What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)
What are two steps customers can take to evolve to a trust-centric security philosophy? (Choose two.)A . Require and install agents on mobile devices.B . Block BYOD devices.C . Limit internal access to networksD . Always verify and never trust everything inside and outside the perimeter.E . Only grant access...
What two areas present a security challenge for customers? (Choose two.)
What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?A . Platform exchange gridB . TACACS+Device AdministrationC . Context-aware accessD . Centralized policy managementView AnswerAnswer: B
What are two factors that influence customer loT conversations'? (Choose two)
What are two factors that influence customer loT conversations'? (Choose two)A . MaturityB . DetectionC . MotivationD . ProtectionE . PreventionView AnswerAnswer: C E
Which two attack vectors are protected by NGFW? (Choose two.)
Which two attack vectors are protected by NGFW? (Choose two.)A . MobileB . Data CenterC . EmailD . WebE . CloudView AnswerAnswer: B C
What are three security blind spots that must be addressed? (Choose three.)
What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D E
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: D B
What is an attribute of Cisco Talos?
What is an attribute of Cisco Talos?A . Real-time threat informationB . 3rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Detection of threats communicated within 48 hours of occurrenceView AnswerAnswer: A
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?A . Context telemetry, and profiling sourcesB . intelligence sources, telemetry, and shared intelligenceC . Telemetry, shared intelligence, and profiling sourcesD . Context, telemetry and intelligence sourcesView AnswerAnswer: A
What are two tenants of establishing an SD-perimeter? (Choose two.)
What are two tenants of establishing an SD-perimeter? (Choose two.)A . Securing device accessB . Securing app accessC . Securing user-device trustD . Securing endpointsE . Securing network accessView AnswerAnswer: C B