What two areas present a security challenge for customers? (Choose two.)
What two areas present a security challenge for customers? (Choose two.)A . IT departmentsB . OT environmentsC . Corporate prioritiesD . loT devicesE . EmailView AnswerAnswer: D E
Which feature of StealthWatch aggregates and normalizes NetFlow data?
Which feature of StealthWatch aggregates and normalizes NetFlow data?A . Netflow analyticsB . Advanced malware protectionC . Forensic investigationD . FlowCollectorView AnswerAnswer: D
What are three main areas of the Cisco Security Portfolio? (Choose three )
What are three main areas of the Cisco Security Portfolio? (Choose three )A . Roaming SecurityB . Advanced ThreatC . Cloud SecurityD . loT SecurityE . Voice & CollaborationF . FirewallsView AnswerAnswer: B C D
Which two attack vectors are protected by NGFW? (Choose two.)
Which two attack vectors are protected by NGFW? (Choose two.)A . MobileB . Data CenterC . EmailD . WebE . CloudView AnswerAnswer: B C
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?
In the Campus NGFW use case, which capability is provided by NGFW & NGIPS?A . Flexible AAA OptionsB . Identity Services EngineC . Differentiated Mobile AccessD . High throughput maintained while still protecting domains against threatsView AnswerAnswer: D
What is a key feature of Application Visibility and Control?
What is a key feature of Application Visibility and Control?A . Automated remediation APIsB . Retrospective securityC . Scalable policy inheritanceD . Control of protocol-hopping apps that evade traditional firewallsView AnswerAnswer: D
What are two steps organizations must take to secure loT? (Choose two )
What are two steps organizations must take to secure loT? (Choose two )A . prevent blackoutsB . update equipmentC . acquire subscription solutionsD . block contractorsE . remediate malfunctionsView AnswerAnswer: C E
What are three security blind spots that must be addressed? (Choose three.)
What are three security blind spots that must be addressed? (Choose three.)A . ITB . WorkloadsC . ApplicationsD . NetworksE . EmailF . DataView AnswerAnswer: C D F
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?
Which feature of ISE provides role-based access control and command level authorization with logging for auditing?A . Platform exchange gridB . TACACS+Device AdministrationC . Context-aware accessD . Centralized policy managementView AnswerAnswer: B
Where do you start to achieve true network visibility?
Where do you start to achieve true network visibility?A . OTB . BranchesC . ITD . Fabric LevelView AnswerAnswer: D