Free 700-760 Sample Questions — Cisco Security Architecture for Account Managers (ASAEAM)

Free 700-760 sample questions for the Cisco Security Architecture for Account Managers (ASAEAM) exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 700-760 practice test

Looking for more? Click here to get the full PDF with 42+ practice questions for $10 for offline study and deeper preparation.

Question 1

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

  • A. Identity Services Engine
  • B. Cisco Security Connector
  • C. Stealthwatch
  • D. Duo
  • E. AMP for Endpoints
Show Answer
Correct Answer:
  • C. Stealthwatch
  • E. AMP for Endpoints
Question 2

What are two reasons perimeter-based network security is no longer sufficient? (Choose two.)

  • A. more networks
  • B. more IT professionals
  • C. more devices
  • D. more users
  • E. more vulnerabilities
Show Answer
Correct Answer:
  • C. more devices
  • D. more users
Question 3

What are two common customer obstacles? (Choose two.)

  • A. limited resources
  • B. compliance regulations
  • C. security system blackouts
  • D. high turnover of IT professionals
  • E. lack of solution integration
Show Answer
Correct Answer:
  • B. compliance regulations
  • E. lack of solution integration
Question 4

What are two key Cisco IoT use cases? (Choose two.)

  • A. Connected Health
  • B. Parks and Recreation
  • C. Mobile Utilities
  • D. Financial Institutions
  • E. Industrial Security
Show Answer
Correct Answer:
  • A. Connected Health
  • E. Industrial Security
Question 5

What are two results of utilizing a fragmented security model? (Choose two.)

  • A. Individual components are pieced together to meet requirements
  • B. Decreased visibility and limited understanding of security coverage
  • C. Increased identity controls
  • D. Decreased network accessibility through multiple applications
  • E. Reduced malicious file risk through additional segmentation
Show Answer
Correct Answer:
  • A. Individual components are pieced together to meet requirements
  • B. Decreased visibility and limited understanding of security coverage
Question 6

Which component of AMP provides the details customers need to address problems after a breach is identified?

  • A. rapid remediation
  • B. file sandboxing
  • C. continuous analysis
  • D. context awareness
Show Answer
Correct Answer:
A. rapid remediation
Question 7

Which three factors should a customer consider when choosing the ideal security solution provider? (Choose three.)

  • A. is committed to security
  • B. generates higher margins on each sale
  • C. delivers excellent partner and customer support
  • D. provides solutions at the lowest cost
  • E. creates new market opportunities
  • F. offers more than just niche products
Show Answer
Correct Answer:
  • A. is committed to security
  • C. delivers excellent partner and customer support
  • F. offers more than just niche products
Question 8

Which two areas require secure access? (Choose two.)

  • A. Workspace
  • B. Worktable
  • C. Workflow
  • D. Workloads
  • E. Workforce
Show Answer
Correct Answer:
  • D. Workloads
  • E. Workforce
Question 9

Which two steps should customers take to evolve to a trust-centric security philosophy? (Choose two.)

  • A. Limit internal access to networks
  • B. Only grant access to authorized users and devices
  • C. Always verify and never trust everything inside and outside the perimeter
  • D. Block BYOD devices
  • E. Require and install agents on mobile devices
Show Answer
Correct Answer:
  • B. Only grant access to authorized users and devices
  • C. Always verify and never trust everything inside and outside the perimeter
Question 10

Which two benefits of flexible purchasing does Cisco provide? (Choose two.)

  • A. reduce training needs
  • B. meet immediate needs
  • C. plan for the future
  • D. simplify the datacenter
  • E. roll out more solutions
Show Answer
Correct Answer:
  • B. meet immediate needs
  • C. plan for the future
Question 11

Where does a user start to achieve true network visibility?

  • A. Fabric Level
  • B. IT
  • C. OT
  • D. Branches
Show Answer
Correct Answer:
A. Fabric Level
Question 12

What does remote access use to verify identity?

  • A. MFA
  • B. Agents
  • C. Remote Access VPN
  • D. AMP for Endpoints
Show Answer
Correct Answer:
A. MFA
Question 13

What are the three main areas of the Cisco Security Portfolio? (Choose three.)

  • A. Firewalls
  • B. IoT Security
  • C. Roaming Security
  • D. Cloud Security
  • E. Advanced Threat
  • F. Voice and Collaboration
Show Answer
Correct Answer:
  • B. IoT Security
  • D. Cloud Security
  • E. Advanced Threat
Question 14

Which Cisco security offering delivers the most comprehensive real-time threat intelligence?

  • A. TrustSec security groups
  • B. Cisco Identity Services Engine
  • C. Cisco Talos Security Intelligence and Research Group
  • D. Next-generation firewall
Show Answer
Correct Answer:
C. Cisco Talos Security Intelligence and Research Group
Question 15

What are two ways Cisco addresses customers’ growing business needs? (Choose two.)

  • A. consolidated tracking and reporting
  • B. multiple solution deployment choices
  • C. bulletproof NGFW appliances
  • D. multi or hybrid cloud platforms
  • E. highly-scalable DC platforms
Show Answer
Correct Answer:
  • B. multiple solution deployment choices
  • E. highly-scalable DC platforms

Aced these? Get the Full Exam

Download the complete 700-760 study bundle with 42+ questions in a single printable PDF.