What are two solutions for Cisco Cloud Security? (Choose two.)
What are two solutions for Cisco Cloud Security? (Choose two.)A . cloud data securityB . cloud-delivered securityC . advanced network securityD . intrusion preventionE . cloud securityView AnswerAnswer: D E
Which two loT environment layers are protected by ISE? (Choose two)
Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: A C
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Flexible AAA OptionsB . Identity Services EngineC . Differentiated Mobile AccessD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D
What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
What two areas present a security challenge for customers? (Choose two.)
What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E
Which two attack vectors are protected by NGFW? (Choose two.)
Which two attack vectors are protected by NGFW? (Choose two.)A . MobileB . Data CenterC . EmailD . WebE . CloudView AnswerAnswer: B C
What are two steps organizations must take to secure loT? (Choose two )
What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E
What are three security blind spots that must be addressed? (Choose three.)
What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D E
What are three main areas of the Cisco Security Portfolio? (Choose three )
What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D
Which two attack vectors are protected by Cloud Security? (Choose two.)
Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . WebC . Data CenterD . CloudE . EmailView AnswerAnswer: DE