What are two key Cisco loT use cases? (Choose two.)
What are two key Cisco loT use cases? (Choose two.)A . Financial InstitutionsB . Mobile UtilitiesC . Industrial SecurityD . Parks and RecreationE . Connected HealthView AnswerAnswer: C E
What are three main areas of the Cisco Security Portfolio? (Choose three )
What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D
What are two result of utilizing a fragmented security model? (Choose two.)
What are two result of utilizing a fragmented security model? (Choose two.)A . Individual components pieced together to meet requirements.B . Increased identity controls.C . Reduced malicious file risk through additional segmentation.D . Decreased network accessibility through multiple applicationsE . Decreased visibility and limited understand of security coverage.View AnswerAnswer: AE
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Flexible AAA OptionsB . Identity Services EngineC . Differentiated Mobile AccessD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: A E
Where do you start to achieve true network visibility?
Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D
What are two solutions for Cisco Cloud Security? (Choose two.)
What are two solutions for Cisco Cloud Security? (Choose two.)A . cloud data securityB . cloud-delivered securityC . advanced network securityD . intrusion preventionE . cloud securityView AnswerAnswer: D E
Which two attack vectors are protected by Cloud Security? (Choose two.)
Which two attack vectors are protected by Cloud Security? (Choose two.)A . EndpointsB . WebC . Data CenterD . CloudE . EmailView AnswerAnswer: DE
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)
Which two attack vectors are protected by Cyber Threat Defense & Network Analytics? (Choose two.)A . CloudB . EmailC . EndpointsD . WebE . Data CenterView AnswerAnswer: DE
Which two loT environment layers are protected by ISE? (Choose two)
Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: A C