What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)A . More IT professionalsB . More usersC . More devicesD . More vulnerabilitiesE . More networksView AnswerAnswer: CD
What are two common seller obstacles? (Choose two.)
What are two common seller obstacles? (Choose two.)A . Unresponsive potential customersB . Overcrowded portfoliosC . Fragmented solutionsD . Complexity of solution componentsE . Seller competitionView AnswerAnswer: BD
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Differentiated Mobile AccessB . Flexible AAA OptionsC . Identity Services EngineD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D
What are three major features of Stealth Watch? (Choose three.)
What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: ACF
What are three major features of Stealth Watch? (Choose three.)
What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: CEA
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . Cloud lockB . NG FWC . CRESD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DE
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC
Which feature of ISE provides role-based access control and command level authorization with logging for auditing
Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?
Which feature of Cognitive Intelligence can separate statistically normal traffic from anomalous traffic?A . Trust modelingB . Anomaly detectionC . Event classificationD . Anomaly modelingView AnswerAnswer: B
Which two security risks are created by legacy approaches to networking? (Choose two.)
Which two security risks are created by legacy approaches to networking? (Choose two.)A . slow containmentB . access pointsC . large attack surfaceD . network downtimeE . user vulnerabilityView AnswerAnswer: AC