-->

whaust

2021年3月16日 星期二

# (Pass_1005) Red Belt Partner Academy Security Powered by Fire Jumper - Presales - Stage 1 FY21 (Partners Only)


* Q. The Cisco Security Platform reduces complexity and strengthens operations by:

Streamlining policy and device updates

Enabling frictionless, secure access for users

Cooperating with an existing architecture

(O) All of the above

* Q. Pick the right Zero-Trust Strategy components from the following. [Choose one answer]

Workplace: Network Access

Workforce: User and device access

Workload: Application and workload access

(O) All of the above

* Q. What should you do if a customer wants to discover which applications are being used in their environment and what is communicating with their apps/data?

Demo Duo Beyond

Qualify out, tell them there isn’t a Cisco product

Conduct additional discovery on how the organization handles it today

(O) Work with your CSS to evaluate and introduce them to the Tetration team

* Q. How do customers receive Talos threat intelligence?

Purchasing a Talos subscription for their security product

Purchasing a Talos Enterpise License Subscription

Purchasing the Talos Threat Feed

(O) Cisco security products receive Talos threat intelligence for free

* Q. Which Service is a good fit for medium sized customers?

(X) ISE Implementation Service

Incident Response Retainer

(O) Segmentation Advisory Service

* Q. Cisco Security takes you from overwhelmed to empowered. Our simplified platform helps you reduce complexity and strengthen operational efficiency. So your teams can stop swiveling between products and interfaces and get time back to focus on what matters most.​ and Make it easier for your people and your solutions to work as a team.​(True or False)

(O) True

False

* Q. Which is an example of a supply chain attack?

DNSMessenger

Sea Turtle

(O) Nyetya

VPNFilter

* Q. When was Talos acquired by Cisco?

2015

2017

(X) 2012

(O) Talos is not an acquisition

* Q. SAFE is:

A repository of validated and referenced Cisco designs

A design methodology for Security Architects

A method to align security, networking, and business outcome

(O) All of the above

* Q. What does the Presenter in the "Security EBC - Video " try to say, by referring to “Isn’t it time for Security solutions to act as a team?” [Choose one answer]

Create new advanced Security solutions

Create strong Perimeter Security Solutions

Create Strong Endpoint Security Solutions

(O) Security solutions need to work together as a unit eg. Endpoint security working with cloud security, perimeter security, MFA and so.

* Q. How does Cisco’s Zero Trust approach reduce the business’s risks? Select the best three answers.

Securing the workforce and workloads

(O) Ensuring compliance

(O) Gaining insight into the users and devices

(O) Establishing device trust before granting access to applications

* Q. What does the Cisco Security Platform provide to enable better outcomes to the business? Select the best three answers.

(O) A security strategy with a platform backed by unparalleled resources and expertise

(O) A powerful, pervasive platform with access to the latest security innovations

A closed platform that strengthens operations

(O) A platform with reduced complexity that gives security teams their time back

* Q. What is the best way to find and connnect with the service seller for your account?

Look around on Sales Connect and Wiki Pages

(O) Look them up in the Account Team Directory

Send out an email to a services alias

* Q. Select the Key value proposition of Cisco Talos? [Choose any three answer]

(O) Elite group of Security Experts devoted to providing superior Protection to customers with our Products and services.

(O) Threat Intelligence & Interdiction, Detection Research, Engine Development, Vulnerability Research & Discovery, Open Source & Education, and Global Outreach.

(O) Cisco Talos’ core mission is to provide verifiable and customizable defensive technologies and techniques that help customers quickly protect their assets from cloud to core.

Talos is a Perimeter based security product from Cisco

* Q. Talos analyzes unmatched visibility every day and pushes immediately actionable intelligence to products. This coverage allows Cisco Security solutions to provide coverage at the earliest signs of a threat. (True or False)

(O) True

False

* Q. Umbrella acts as your secure onramp to the internet. DNS-layer security, Secure Web Gateway capabilities, and cloud-delivered firewall functionality create the first line of defense and inspection for any traffic, so wherever your users are or what they’re connecting to, their access is secure. Once the traffic reaches the SIG cloud platform, you can easily implement different types of inspection and policy enforcement.​(True or False)

(O) True

False

* Q. What makes Cisco Security stand apart in the market. [Choose three answer]

(O) Open and integrated platform

(O) Cloud-delivered Simplicity

(O) Deep Network integration

Provides solid protection for User and Device access

* Q. Which persona will procure solutions with names like private, public, and hybrid?

(O) Cloud Buyer

Endpoint Admin

Email Admin

Network Buyer

* Q. The acronym SAFE stands for:

(X) Secure Architecture For the Enterprise

Sell All Feature Enhancements

Security Additions For Enablement

(O) It’s not an acronym, it’s just a name

* Q. Which role would benefit most from a platform that provides anti-virus, anti-spam, outbreak filters, and macro detection?

(O) Email Admin

Cloud Buyer

SecOps Manager

CISO

* Q. Which actions should you take to qualify an opportunity prior to engaging CX? Select the best three answers.

(O) Find out customer’s timeline

(O) Find out customer’s budget

(O) Determine customer’s needs and pain points

Schedule a demo

* Q. Which Service Buckets map best to Enterprise/Large Customers? Select the best three answers.

(O) Advisory

(O) Implementation

Product Training

(O) Business Critical Services

* Q. SAFE, is a vendor agnostic conversation and design process that uniquely positions Cisco as a larger security solution provider.

(O) True

False

Q. Effective cyber risk management is undermined by the proliferation of new vendor solutions and integration challenges of security applications.

(O) True

False

Q. Which role is primarily concerned with accelerating security operations, blocking more, and focusing on compliance goals?

(O) CISO

SecOps Manager

Email Admin

Security Architect

Q. SAFE can be used when designing security into both new and existing networks.

(O) True

False

Q. Define Zero Trust Approach. [Pick 3 answers]

(O) Enable policy-based controls for every access request in a corporate environment

(O) See who and what is accessing applications, workloads & the network

(O) Segment your network & workloads by enforcing granular controls

Focus on providing protection to end user

* Q. What are the key characteristics of “Cisco Security Platform”?(Choose 3)

(O) Best of breed products

(O) Trust verification

(O) Talos threat intelligence

NAC Solution

Integration of NGFW with ISE

Q. The Key to SAFE is built around which TWO areas:

(O) Operational Domains

Reference documentation on how to secure networks

(O) Practices for securing the business

Places in the Network

* Q. The Cisco Security ecosystem covers email, networks, cloud, web, endpoints, and everything in between. Cisco Talos has more visibility than any other security vendor in the world, with the sheer size and breadth of Cisco Security’s portfolio and the incoming telemetry from Cisco’s customers and products.(True or False)

(O) True

False

Q. Which of the following is described as best of breed products, protecting the network, endpoint, applications, and cloud?

(O) Cisco Security Platform

Talos

Cisco Threat Response

Stealthwatch

Q. Which question can you ask to learn more about protecting a customer’s workforce?

(O) How do you know your ​users are who they ​say they are?​

(X) How can you view and ​secure all connections?​

What’s on the network?

How do you segment your network today?

* Q. Which of the following are common challenges seen by all prospect personas? Select the best three answers.

(O) Time

(O) Expertise

(O) Evidence

Efficacy

* Q. Select some of the key primary concerns of CISO’s in the organization?

Driving metrics

Cost of security

Attracting and retaining top talent

Offensive security

(O) All of the above

* Q. How does Cisco Duo secure the workforce?

By providing valuable information on threats facing the market

By discovering what applications are being used in the environment

By assessing threats to websites that employees visit

(O) By verifying ​the identity of users and the health of ​their devices before connecting to the applications they need

* Q. SAFE allows me to:

Design networks with my customer’s outcome in mind

Sell more security because we understand how customers need security to be implemented

Brings the different business and technology owners into a joint conversation on security

(O) All of the Above

* Q. Pick the right combination of Product or solution mapping with respect to Cisco Zero Trust. [Pick Three answer]

(O) Secure the Workforce With AMP

(O) Secure the Workforce With Duo

Secure Your Workloads With ACI

Secure Your Workloads With Tetration

(X) Secure the Workplace With Software-Defined Access

(O) Secure the Workplace With ISE

* Q. With powerful integrations and industry-leading solutions, the Cisco Security Platform simplifies your security experience, accelerates your success, and protects your future. ​(True or False)

(O) True

False

沒有留言:

張貼留言

Popular