What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . CRESB . NGFWC . CloudlockD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DC
Which two loT environment layers are protected by ISE? (Choose two)
Which two loT environment layers are protected by ISE? (Choose two)A . Access PointsB . EndpointsC . Internet/CloudD . Control LayerE . ThingsView AnswerAnswer: BC
Which two products empower customers to create secure next-gen networks? (Choose two.)
Which two products empower customers to create secure next-gen networks? (Choose two.)A . ISEB . AMPC . MFAD . ACIE . SD-AccessView AnswerAnswer: A B
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?
What do Cisco NGFW fully integrated platforms offer that allow other security components to participate to achieve pervasive and consistent enforcement?A . Context telemetry, and profiling sourcesB . intelligence sources, telemetry, and shared intelligenceC . Telemetry, shared intelligence, and profiling sourcesD . Context, telemetry and intelligence sourcesView AnswerAnswer: C
What are two steps organizations must take to secure loT? (Choose two )
What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E
Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?
Which Cisco VPN technology can use multipoint tunnel, resulting in a single GRE tunnel interface on the hub, to support multiple connections from multiple spoke devices?A . DMVPNB . GETVPNC . Cisco Easy VPND . FlexVPNView AnswerAnswer: A
Which statement best embodies trust-centric security?
Which statement best embodies trust-centric security?A . Protect users from attacks by enabling strict security policies.B . Prevent attacks via an intelligence-based policy then detect, investigate, and remediate.C . Verify before granting access via identity-based policies for users, devices, apps, and locations.D . Verify before granting access via MDM software.View...
What does Cisco provide via Firepower's simplified, consistent management?
What does Cisco provide via Firepower's simplified, consistent management?A . Reduced complexityB . Improved speed to securityC . Reduced down timeD . Higher valueView AnswerAnswer: A
What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)
Which two Cisco products remediate network, cloud, and endpoint threats? (Choose two.)A . pxGridB . Cisco Security ConnectorC . DuoD . StealthwatchE . AMP for EndpointsView AnswerAnswer: DE