Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?
Which solution protects hybrid cloud deployment workloads with application visibility and segmentation?A . NexusB . StealthwatchC . FirepowerD . TetrationView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/solutions/security/secure-data-center-solution/index.html#~products
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?
Which Cisco product provides proactive endpoint protection and allows administrators to centrally manage the deployment?A . NGFWB . AMPC . WSAD . ESAView AnswerAnswer: B
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?
Which solution combines Cisco IOS and IOS XE components to enable administrators to recognize applications, collect and send network metrics to Cisco Prime and other third-party management tools, and prioritize application traffic?A . Cisco Security IntelligenceB . Cisco Application Visibility and ControlC . Cisco Model Driven TelemetryD . Cisco DNA...
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)
Which two conditions are prerequisites for stateful failover for IPsec? (Choose two.)A . Only the IKE configuration that is set up on the active device must be duplicated on the standby device; the IPsec configuration is copied automatically.B . The active and standby devices can run different versions of the...
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?
Which technology must be used to implement secure VPN connectivity among company branches over a private IP cloud with any-to-any scalable connectivity?A . DMVPNB . FlexVPNC . IPsec DVTID . GET VPNView AnswerAnswer: D
Which CoA type achieves this goal?
An engineer must force an endpoint to re-authenticate an already authenticated session without disrupting the endpoint to apply a new or updated policy from ISE. Which CoA type achieves this goal?A . Port BounceB . CoA TerminateC . CoA ReauthD . CoA Session QueryView AnswerAnswer: C
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)
What are the two most commonly used authentication factors in multifactor authentication? (Choose two.)A . biometric factorB . time factorC . confidentiality factorD . knowledge factorE . encryption factorView AnswerAnswer: BD
Which two mechanisms are used to control phishing attacks? (Choose two.)
Which two mechanisms are used to control phishing attacks? (Choose two.)A . Enable browser alerts for fraudulent websites.B . Define security group memberships.C . Revoke expired CRL of the websites.D . Use antispyware software.E . Implement email filtering techniques.View AnswerAnswer: AE
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)
Which two kinds of attacks are prevented by multifactor authentication? (Choose two.)A . phishingB . brute forceC . man-in-the-middleD . DDOSE . tear dropView AnswerAnswer: BC
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)
Which two services must remain as on-premises equipment when a hybrid email solution is deployed? (Choose two.)A . DDoSB . antispamC . antivirusD . encryptionE . DLPView AnswerAnswer: DE Explanation: https://www.cisco.com/c/dam/en/us/td/docs/security/ces/overview_guide/Cisco_Cloud_Hybrid_Email_Security_Overview_Guide.pdf