What is key feature of Cognitive Threat Analytics?
What is key feature of Cognitive Threat Analytics?A . It enables safe email usage with event AnalyticsB . It improves threat detection over time with machine learningC . It enhances anonymity with URL filteringD . It enables greater endpoint device profiling intelligence with entity modelingView AnswerAnswer: B
Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?
Which feature of ISE combines user identification with robust context sharing platform to prevent inappropriate access?A . Centralized policy managementB . Context-aware accessC . Patch managementD . Platform exchange gridView AnswerAnswer: B
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
Which feature of ISE is Terminal Access Control System (TACACS) a part of?A . Device AdministrationB . Device ProfilingC . Centralized policy managementD . Guest access managementView AnswerAnswer: A
Which three options are attack vectors protected by Email Security? (Choose three)
Which three options are attack vectors protected by Email Security? (Choose three)A . EndpointsB . Offline DevicesC . MobileD . E-mailE . VoicemailF . BackupsView AnswerAnswer: ACD
How does AMP's device trajectory capabilities help address customer s issues?
How does AMP's device trajectory capabilities help address customer s issues?A . It determines the scope and cause of an outbreak and tracks suspicious filesB . It searches for potential threats based on identified activities and behaviorsC . It isolates suspicious files and runs them in a sandbox environment to...
Which feature of AnyConnect provides you the ability to identify data breaches as they happen?
Which feature of AnyConnect provides you the ability to identify data breaches as they happen?A . Flexible AAA OptionsB . Network Visibility ModuleC . Differentiated Mobile AccessD . Trusted Network DetectionView AnswerAnswer: B
Which feature of AnyConnect provides you the ability to identify data breaches as they happen?
Which feature of AnyConnect provides you the ability to identify data breaches as they happen?A . Flexible AAA OptionsB . Network Visibility ModuleC . Differentiated Mobile AccessD . Trusted Network DetectionView AnswerAnswer: B
Which Cisco product included in the Endpoint threat-centric solution?
Which Cisco product included in the Endpoint threat-centric solution?A . UmbrellaB . ASAvC . Meraki MXD . CloudlockView AnswerAnswer: A
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)
Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)A . Cloud-Brokered VPNB . Posture AssessmentC . Intrusion PreventionD . Email SecurityE . ProfilingF . Next Generation FirewallView AnswerAnswer: A, C, E
What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?
What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?A . Reduces cost with easy implementation and installationB . Provides in depth cloud app analytics and trackingC . Allow organizations to retroactively identify malware within their environmentD . Includes 70+ out of the box policies for enforcement, such...