Which two attack vectors are protected by Web Security? (Choose two.)
Which two attack vectors are protected by Web Security? (Choose two.)A . CloudB . EmailC . VoicemailD . WebE . Data CenterView AnswerAnswer: AD
Which two security areas are part of Cisco's end point solutions? (Choose two.)
Which two security areas are part of Cisco's end point solutions? (Choose two.)A . Identity & Access ControlB . Cloud App SecurityC . URL FilteringD . Malware ProtectionE . Remote VPNView AnswerAnswer: AB
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)
What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)A . More IT professionalsB . More usersC . More devicesD . More vulnerabilitiesE . More networksView AnswerAnswer: CD
In which two ways has digitization transformed today's security threat landscape? (Choose two.)
In which two ways has digitization transformed today's security threat landscape? (Choose two.)A . Decreasing endpoint ecosystemB . Expanding complexityC . Growing ecosystemD . Decreasing 3 rd party applicationsE . Increasing access pointsView AnswerAnswer: AD
Which feature of ISE provides role-based access control and command level authorization with logging for auditing
Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B
What are three major features of Stealth Watch? (Choose three.)
What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: AEC
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)
What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC
What are two solutions Cisco offers for web security? (Choose two.)
What are two solutions Cisco offers for web security? (Choose two.)A . Cloud lockB . NG FWC . CRESD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DA
What are two common customer obstacles? (Choose two.)
What are two common customer obstacles? (Choose two.)A . Security system blackoutsB . Limited resourcesC . Compliance regulationsD . High turnover of IT professionalsE . Lack of solution integrationView AnswerAnswer: CE
What is an attribute of Cisco Talos?
What is an attribute of Cisco Talos?A . Detection of threats communicated within 48 hours of occurrenceB . 3 rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Real-time threat informationView AnswerAnswer: D