What does remote access use to verify identity?

What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: A

December 10, 2020 No Comments READ MORE +

What is an attribute of Cisco Talos?

What is an attribute of Cisco Talos?A . Detection of threats communicated within 48 hours of occurrenceB . 3 rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Real-time threat informationView AnswerAnswer: D

December 10, 2020 No Comments READ MORE +

Which feature of ISE provides role-based access control and command level authorization with logging for auditing

Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B

December 9, 2020 No Comments READ MORE +

Which two security risks are created by legacy approaches to networking? (Choose two.)

Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC

December 9, 2020 No Comments READ MORE +

What is used to reduce attack surfaces?

What is used to reduce attack surfaces?A . RemediationB . SegmentationC . AccessD . Device trustView AnswerAnswer: B

December 8, 2020 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

December 8, 2020 No Comments READ MORE +

Which statement best embodies trust-centric security?

Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Verify before granting access via identity-based policies for users, devices, apps, and locations.C . Verify before granting access via MDM software.D . Prevent attacks via an intelligence-based policy, then detect, investigate, and remediate.View...

December 8, 2020 No Comments READ MORE +

Which two attack vectors are protected by Web Security? (Choose two.)

Which two attack vectors are protected by Web Security? (Choose two.)A . CloudB . EmailC . VoicemailD . WebE . Data CenterView AnswerAnswer: AD

December 8, 2020 No Comments READ MORE +

What does remote access use to verify identity?

What does remote access use to verify identity?A . Remote Access VPNB . AgentsC . MFAD . AMP for EndpointsView AnswerAnswer: D

December 8, 2020 No Comments READ MORE +

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC

December 7, 2020 No Comments READ MORE +