What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)

What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)A . More IT professionalsB . More usersC . More devicesD . More vulnerabilitiesE . More networksView AnswerAnswer: CD

December 4, 2020 No Comments READ MORE +

What are two common seller obstacles? (Choose two.)

What are two common seller obstacles? (Choose two.)A . Unresponsive potential customersB . Overcrowded portfoliosC . Fragmented solutionsD . Complexity of solution componentsE . Seller competitionView AnswerAnswer: BD

December 4, 2020 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

December 4, 2020 No Comments READ MORE +

What are three major features of Stealth Watch? (Choose three.)

What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: ACF

December 4, 2020 No Comments READ MORE +

What are three major features of Stealth Watch? (Choose three.)

What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: CEA

December 3, 2020 No Comments READ MORE +

What are two solutions Cisco offers for web security? (Choose two.)

What are two solutions Cisco offers for web security? (Choose two.)A . Cloud lockB . NG FWC . CRESD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DE

December 3, 2020 No Comments READ MORE +

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC

December 2, 2020 No Comments READ MORE +

Which feature of ISE provides role-based access control and command level authorization with logging for auditing

Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B

December 2, 2020 No Comments READ MORE +

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?

Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?A . Trust modelingB . Anomaly detectionC . Event classificationD . Anomaly modelingView AnswerAnswer: B

November 29, 2020 No Comments READ MORE +

Which two security risks are created by legacy approaches to networking? (Choose two.)

Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC

November 28, 2020 No Comments READ MORE +