of the above
* Q. What does the Presenter in the "Security EBC - Video " try to say, by referring to “Isn’t it time for Security solutions to act as a team?” [Choose one answer]
Create new advanced Security solutions
Create strong Perimeter Security Solutions
Create Strong Endpoint Security Solutions
(O) Security solutions need to work together as a unit eg. Endpoint security working with cloud security, perimeter security, MFA and so.
* Q. How does Cisco’s Zero Trust approach reduce the business’s risks? Select the best three answers.
Securing the workforce and workloads
(O) Ensuring compliance
(O) Gaining insight into the users and devices
(O) Establishing device trust before granting access to applications
* Q. What does the Cisco Security Platform provide to enable better outcomes to the business? Select the best three answers.
(O) A security strategy with a platform backed by unparalleled resources and expertise
(O) A powerful, pervasive platform with access to the latest security innovations
A closed platform that strengthens operations
(O) A platform with reduced complexity that gives security teams their time back
* Q. What is the best way to find and connnect with the service seller for your account?
Look around on Sales Connect and Wiki Pages
(O) Look them up in the Account Team Directory
Send out an email to a services alias
* Q. Select the Key value proposition of Cisco Talos? [Choose any three answer]
(O) Elite group of Security Experts devoted to providing superior Protection to customers with our Products and services.
(O) Threat Intelligence & Interdiction, Detection Research, Engine Development, Vulnerability Research & Discovery, Open Source & Education, and Global Outreach.
(O) Cisco Talos’ core mission is to provide verifiable and customizable defensive technologies and techniques that help customers quickly protect their assets from cloud to core.
Talos is a Perimeter based security product from Cisco
* Q. Talos analyzes unmatched visibility every day and pushes immediately actionable intelligence to products. This coverage allows Cisco Security solutions to provide coverage at the earliest signs of a threat. (True or False)
(O) True
False
* Q. Umbrella acts as your secure onramp to the internet. DNS-layer security, Secure Web Gateway capabilities, and cloud-delivered firewall functionality create the first line of defense and inspection for any traffic, so wherever your users are or what they’re connecting to, their access is secure. Once the traffic reaches the SIG cloud platform, you can easily implement different types of inspection and policy enforcement.(True or False)
(O) True
False
* Q. What makes Cisco Security stand apart in the market. [Choose three answer]
(O) Open and integrated platform
(O) Cloud-delivered Simplicity
(O) Deep Network integration
Provides solid protection for User and Device access
* Q. Which persona will procure solutions with names like private, public, and hybrid?
(O) Cloud Buyer
Endpoint Admin
Email Admin
Network Buyer
* Q. The acronym SAFE stands for:
(X) Secure Architecture For the Enterprise
Sell All Feature Enhancements
Security Additions For Enablement
(O) It’s not an acronym, it’s just a name
* Q. Which role would benefit most from a platform that provides anti-virus, anti-spam, outbreak filters, and macro detection?
(O) Email Admin
Cloud Buyer
SecOps Manager
CISO
* Q. Which actions should you take to qualify an opportunity prior to engaging CX? Select the best three answers.
(O) Find out customer’s timeline
(O) Find out customer’s budget
(O) Determine customer’s needs and pain points
Schedule a demo
* Q. Which Service Buckets map best to Enterprise/Large Customers? Select the best three answers.
(O) Advisory
(O) Implementation
Product Training
(O) Business Critical Services
* Q. SAFE, is a vendor agnostic conversation and design process that uniquely positions Cisco as a larger security solution provider.
(O) True
False
Q. Effective cyber risk management is undermined by the proliferation of new vendor solutions and integration challenges of security applications.
(O) True
False
Q. Which role is primarily concerned with accelerating security operations, blocking more, and focusing on compliance goals?
(O) CISO
SecOps Manager
Email Admin
Security Architect
Q. SAFE can be used when designing security into both new and existing networks.
(O) True
False
Q. Define Zero Trust Approach. [Pick 3 answers]
(O) Enable policy-based controls for every access request in a corporate environment
(O) See who and what is accessing applications, workloads & the network
(O) Segment your network & workloads by enforcing granular controls
Focus on providing protection to end user
* Q. What are the key characteristics of “Cisco Security Platform”?(Choose 3)
(O) Best of breed products
(O) Trust verification
(O) Talos threat intelligence
NAC Solution
Integration of NGFW with ISE
Q. The Key to SAFE is built around which TWO areas:
(O) Operational Domains
Reference documentation on how to secure networks
(O) Practices for securing the business
Places in the Network
* Q. The Cisco Security ecosystem covers email, networks, cloud, web, endpoints, and everything in between. Cisco Talos has more visibility than any other security vendor in the world, with the sheer size and breadth of Cisco Security’s portfolio and the incoming telemetry from Cisco’s customers and products.(True or False)
(O) True
False
Q. Which of the following is described as best of breed products, protecting the network, endpoint, applications, and cloud?
(O) Cisco Security Platform
Talos
Cisco Threat Response
Stealthwatch
Q. Which question can you ask to learn more about protecting a customer’s workforce?
(O) How do you know your users are who they say they are?
(X) How can you view and secure all connections?
What’s on the network?
How do you segment your network today?
* Q. Which of the following are common challenges seen by all prospect personas? Select the best three answers.
(O) Time
(O) Expertise
(O) Evidence
Efficacy
* Q. Select some of the key primary concerns of CISO’s in the organization?
Driving metrics
Cost of security
Attracting and retaining top talent
Offensive security
(O) All of the above
* Q. How does Cisco Duo secure the workforce?
By providing valuable information on threats facing the market
By discovering what applications are being used in the environment
By assessing threats to websites that employees visit
(O) By verifying the identity of users and the health of their devices before connecting to the applications they need
* Q. SAFE allows me to:
Design networks with my customer’s outcome in mind
Sell more security because we understand how customers need security to be implemented
Brings the different business and technology owners into a joint conversation on security
(O) All of the Above
* Q. Pick the right combination of Product or solution mapping with respect to Cisco Zero Trust. [Pick Three answer]
(O) Secure the Workforce With AMP
(O) Secure the Workforce With Duo
Secure Your Workloads With ACI
Secure Your Workloads With Tetration
(X) Secure the Workplace With Software-Defined Access
(O) Secure the Workplace With ISE
* Q. With powerful integrations and industry-leading solutions, the Cisco Security Platform simplifies your security experience, accelerates your success, and protects your future. (True or False)
(O) True
False