Free 700-765 Sample Questions — Cisco Security Architecture for System Engineers

Free 700-765 sample questions for the Cisco Security Architecture for System Engineers exam. No account required: study at your own pace.

Want an interactive quiz? Take the full 700-765 practice test

Looking for more? Click here to get the full PDF with 62+ practice questions for $10 for offline study and deeper preparation.

Question 1

Which two products empower customers to create secure next-gen networks? (Choose two.)

  • A. AMP
  • B. SD-Access
  • C. MFA
  • D. ISE
  • E. ACI
Show Answer
Correct Answer:
  • B. SD-Access
  • E. ACI
Question 2

Which two IoT environment layers are protected by Stealthwatch? (Choose two.)

  • A. Access Points
  • B. Endpoints
  • C. Internet/Cloud
  • D. Control Layer
  • E. Things
Show Answer
Correct Answer:
  • D. Control Layer
  • E. Things
Question 3

Which feature of AnyConnect provides customers the ability to monitor endpoint application usage to uncover potential behavior anomalies?

  • A. Differentiated Mobile Access
  • B. Secure Layer 2 Network Access
  • C. Trusted Network Detection
  • D. Network Visibility Module
Show Answer
Correct Answer:
D. Network Visibility Module
Question 4

What are two result of utilizing a fragmented security model? (Choose two.)

  • A. Reduced malicious file risk through additional segmentation
  • B. Decreased network accessibility through multiple applications
  • C. Decreased visibility and limited understand of security coverage
  • D. Increased identity controls
  • E. Individual components pieced together to meet requirements
Show Answer
Correct Answer:
  • C. Decreased visibility and limited understand of security coverage
  • E. Individual components pieced together to meet requirements
Question 5

What are three key benefits of Cisco NGFW? (Choose three.)

  • A. Reduces throughput
  • B. Increases traffic latency
  • C. Detects and remediates threats faster
  • D. Identifies anomalous traffic
  • E. Prepares defenses
  • F. Reduces complexity
Show Answer
Correct Answer:
  • C. Detects and remediates threats faster
  • E. Prepares defenses
  • F. Reduces complexity
Question 6

What are three benefits that Cisco Umbrella brings to DNS-Layer Security? (Choose three.)

  • A. Reputation filtering
  • B. Malware scanning
  • C. Predictive intelligence
  • D. Breach mitigation
  • E. Off-network security
  • F. Recursive DNS
Show Answer
Correct Answer:
  • C. Predictive intelligence
  • E. Off-network security
  • F. Recursive DNS
Question 7

What are two solutions Cisco offers for email security? (Choose two.)

  • A. Tetration
  • B. Meraki
  • C. Cloudlock
  • D. Umbrella
  • E. AMP for Email Security
Show Answer
Correct Answer:
  • D. Umbrella
  • E. AMP for Email Security
Question 8

What are three main solutions areas for Advanced Threat? (Choose three.)

  • A. NGFW
  • B. Network Analytics
  • C. Intrusion Analytics
  • D. Threat Analytics
  • E. Malware Protection
  • F. Threat Defense
Show Answer
Correct Answer:
  • B. Network Analytics
  • D. Threat Analytics
  • E. Malware Protection
Question 9

Which two security risks are created by legacy approaches to networking? (Choose two.)

  • A. network downtime
  • B. user vulnerability
  • C. slow containment
  • D. access points
  • E. large attack surface
Show Answer
Correct Answer:
  • C. slow containment
  • E. large attack surface
Question 10

What are two common customer obstacles? (Choose two.)

  • A. Compliance regulations
  • B. Security system blackouts
  • C. High turnover of IT professionals
  • D. Limited resources
  • E. Lack of solution integration
Show Answer
Correct Answer:
  • A. Compliance regulations
  • E. Lack of solution integration
Question 11

What are two tenants of establishing an SD-perimeter? (Choose two.)

  • A. Securing device access
  • B. Securing network access
  • C. Securing user-device trust
  • D. Securing app access
  • E. Securing endpoints
Show Answer
Correct Answer:
  • B. Securing network access
  • D. Securing app access
Question 12

What are two key capabilities of Meraki? (Choose two.)

  • A. identity-based and device-aware security
  • B. application visibility and control
  • C. device profiling
  • D. contextual awareness
  • E. security automation
Show Answer
Correct Answer:
  • A. identity-based and device-aware security
  • B. application visibility and control
Question 13

What are two key Cisco IoT use cases? (Choose two.)

  • A. Industrial Security
  • B. Parks and Recreation
  • C. Connected Health
  • D. Financial Institutions
  • E. Mobile Utilities
Show Answer
Correct Answer:
  • A. Industrial Security
  • C. Connected Health
Question 14

What does remote access use to verify identity?

  • A. Agents
  • B. MFA
  • C. Remote Access VPN
  • D. AMP for Endpoints
Show Answer
Correct Answer:
B. MFA
Question 15

Which two IoT environment layers are protected by ISE? (Choose two.)

  • A. Endpoints
  • B. Access Points
  • C. Control Layer
  • D. Things
  • E. Internet/Cloud
Show Answer
Correct Answer:
  • D. Things
  • E. Internet/Cloud

Aced these? Get the Full Exam

Download the complete 700-765 study bundle with 62+ questions in a single printable PDF.