Q. What are two benefits of SASE? (Choose two)
Select one or more:
- Limits “Bring-Your-Own-Device” behavior in the organization
- Optimized paths for all users to all clouds to improve performance and agility
- Consistent security for mobile workforces
- Limits the number of remote off network users connecting to cloud-based applications
- Shift from operating expense to capital expense
Q. What are three core capabilities of SASE? (Choose three)
Select one or more:
- Security Fabric management
- Data loss prevention
- Next-Generation firewall
- Zero-Trust network access
- Threat intelligence sharing
Q. What is the goal of SASE?
Select one:
- Provide management and deployment of security devices and cloud security services for organizations
- Provide real-time analysis of security alerts generated by applications and network hardware
- Provide threat intelligence updates to protect organizations from malicious and sophisticated cyber-attacks
- Support the dynamic, secure access needs of today’s organizations by extending enterprise-grade security and networking regardless of location
Q. What is a result of outdated network security solutions requiring all traffic running through the core data center for inspection?
Select one:
- Latency
- Increased deployment time
- Decreased time for event analysis and remediation
- Higher capital expenditure
Q.Which statement is true regarding how SASE is delivered?
Select one:
- SASE must be delivered using cloud-based services only
- SASE is delivered using a combination of cloud-based services and optional physical on premise devices
- SASE is delivered only to remote users, and not to branch offices
- SASE must be delivered using a combination of physical on premise devices and cloud-based services
Q. Which two cloud capabilities are combined to deliver SASE? (Choose two)
Select one or more:
- Database-as-a-Service
- Security-as-a-Service
- Network-as-a-Service
- API-as-a-Service
Q. For network security, which three challenges have emerged as a result of rapid and disruptive digital innovation? (Choose three)
Select one or more:
- Too few security vendors to choose from
- Evolving compliance requirements
- Expanding attack surface
- Growing number of off-network users accessing the central data center, without proper security V
- Resistance to multi-cloud adoption from the enterprise
Q. What does the term “Thin Edge” refer to?
Select one:
- A poorly protected network
- branch locations with minimal security that are attached to a core network
- Remote users
- An organization that consumes little to no cloud-based services
Q. What behavior has impacted how users access corporate information, and thus requirements for network security?
Select one:
- Users upgrading software to obtain current features, bug fixes and security patches
- Users having different login credentials to access different systems
- Users accessing enterprise systems through personal devices that are not part of the enterprise infrastructure
- Users having multiple email accounts
[FCF] Cybersecurity 2.0 - Lesson 15 : SASE (Quesion&Answer)