Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)
Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)A . Cisco Defense OrchestratorB . Cisco UmbrellaC . Cisco Identity Services EngineD . Cisco Web Security ApplianceE . Cisco Email Security ApplianceView AnswerAnswer: B, D
How many web requests does Talos process per month?
How many web requests does Talos process per month?A . 1.5 millionB . 100,000C . 130 billionD . 130 millionView AnswerAnswer: C
Which Cisco product included in the Endpoint threat-centric solution?
Which Cisco product included in the Endpoint threat-centric solution?A . UmbrellaB . ASAvC . Meraki MXD . CloudlockView AnswerAnswer: A
Which license subscription terms are available for AMP licensing?
Which license subscription terms are available for AMP licensing?A . 1 month 3 months 6 monthsB . 1 year. 5 years. 10 yearsC . 5 years 10 years 30 yearsD . 1 year. 3 years. 6 yearsView AnswerAnswer: D
Which feature of ISE is Terminal Access Control System (TACACS) a part of?
Which feature of ISE is Terminal Access Control System (TACACS) a part of?A . Device AdministrationB . Device ProfilingC . Centralized policy managementD . Guest access managementView AnswerAnswer: A
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?A . Device profiting and onboardingB . Role and device segmentationC . Guest AccessD . Secure remote accessView AnswerAnswer: B
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?
Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?A . Device profiting and onboardingB . Role and device segmentationC . Guest AccessD . Secure remote accessView AnswerAnswer: B
Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?
Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?A . Antivirus defenseB . Outbreak fittersC . Data Loss PreventionD . Advanced Malware ProtectionView AnswerAnswer: B
Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)
Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)A . Data Loss Prevention with NGFWB . Endpoint device profiling with ISEC . E-mail encryption with CRESD . Malware blocking with AMPE . Rogue web application protection through CTAView AnswerAnswer: D, E
Which is a key feature of Cisco Defense Orchestrator?
Which is a key feature of Cisco Defense Orchestrator?A . Simplifies security policy managementB . Identifies sensitive data in cloud environmentsC . Detects anomalous traffic on customer's networkD . Provides retrospective securityView AnswerAnswer: A