Lead2pass Offering Free 500-265 Dumps Files For Free Downloading By 500-265 Exam Candidates:
https://www.lead2pass.com/500-265.html
QUESTION 21
Which two attacks target the data link layer in a switched environment? (Choose two.)
A. VLAN attacks
B. IP source routing
C. MAC address floods
D. DHCP-based IP redirection attacks
E. Spanning-tree attacks
Answer: CE
QUESTION 22
Which statement about IPsec and IPv6 is true?
A. IPsec is available only with IPv6.
B. IPsec support is mandatory in IPv4.
C. IPsec support is mandatory in IPv6.
D. In order to use IPsec with IPv6, IPv6 must be tunneled over IPv4.
Answer: C
QUESTION 23
Which two features of AMP are available in Cisco AMP for Networks that are not available in Cisco AMP for Content alone? (Choose two.)
A. trajectory
B. retrospective security
C. dynamic analytics
D. behavioral indications of compromise
E. fuzzy fingerprinting
F. one-to-one signature
Answer: AD
QUESTION 24
Which solution is the most effective for virus cleanup?
A. Cisco Firewall with Authorized Access
B. Cisco DMVPN with GRE Tunnels
C. Cisco Easy VPN with Remote-Site Device Management
D. Cisco AMP for Networks with File Trajectory
E. Cisco SIO with Increased Visibility
F. Cisco ISE with Automated Policy Tuning
Answer: D
QUESTION 25
What is the primary reason that customers need content security today?
A. Companies are more spread out than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More business is done using the web and email than ever before.
Answer: E
QUESTION 26
Which feature of content security enables administrators to block Facebook videos while allowing posts and messages?
A. dynamic content analysis
B. Cisco Application Visibility and Control
C. centralized management and reporting
D. encryption
Answer: B
QUESTION 27
Reputation filtering performs which two functions? (Choose two.)
A. rates each site based on a reputation score
B. automatically updates devices based on threats
C. tunes itself according to relevance to the network
D. communicates with Cisco SenderBase, which is a common security database
E. analyzes in-depth parameters for anything that requests network access
Answer: AD
QUESTION 28
If a customer complains that employees access websites for work but then waste time with games and videos, which solution should you suggest, and why?
A. Cisco AMP, for protection before, during, and after attacks
B. Cisco WSA, for its URL filtering ability
C. Cisco RSA, for its data loss prevention
D. Cisco WSA, for its application visibility and control
E. Cisco ESA, for its global threat operations
F. Cisco ESA, for its antivirus capabilities
Answer: D
QUESTION 29
What is the main reason that customers need Cisco Secure Access?
A. Companies use more social media than ever before.
B. Organizations need to block high-risk websites.
C. Network traffic is growing at an exponential rate.
D. Storage is moving from on-premises to cloud-based.
E. More devices are connecting on and off campus.
F. More business is done using the web and email than ever before.
Answer: E
QUESTION 30
In the Cisco TrustSec “User to Data Center Access Control” use case, which users typically have access to the company data center?
A. suppliers
B. employees
C. noncompliant users
D. guests
Answer: B
500-265 dumps full version (PDF&VCE): https://www.lead2pass.com/500-265.html
Large amount of free 500-265 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDMFRoaVJfYURMNmM