Which two attack vectors are protected by Malware Protection? (Choose Two)
Which two attack vectors are protected by Malware Protection? (Choose Two)A . EmailB . MobileC . VoicemailD . Data CenterE . WebView AnswerAnswer: A,B
What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?
What are the competing IT and Operation Technology (OT) priorities that make securing loT difficult?A . Security vSB . availabilityC . Malfunctions vs. outputD . Innovation vs. manufacturingE . Hackers vs. safetyView AnswerAnswer: A
In the Local Data Center Edge use case, which capabilities are provided by NGFW & NGIPS?
In the Local Data Center Edge use case, which capabilities are provided by NGFW & NGIPS?A . Identity Services EngineB . Reduced attack surface of the on-premises datacenterC . Platform exchange gridD . File Retrospection and TrajectoryView AnswerAnswer: B
Which two features are part of Cisco Web security? (Choose Two)
Which two features are part of Cisco Web security? (Choose Two)A . user authenticationB . device profling and onboardingC . intrusion preventionD . user identity trackingE . URL fiteing&dynamic content analysisView AnswerAnswer: C,E
What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?
What percent of threats did ASA with FirePOWER block that earned AMP the highest security effectiveness scores in third-party testing?A . 95.6%B . 99.2%C . 98.5%D . 100%View AnswerAnswer: D
What is used to reduce attack surfaces?
What is used to reduce attack surfaces?A . RemediationB . SegmentationC . Device trustD . AccessView AnswerAnswer: B
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose Two)
What are two capabilities of Cisco's NGFW Identity Based Policy Control feature? (Choose Two)A . access to multiple data layersB . threats stopped from getting in and spreadingC . access to Trojan downloaderD . security enforced at the DNS layerE . see and share malware detailsView AnswerAnswer: B,E
Which two security areas are part of Cisco's endpoint solutions? (Choose two)
Which two security areas are part of Cisco's endpoint solutions? (Choose two)A . Identity & Access ControlB . URL FilteringC . Remote VPND . Cloud App SecurityE . Malware ProtectionView AnswerAnswer: A,E
What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)
What are two reasons why perimeter-based network security is no longer sufficient? (Choose Two)A . More usersB . More IT professionalsC . More devicesD . More networksE . More vulnerabilitiesView AnswerAnswer: A,C
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?
Which Cisco NGIPS capability provides control over users, applications, devices, threats, and provides insights to network vulnerabilities?A . advanced threat protection and rapid remediationB . security automationC . global threat intelligenceD . contextual awarenessView AnswerAnswer: D