What are two solutions for Cisco Cloud Security? (Choose two.)

What are two solutions for Cisco Cloud Security? (Choose two.)A . cloud data securityB . cloud-delivered securityC . advanced network securityD . intrusion preventionE . cloud securityView AnswerAnswer: D E

September 25, 2020 No Comments READ MORE +

Which two loT environment layers are protected by ISE? (Choose two)

Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: A C

September 25, 2020 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Flexible AAA OptionsB . Identity Services EngineC . Differentiated Mobile AccessD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

September 25, 2020 No Comments READ MORE +

What is a key feature of Application Visibility and Control?

What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D

September 25, 2020 No Comments READ MORE +

What two areas present a security challenge for customers? (Choose two.)

What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E

September 24, 2020 No Comments READ MORE +

Which two attack vectors are protected by NGFW? (Choose two.)

Which two attack vectors are protected by NGFW? (Choose two.)A . MobileB . Data CenterC . EmailD . WebE . CloudView AnswerAnswer: B C

September 24, 2020 No Comments READ MORE +

What are two steps organizations must take to secure loT? (Choose two )

What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E

September 22, 2020 No Comments READ MORE +

What are three security blind spots that must be addressed? (Choose three.)

What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D E

September 22, 2020 No Comments READ MORE +

What are three main areas of the Cisco Security Portfolio? (Choose three )

What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D

September 21, 2020 No Comments READ MORE +

Which two attack vectors are protected by Cloud Security? (Choose two.)

Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . WebC . Data CenterD . CloudE . EmailView AnswerAnswer: DE

September 20, 2020 No Comments READ MORE +