What is a key feature of Application Visibility and Control?

What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D

August 28, 2020 No Comments READ MORE +

What two areas present a security challenge for customers? (Choose two.)

What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E

August 27, 2020 No Comments READ MORE +

Which two elements does Advanced Malware Protection provide? (Choose two.)

Which two elements does Advanced Malware Protection provide? (Choose two.)A . dynamic URL filteringB . advanced analyticsC . dynamic data analysisD . intrusion analysisE . reputation analyticsView AnswerAnswer: B C

August 27, 2020 No Comments READ MORE +

Which two loT environment layers are protected by ISE? (Choose two)

Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: A C

August 27, 2020 No Comments READ MORE +

What is an attribute of Cisco Talos?

What is an attribute of Cisco Talos?A . Real-time threat informationB . 3rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Detection of threats communicated within 48 hours of occurrenceView AnswerAnswer: A

August 27, 2020 No Comments READ MORE +

What are two solutions for Cisco Cloud Security? (Choose two.)

What are two solutions for Cisco Cloud Security? (Choose two.)A . cloud data securityB . cloud-delivered securityC . advanced network securityD . intrusion preventionE . cloud securityView AnswerAnswer: D E

August 26, 2020 No Comments READ MORE +

Which feature of StealthWatch aggregates and normalizes NetFlow data?

Which feature of StealthWatch aggregates and normalizes NetFlow data?A . Netflow analyticsB . Advanced malware protectionC . Forensic investigationD . FlowCollectorView AnswerAnswer: D

August 25, 2020 No Comments READ MORE +

Where do you start to achieve true network visibility?

Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D

August 25, 2020 No Comments READ MORE +

What are two key Cisco loT use cases? (Choose two.)

What are two key Cisco loT use cases? (Choose two.)A . Financial InstitutionsB . Mobile UtilitiesC . Industrial SecurityD . Parks and RecreationE . Connected HealthView AnswerAnswer: C E

August 24, 2020 No Comments READ MORE +

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: A E

August 23, 2020 No Comments READ MORE +