What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)A . security enforced at the DNS layerB . access to multiple data layersC . access to Trojan downloaderD . see and share malware detailsE . threats stopped from getting in and spreadingView AnswerAnswer: A B

September 15, 2020 No Comments READ MORE +

What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)

What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)A . Require and install agents on mobile devices.B . Block BYOD devices.C . Limit internal access to networksD . Always verify and never trust everything inside and outside the perimeter.E . Only grant access...

September 14, 2020 No Comments READ MORE +

What is one of the reasons that customers need a Visibility & Enforcement solution?

What is one of the reasons that customers need a Visibility & Enforcement solution?A . Businesses can't see or protect devices on their networkB . Network traffic is growing at an exponential rateC . Storage is moving from on-premises to cloud-basedD . Organizations need the ability to block high-risk websitesView...

September 14, 2020 No Comments READ MORE +

Which two elements does Advanced Malware Protection provide? (Choose two.)

Which two elements does Advanced Malware Protection provide? (Choose two.)A . dynamic URL filteringB . advanced analyticsC . dynamic data analysisD . intrusion analysisE . reputation analyticsView AnswerAnswer: B C

September 14, 2020 No Comments READ MORE +

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: A E

September 12, 2020 No Comments READ MORE +

What are three main areas of the Cisco Security Portfolio? (Choose three )

What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D

August 31, 2020 No Comments READ MORE +

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)

What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)A . security enforced at the DNS layerB . access to multiple data layersC . access to Trojan downloaderD . see and share malware detailsE . threats stopped from getting in and spreadingView AnswerAnswer: A B

August 31, 2020 No Comments READ MORE +

What are two tenants of establishing an SD-perimeter? (Choose two.)

What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B

August 29, 2020 No Comments READ MORE +

What are three security blind spots that must be addressed? (Choose three.)

What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D E

August 29, 2020 No Comments READ MORE +

Which two attack vectors are protected by Cloud Security? (Choose two.)

Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . WebC . Data CenterD . CloudE . EmailView AnswerAnswer: DE

August 28, 2020 No Comments READ MORE +