How do AMP's device trajectory capabilities help address customers' breach remediation issues?
How do AMP's device trajectory capabilities help address customers' breach remediation issues?A . It tracks file behavior across the network to see which devices it enters and exitsB . It analyzes the data from suspicious files to provide a new level of threat intelligenceC . It searches for potential threats...
What should you include in the recommendation?
You need to recommend a deployment plan that meets the technical requirements for the mailbox databases. What should you include in the recommendation?A . Deploy one Exchange server to the main office and two Exchange servers to each branch office. Create one mailbox database on each server.B . Deploy 10...
What is used to reduce attack surfaces?
What is used to reduce attack surfaces?A . RemediationB . AccessC . SegmentationD . Device trustView AnswerAnswer: C
Which two elements does Advanced Malware Protection provide? (Choose two.)
Which two elements does Advanced Malware Protection provide? (Choose two.)A . dynamic URL filteringB . advanced analyticsC . dynamic data analysisD . intrusion analysisE . reputation analyticsView AnswerAnswer: B C
What is one of the reasons that customers need a Visibility & Enforcement solution?
What is one of the reasons that customers need a Visibility & Enforcement solution?A . Businesses can't see or protect devices on their networkB . Network traffic is growing at an exponential rateC . Storage is moving from on-premises to cloud-basedD . Organizations need the ability to block high-risk websitesView...
What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
What does Cisco provide via Firepower's simplified, consistent management?
What does Cisco provide via Firepower's simplified, consistent management?A . Reduced complexityB . Improved speed to securityC . Reduced down timeD . Higher valueView AnswerAnswer: A
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose two.)A . security enforced at the DNS layerB . access to multiple data layersC . access to Trojan downloaderD . see and share malware detailsE . threats stopped from getting in and spreadingView AnswerAnswer: A B
Which two products empower customers to create secure next-gen networks? (Choose two.)
Which two products empower customers to create secure next-gen networks? (Choose two.)A . ISEB . AMPC . MFAD . ACIE . SD-AccessView AnswerAnswer: A B
What are two tenants of establishing an SD-perimeter? (Choose two.)
What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: A B