[Free] 2019(Nov) EnsurePass Cisco 500-651 Dumps with VCE and PDF 1-10

By | November 3, 2019

Get Full Version of the Exam

Question No.1

Which two options are attack vectors of the threat-centric defense? (Choose two)

  1. Voicemail

  2. Backups

  3. Mobile

  4. Video surveillance

  5. Cloud apps

Correct Answer: CE

Question No.2

Which feature of Cisco Web Security leverages the Outbreak Intelligence Engine to scan individual pieces of websites before allowing access?

  1. Antivirus Monitoring

  2. Dynamic Content Analysis

  3. Real-time Sandboxing Analysis

  4. Visibility control

Correct Answer: C

Question No.3

What is key feature of Cognitive Threat Analytics?

  1. It enables safe email usage with event Analytics

  2. It improves threat detection over time with machine learning

  3. It enhances anonymity with URL filtering

  4. It enables greater endpoint device profiling intelligence with entity modeling

Correct Answer: B

Question No.4

Which three features provided by NGFW and NGIPS support the #39;Internet Edgequot; use case? (Choose three.)

  1. Supports High Availability

  2. Support for profiling devices

  3. Supports dynamic routing protocols such as OSPF or BGP

  4. Support for Platform exchange grid

  5. Support for High Bandwith environments

  6. Support for integrated posture assessment

Correct Answer: ACE

Question No.5

Which are two main features of Intrusion Prevention? (Choose two.)

  1. Threat analysis through network behavior analysis

  2. Protecting against Zero-Day attacks

  3. Layer-4 traffic monitoring across platforms

  4. Vulnerability-based threat management

Correct Answer: AD

Question No.6

Which two Cisco products are part of the mobile threat-centric solution module? (Choose two.)

  1. Advanced sandboxing with Threat Grid

  2. Automated policy enforcement with ASAv

  3. Enhanced control access with ISE and Cloudlock

  4. Software-defined segmentation through TrustSec

  5. Enforced device security policies with Meraki

Correct Answer: CE

Question No.7

Which feature of CTA can separate statistically normal traffic form anomalous traffic?

  1. URL filtering

  2. Trust modeling

  3. Anomaly detection

  4. Event classification

Correct Answer: C

Question No.8

Which is a component of Cisco#39;s Web and E-mail Security Solution?

  1. Device Profiling

  2. Next Generation Intrusion Prevention System

  3. Next Generation Firewall

  4. DNS-Layer security

Correct Answer: D

Question No.9

How does AMP#39;s device trajectory capabilities help address customer s issues?

  1. It determines the scope and cause of an outbreak and tracks suspicious files

  2. It searches for potential threats based on identified activities and behaviors

  3. It isolates suspicious files and runs them in a sandbox environment to determine their authenticity

  4. It analyses the data from suspicious files to provide a new level of threat intelligence

Correct Answer: C

Question No.10

Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)

  1. Cloud-Brokered VPN

  2. Posture Assessment

  3. Intrusion Prevention

  4. Email Security

  5. Profiling

  6. Next Generation Firewall

Correct Answer: ACE

Get Full Version of the Exam
500-651 Dumps
500-651 VCE and PDF

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.