Which is a key feature of Cisco Defense Orchestra?

Which is a key feature of Cisco Defense Orchestra?A . Profiles devices connected to customer s networkB . Orchestrates security policy management form one placeC . Consolidates configuration managementD . Protects customers network against zero-day attacksView AnswerAnswer: B

September 10, 2018 No Comments READ MORE +

Which is a key feature that Advanced Malware Protection provides?

Which is a key feature that Advanced Malware Protection provides?A . Dynamic Content AnalysisB . Reputation AnalyticsC . Retrospective SecurityD . Dynamic URL FilteringView AnswerAnswer: A

September 10, 2018 No Comments READ MORE +

Which AMP feature is provided by fuzzy fingerprinting?

Which AMP feature is provided by fuzzy fingerprinting?A . Identifies specific instances of malware with a signature-based approachB . Automatically detects polymorphic variants of known malwareC . Provides recursive DNS lookup servicesD . Identifies new malware using statistical modeling and analytics enginesView AnswerAnswer: B

September 8, 2018 No Comments READ MORE +

Which is a key feature of Cisco Defense Orchestrator?

Which is a key feature of Cisco Defense Orchestrator?A . Simplifies security policy managementB . Identifies sensitive data in cloud environmentsC . Detects anomalous traffic on customer's networkD . Provides retrospective securityView AnswerAnswer: A

September 4, 2018 No Comments READ MORE +

Which are two main features of FirePOWER Threat Defense? (Choose two.)

Which are two main features of FirePOWER Threat Defense? (Choose two.)A . Unify Images for more intuitive interface managementB . Provide malware detection score foe additional analyticsC . Deliver Data Loss Prevention through the virtual lockD . Offer intuitive interface including new management options and controlView AnswerAnswer: A, D

September 4, 2018 No Comments READ MORE +

Which are two main features of Advanced Malware Protection? (Choose two.)

Which are two main features of Advanced Malware Protection? (Choose two.)A . Rapid App ContainmentB . Leverages Global Threat Intelligence to provide zero-day protectionC . Threat protection across the entire attack continuumD . User and Entity Behavior AnalyticsView AnswerAnswer: BC

September 3, 2018 No Comments READ MORE +

Which three options are attack vectors protected by Email Security? (Choose three)

Which three options are attack vectors protected by Email Security? (Choose three)A . EndpointsB . Offline DevicesC . MobileD . E-mailE . VoicemailF . BackupsView AnswerAnswer: ACD

August 28, 2018 No Comments READ MORE +

Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)

Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)A . Cisco Defense OrchestratorB . Cisco UmbrellaC . Cisco Identity Services EngineD . Cisco Web Security ApplianceE . Cisco Email Security ApplianceView AnswerAnswer: B, D

August 28, 2018 No Comments READ MORE +

Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)

Which are three main features of the Meraki MX discussed in Cloud App Security module? (Choose three)A . Cloud-Brokered VPNB . Posture AssessmentC . Intrusion PreventionD . Email SecurityE . ProfilingF . Next Generation FirewallView AnswerAnswer: A, C, E

August 27, 2018 No Comments READ MORE +

How does AMP's device trajectory capabilities help address customer s issues?

How does AMP's device trajectory capabilities help address customer s issues?A . It determines the scope and cause of an outbreak and tracks suspicious filesB . It searches for potential threats based on identified activities and behaviorsC . It isolates suspicious files and runs them in a sandbox environment to...

August 21, 2018 No Comments READ MORE +