What does remote access use to verify identity?
What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: A
What is an attribute of Cisco Talos?
What is an attribute of Cisco Talos?A . Detection of threats communicated within 48 hours of occurrenceB . 3 rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Real-time threat informationView AnswerAnswer: D
Which feature of ISE provides role-based access control and command level authorization with logging for auditing
Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B
Which two security risks are created by legacy approaches to networking? (Choose two.)
Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC
What is used to reduce attack surfaces?
What is used to reduce attack surfaces?A . RemediationB . SegmentationC . AccessD . Device trustView AnswerAnswer: B
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D
Which statement best embodies trust-centric security?
Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Verify before granting access via identity-based policies for users, devices, apps, and locations.C . Verify before granting access via MDM software.D . Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.View...
Which two attack vectors are protected by Web Security? (Choose two.)
Which two attack vectors are protected by Web Security? (Choose two.)A . CloudB . EmailC . VoicemailD . WebE . Data CenterView AnswerAnswer: AD
What does remote access use to verify identity?
What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: D
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC