Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?

Which feature of E-mail Security protects users from virus outbreaks using the Tabs database to quarantine suspicious messages?A . Antivirus defenseB . Outbreak fittersC . Data Loss PreventionD . Advanced Malware ProtectionView AnswerAnswer: B

August 20, 2018 No Comments READ MORE +

What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?

What is a main benefit of Cisco's Clouldlock Data Loss Prevention feature?A . Reduces cost with easy implementation and installationB . Provides in depth cloud app analytics and trackingC . Allow organizations to retroactively identify malware within their environmentD . Includes 70+ out of the box policies for enforcement, such...

August 13, 2018 No Comments READ MORE +

How does AMP's device trajectory capabilities help address customer s issues?

How does AMP's device trajectory capabilities help address customer s issues?A . It determines the scope and cause of an outbreak and tracks suspicious filesB . It searches for potential threats based on identified activities and behaviorsC . It isolates suspicious files and runs them in a sandbox environment to...

August 8, 2018 No Comments READ MORE +

Which Cisco solution falls under Advanced Threat?

Which Cisco solution falls under Advanced Threat?A . UmbrellaB . Identity Services EngineC . StealthwatchD . Threat GridView AnswerAnswer: C

August 8, 2018 No Comments READ MORE +

Which feature of CTA can separate statistically normal traffic form anomalous traffic?

Which feature of CTA can separate statistically normal traffic form anomalous traffic?A . URL filteringB . Trust modelingC . Anomaly detectionD . Event classificationView AnswerAnswer: C

August 6, 2018 No Comments READ MORE +

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?

How is Cisco Security able to dynamically add IP addresses of known malware domains to its list of ports to detect and block?A . Reputation FilteringB . Layer-4 MonitoringC . Data Loss PreventionD . URL FilteringView AnswerAnswer: A

August 2, 2018 No Comments READ MORE +

Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?

Which feature of Cisco ISE uses Cisco TrustSec Security Group Tags 10 edit networks dynamically rather than with VLANs?A . Device profiting and onboardingB . Role and device segmentationC . Guest AccessD . Secure remote accessView AnswerAnswer: B

July 31, 2018 No Comments READ MORE +

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)

What two challenges do customers (ace in their Campus and Branch deployments? (Choose two)A . Securing the entire infrastructureB . Stopping data breaches across campuses and branchesC . Protect data across multiple cloud applicationsD . Monitoring file behavior across a large set of endpointsE . Understanding what our users a*e...

July 26, 2018 No Comments READ MORE +

Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)

Which are two key Cisco products that are part of the web threat-centric solution? (Choose two.)A . Cisco Defense OrchestratorB . Cisco UmbrellaC . Cisco Identity Services EngineD . Cisco Web Security ApplianceE . Cisco Email Security ApplianceView AnswerAnswer: B, D

July 26, 2018 No Comments READ MORE +

Which Cisco product included in the Endpoint threat-centric solution?

Which Cisco product included in the Endpoint threat-centric solution?A . UmbrellaB . ASAvC . Meraki MXD . CloudlockView AnswerAnswer: A

July 24, 2018 No Comments READ MORE +