What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
What two areas present a security challenge for customers? (Choose two.)
What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E
Which two elements does Advanced Malware Protection provide? (Choose two.)
Which two elements does Advanced Malware Protection provide? (Choose two.)A . dynamic URL filteringB . advanced analyticsC . dynamic data analysisD . intrusion analysisE . reputation analyticsView AnswerAnswer: B C
Which two loT environment layers are protected by ISE? (Choose two)
Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: A C
What is an attribute of Cisco Talos?
What is an attribute of Cisco Talos?A . Real-time threat informationB . 3rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Detection of threats communicated within 48 hours of occurrenceView AnswerAnswer: A
What are two solutions for Cisco Cloud Security? (Choose two.)
What are two solutions for Cisco Cloud Security? (Choose two.)A . cloud data securityB . cloud-delivered securityC . advanced network securityD . intrusion preventionE . cloud securityView AnswerAnswer: D E
Which feature of StealthWatch aggregates and normalizes NetFlow data?
Which feature of StealthWatch aggregates and normalizes NetFlow data?A . Netflow analyticsB . Advanced malware protectionC . Forensic investigationD . FlowCollectorView AnswerAnswer: D
Where do you start to achieve true network visibility?
Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D
What are two key Cisco loT use cases? (Choose two.)
What are two key Cisco loT use cases? (Choose two.)A . Financial InstitutionsB . Mobile UtilitiesC . Industrial SecurityD . Parks and RecreationE . Connected HealthView AnswerAnswer: C E
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: A E