What are two solutions Cisco offers for web security? (Choose two.)

What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DC

April 27, 2020 No Comments READ MORE +

Which two loT environment layers are protected by ISE? (Choose two)

Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: BC

April 26, 2020 No Comments READ MORE +

Which two products empower customers to create secure next-gen networks? (Choose two.)

Which two products empower customers to create secure next-gen networks? (Choose two.)A . ISEB . AMPC . MFAD . ACIE . SD-AccessView AnswerAnswer: A B

April 26, 2020 No Comments READ MORE +

What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?

What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?A . Context telemetry, and profiling sourcesB . intelligence sources, telemetry, and shared intelligenceC . Telemetry, shared intelligence, and profiling sourcesD . Context, telemetry and intelligence sourcesView AnswerAnswer: C

April 25, 2020 No Comments READ MORE +

What are two steps organizations must take to secure loT? (Choose two )

What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E

April 25, 2020 No Comments READ MORE +

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?

Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?A . DMVPNB . GETVPNC . Cisco Easy VPND . FlexVPNView AnswerAnswer: A

April 24, 2020 No Comments READ MORE +

Which statement best embodies trust-centric security?

Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.C . Verify before granting access via identity-based policies for users, devices, apps, and locations.D . Verify before granting access via MDM software.View...

April 23, 2020 No Comments READ MORE +

What does Cisco provide via Firepower's simplified, consistent management?

What does Cisco provide via Firepower's simplified, consistent management?A . Reduced complexityB . Improved speed to securityC . Reduced down timeD . Higher valueView AnswerAnswer: A

April 23, 2020 No Comments READ MORE +

What is a key feature of Application Visibility and Control?

What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D

April 23, 2020 No Comments READ MORE +

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)

Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: DE

April 23, 2020 No Comments READ MORE +