What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)A . security enforced at the DNS layerB . access to multiple data layersC . access to Trojan downloaderD . see and share malware detailsE . threats stopped from getting in and spreadingView AnswerAnswer: A B
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)A . Require and install agents on mobile devices.B . Block BYOD devices.C . Limit internal access to networksD . Always verify and never trust everything inside and outside the perimeter.E . Only grant access...
What is one of the reasons that customers need a Visibility & Enforcement solution?
What is one of the reasons that customers need a Visibility & Enforcement solution?A . Businesses can't see or protect devices on their networkB . Network traffic is growing at an exponential rateC . Storage is moving from on-premises to cloud-basedD . Organizations need the ability to block high-risk websitesView...
Which two elements does Advanced Malware Protection provide? (Choose two.)
Which two elements does Advanced Malware Protection provide? (Choose two.)A . dynamic URL filteringB . advanced analyticsC . dynamic data analysisD . intrusion analysisE . reputation analyticsView AnswerAnswer: B C
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: A E
What are three main areas of the Cisco Security Portfolio? (Choose three )
What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)A . security enforced at the DNS layerB . access to multiple data layersC . access to Trojan downloaderD . see and share malware detailsE . threats stopped from getting in and spreadingView AnswerAnswer: A B
What are two tenants of establishing an SD-perimeter? (Choose two.)
What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B
What are three security blind spots that must be addressed? (Choose three.)
What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D E
Which two attack vectors are protected by Cloud Security? (Choose two.)
Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . WebC . Data CenterD . CloudE . EmailView AnswerAnswer: DE