Which two products empower customers to create secure next-gen networks? (Choose two.)
Which two products empower customers to create secure next-gen networks? (Choose two.)A . ISEB . AMPC . MFAD . ACIE . SD-AccessView AnswerAnswer: A B
Which feature of StealthWatch aggregates and normalizes NetFlow data?
Which feature of StealthWatch aggregates and normalizes NetFlow data?A . Netflow analyticsB . Advanced malware protectionC . Forensic investigationD . FlowCollectorView AnswerAnswer: D
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?A . Context telemetry, and profiling sourcesB . intelligence sources, telemetry, and shared intelligenceC . Telemetry, shared intelligence, and profiling sourcesD . Context, telemetry and intelligence sourcesView AnswerAnswer: A
What does Cisco provide via Firepower's simplified, consistent management?
What does Cisco provide via Firepower's simplified, consistent management?A . Reduced complexityB . Improved speed to securityC . Reduced down timeD . Higher valueView AnswerAnswer: A
What is an attribute of Cisco Talos?
What is an attribute of Cisco Talos?A . Real-time threat informationB . 3rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Detection of threats communicated within 48 hours of occurrenceView AnswerAnswer: A
Where do you start to achieve true network visibility?
Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D
What are two key Cisco loT use cases? (Choose two.)
What are two key Cisco loT use cases? (Choose two.)A . Financial InstitutionsB . Mobile UtilitiesC . Industrial SecurityD . Parks and RecreationE . Connected HealthView AnswerAnswer: C E
Which statement best embodies trust-centric security?
Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.C . Verify before granting access via identity-based policies for users, devices, apps, and locations.D . Verify before granting access via MDM software.View...
What are two tenants of establishing an SD-perimeter? (Choose two.)
What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: D B