Practical Cisco 500-651 Free Practice Questions

Want to know features? Want to lear more about experience? Study . Gat a success with an absolute guarantee to pass Cisco 500-651 (Security Architecture for Systems Engineer) test on your first attempt.

Free 500-651 Demo Online For Microsoft Certifitcation:

Page: 1 / 7
Total 88 questions Full Exam Access
Question 1
Which three options are attack vectors protected by Email Security? (Choose three)
My answer: -
Reference answer: ACD
Reference analysis:

ASAS Security Web and Email SE Module 2

Question 2
Which three options does Cisco provides customers in terms of “Visibility and Control” against today's threats? (Choose three)
My answer: -
Reference answer: ABF
Reference analysis:

None

Question 3
Which is a feature mentioned in the DNS security module?
My answer: -
Reference answer: B
Reference analysis:

ASAS Security Web and Email SE Module 2

Question 4
Which three are deployment options for E-mail Security? (Choose three.)
My answer: -
Reference answer: ABE
Reference analysis:

None

Question 5
Which is a main element of FirePOWER Device Manager?
My answer: -
Reference answer: A
Reference analysis:

ASAS Security NGFW and NGIPS SE Module 4

Question 6
Which Cisco product is a part of the Data Center threat centric solution?
My answer: -
Reference answer: C
Reference analysis:

ASAS Security Threat Centric Solutions - AM and SE Module 7

Question 7
Which feature of ISE combines user identification with robust context sharing platform to prevent
inappropriate access?
My answer: -
Reference answer: B
Reference analysis:

ASAS Policy and Access SE Module 5

Question 8
Which are three key features of DNS-layer security? (Choose three.)
My answer: -
Reference answer: DEF
Reference analysis:

None

Question 9
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)
My answer: -
Reference answer: CEF
Reference analysis:

None

Question 10
Which Cisco solution falls under cloud security?
My answer: -
Reference answer: D
Reference analysis:

ASAS Cisco Cloud Security SE – Module 3

Question 11
What are two key points of the Cisco Security and Threat Landscape module? (Choose two.)
My answer: -
Reference answer: AB
Reference analysis:

ASAS Security NGFW and NGIPS SE Module 4

Question 12
Which Cisco solution falls under Advanced Threat?
My answer: -
Reference answer: C
Reference analysis:

ASAS Security Advanced Threats SE Module 6

Question 13
Which TrustSec feature allows customers to simplify firewall administration, avoiding the common rule explosions that happen when new servers are onboarded?
My answer: -
Reference answer: C
Reference analysis:

ASAS policy and Access SE Module 5

Question 14
Which Stealthwatch component is a physical or virtual appliance that aggregates and normalizes NetFlow data?
My answer: -
Reference answer: C
Reference analysis:

None

Question 15
Which are two main features of Intrusion Prevention? (Choose two.)
My answer: -
Reference answer: AD
Reference analysis:

None

Question 16
Which three options ate attack vectors protected by DNS-Layer security? (Choose three.)
My answer: -
Reference answer: CDE
Reference analysis:

ASAS Security Threat Centric Solutions - AM and SE Module 7

Question 17
Which AMP feature is provided by fuzzy fingerprinting?
My answer: -
Reference answer: B
Reference analysis:

ASAS Security Advanced Threats SE Module 6

Question 18
Which three features provided by NGFW and NGIPS support the Internet Edge' use case? (Choose three.)
My answer: -
Reference answer: ACE
Reference analysis:

None

Question 19
Which three options are attack vectors protected by Web Security? (Choose three.)
My answer: -
Reference answer: ABF
Reference analysis:

ASAS Security Web and Email SE Module 2

Question 20
Which two Cisco products are a part of the
My answer: -
Reference answer: AE
Reference analysis:

ASAS Security Threat Centric Solutions - AM and SE Module

Question 21
Which is a key feature of Cisco Defense Orchestrator?
My answer: -
Reference answer: A
Reference analysis:

ASAS Cisco Cloud Security SE - Module 3

Question 22
Which two options are attack vectors protected by Identity and Access Control? (Choose two.)
My answer: -
Reference answer: BC
Reference analysis:

None

Question 23
Which feature of Cisco Web Security leverages the Outbreak Intelligence Engine to scan individual pieces of websites before allowing access?
My answer: -
Reference answer: C
Reference analysis:

ASAS Security Web and Email SE Module 2

Page: 1 / 7
Total 88 questions Full Exam Access