Which two attack vectors are protected by Web Security? (Choose two.)

Which two attack vectors are protected by Web Security? (Choose two.)A . CloudB . EmailC . VoicemailD . WebE . Data CenterView AnswerAnswer: AD

January 28, 2021 No Comments READ MORE +

Which two security areas are part of Cisco's end point solutions? (Choose two.)

Which two security areas are part of Cisco's end point solutions? (Choose two.)A . Identity & Access ControlB . Cloud App SecurityC . URL FilteringD . Malware ProtectionE . Remote VPNView AnswerAnswer: AB

January 26, 2021 No Comments READ MORE +

What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)

What are two reasons why perimeter-based network security is no longer sufficient? (Choose two.)A . More IT professionalsB . More usersC . More devicesD . More vulnerabilitiesE . More networksView AnswerAnswer: CD

January 26, 2021 No Comments READ MORE +

In which two ways has digitization transformed today's security threat landscape? (Choose two.)

In which two ways has digitization transformed today's security threat landscape? (Choose two.)A . Decreasing endpoint ecosystemB . Expanding complexityC . Growing ecosystemD . Decreasing 3 rd party applicationsE . Increasing access pointsView AnswerAnswer: AD

January 26, 2021 No Comments READ MORE +

Which feature of ISE provides role-based access control and command level authorization with logging for auditing

Which feature of ISE provides role-based access control and command level authorization with logging for auditingA . Centralized policy managementB . TACACS+ Device AdministrationC . Context-aware accessD . Platform exchange gridView AnswerAnswer: B

January 26, 2021 No Comments READ MORE +

What are three major features of Stealth Watch? (Choose three.)

What are three major features of Stealth Watch? (Choose three.)A . NetFlow monitoringB . Data Loss PreventionC . Threat-based anomaly detectionD . Forensic investigationE . Realtime sandboxingF . Malware clusteringView AnswerAnswer: AEC

January 26, 2021 No Comments READ MORE +

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)

What are two ways that Cisco helps customers secure loT deployments? (Choose two.)A . limited access pointsB . secure remote accessC . segmentation & visibilityD . cross-architecture automationE . network analysisView AnswerAnswer: BC

January 26, 2021 No Comments READ MORE +

What are two solutions Cisco offers for web security? (Choose two.)

What are two solutions Cisco offers for web security? (Choose two.)A . Cloud lockB . NG FWC . CRESD . AMP for Web SecurityE . Cognitive IntelligenceView AnswerAnswer: DA

January 25, 2021 No Comments READ MORE +

What are two common customer obstacles? (Choose two.)

What are two common customer obstacles? (Choose two.)A . Security system blackoutsB . Limited resourcesC . Compliance regulationsD . High turnover of IT professionalsE . Lack of solution integrationView AnswerAnswer: CE

January 25, 2021 No Comments READ MORE +

What is an attribute of Cisco Talos?

What is an attribute of Cisco Talos?A . Detection of threats communicated within 48 hours of occurrenceB . 3 rd party applications integrated through comprehensive APIsC . Blocks threats in real timeD . Real-time threat informationView AnswerAnswer: D

January 25, 2021 No Comments READ MORE +