What two areas present a security challenge for customers? (Choose two.)

What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E

April 17, 2020 No Comments READ MORE +

Which feature of StealthWatch aggregates and normalizes NetFlow data?

Which feature of StealthWatch aggregates and normalizes NetFlow data?A . Netflow analyticsB . Advanced malware protectionC . Forensic investigationD . FlowCollectorView AnswerAnswer: D

April 16, 2020 No Comments READ MORE +

What are three main areas of the Cisco Security Portfolio? (Choose three )

What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D

April 15, 2020 No Comments READ MORE +

Which two attack vectors are protected by NGFW? (Choose two.)

Which two attack vectors are protected by NGFW? (Choose two.)A . MobileB . Data CenterC . EmailD . WebE . CloudView AnswerAnswer: B C

April 15, 2020 No Comments READ MORE +

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?

In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Flexible AAA OptionsB . Identity Services EngineC . Differentiated Mobile AccessD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D

April 14, 2020 No Comments READ MORE +

What is a key feature of Application Visibility and Control?

What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D

February 14, 2020 No Comments READ MORE +

What are two steps organizations must take to secure loT? (Choose two )

What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E

February 11, 2020 No Comments READ MORE +

What are three security blind spots that must be addressed? (Choose three.)

What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D F

February 11, 2020 No Comments READ MORE +

Which feature of ISE provides role-based access control and command level authorization with logging for auditing?

Which feature of ISE provides role-based access control and command level authorization with logging for auditing?A . Platform exchange gridB . TACACS+Device AdministrationC . Context-aware accessD . Centralized policy managementView AnswerAnswer: B

February 10, 2020 No Comments READ MORE +

Where do you start to achieve true network visibility?

Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D

February 9, 2020 No Comments READ MORE +